© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy & Governance Cisco Distinguished Engineer & Senior Technical Director Jawahar Sivasankaran
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Improved Employee Satisfaction Cost savings Increased Productivity
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Device Proliferation Entitlement Strategy Security Support Policy Management and Communication Enterprise Apps, Collaboration, Productivity Services etc. *2 year comparison
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Industry BYOD Spectrum Environment Requires Tight Controls Corp Only Device Manufacturing Environment Trading Floor Classified Government Networks Traditional Enterprise Focus on Basic Services, Easy Access Broader Device Types but Internet Only Educational Environments Public Institutions Simple Guest Enable Differentiated Services, On-Boarding with Security Onsite/Offsite Multiple Device Types + Access Methods Early BYOD Enterprise Adopters Corp Native Applications, New Services, Full Control Any Device, Any Ownership Innovative Enterprises Retail on Demand Mobile Sales Services (Video, Collaboration, etc.) LIMITADVANCEDENHANCEDBASIC
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Any Trusted Device Industry Standard Platforms Cisco AnyConnect and MDM Scaled Architecture Employee Purchased Devices Corporate and Personal Service Strong Rules of Use Flexible Liability Circular Business Client Choice Any Device Plans Competitive Market Spend Management SP Choice Self-Service Content One to Many Interactive Traditional One to One Tailored Support
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Architectural Principles Device security posture assurance User authentication and authorization Secure storage of corporate data at rest Execution Elements Policy Enforcement Local Access Control Device Encryption Remote Wipe * Inventory Tracking Asset Management Device Registration Device Identification User Audit Trail Forensic Capabilities
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 time
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 RegisterRegister ProfileProfile PosturePosture Enforce ment Internet Only Networking (ION) Core Network (Corporate Wifi) Guest Network Cloud Services ManagementManagement 4 Digit PIN PIN 10 Minute Timeout RemoteWipeRemoteWipe EncryptionEncryption
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Remote Access /VPN (Hardware & Software) WIRELESSWIRED
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Thank you.