1 / 10

BYOD : Security, Policy & Governance

BYOD : Security, Policy & Governance. Jawahar Sivasankaran. Cisco Distinguished Engineer & Senior Technical Director. BYOD : Opportunities. Improved Employee Satisfaction. Cost savings. Increased Productivity. BYOD : Challenges. Device Proliferation. Entitlement Strategy. Security.

morag
Download Presentation

BYOD : Security, Policy & Governance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BYOD: Security, Policy & Governance Jawahar Sivasankaran Cisco Distinguished Engineer & Senior Technical Director

  2. BYOD: Opportunities • Improved Employee Satisfaction • Cost savings • Increased Productivity

  3. BYOD: Challenges • Device Proliferation • Entitlement Strategy • Security • Support • Policy Management and Communication • Enterprise Apps, Collaboration, Productivity Services etc. *2 year comparison

  4. Industry BYOD Spectrum LIMIT BASIC ENHANCED ADVANCED • EnvironmentRequires Tight Controls • Corp Only Device • Manufacturing Environment • Trading Floor • Classified Government Networks • Traditional Enterprise • Focus on Basic Services,Easy Access • Broader Device Types but Internet Only • Educational Environments • Public Institutions • Simple Guest • Enable Differentiated Services, On-Boarding with Security—Onsite/Offsite • Multiple Device Types + Access Methods • Early BYOD Enterprise Adopters • Corp Native Applications, New Services,Full Control • Any Device, Any Ownership • Innovative Enterprises • Retail on Demand • Mobile Sales Services (Video, Collaboration, etc.)

  5. Enterprise Example: Cisco IT, Service Strategy

  6. Trusted Device Concept:

  7. BYOD : Centralized Policy Enforcement time

  8. BYOD: Tiered Policy and Security 4 Digit PIN Guest Network Remote Wipe 10 Minute Timeout Cloud Services Internet Only Networking (ION) Encryption Core Network (Corporate Wifi) Management Posture Profile Enforcement Register

  9. Unified Access UNIFIED MANAGEMENT UNIFIED POLICY WIRED Remote Access /VPN (Hardware & Software) WIRELESS

More Related