BYOD Made Easy The Ruckus Team.

Slides:



Advertisements
Similar presentations
1 Making the Desktop Dynamic. 2 What does RES do? »IT as a Service & Automation »Context Aware Security »Dynamic Desktop Delivery »Follow-me Secure Data.
Advertisements

Introduction to the WatchGuard AP Device
1 © 2001, Cisco Systems, Inc. Updated_ Mobile IP Lessons Learned The early years.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Cost Management ACCOUNTING AND CONTROL
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Year 6 mental test 5 second questions
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Ivan Gaboli, Virgilio Puglia.
© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
A Journey into Wireless JD Chaves. 2 Introduction Wireless Wireless a. Types a. Types b. Which one to use b. Which one to use c. Security Types c. Security.
Category Management Association Certification Mission Statement: To advancing professional standards in category management The Association is.
Customer Experience Solutions. Delivered. 1 BANK 2.0 Making Banks Successful in the Era of Engagement Banking.
Chapter 1: Introduction to Scaling Networks
Transforming your network into a platform for mobility
Considerations To Secure Enterprise Mobility / BYOD
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Technical Track Securing EtherNet/IP Networks Presented by: Paul Didier - Cisco Eddie Lee - Moxa.
Enterprise Collaboration Avaya Aura® Conferencing & Avaya Flare® Experience October 2012.
ABC Technology Project
IBM Endpoint Manager for Mobile Devices Mobile Device Management
1 Confidential Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management MobileIron - Confidential1.
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Service Provider WiFi Addressing the Mobile Data Challenge
© 2011 Aerohive Networks CONFIDENTIAL WI-FI DESIGN 101: QUESTIONS EVERY MANAGER SHOULD ANSWER BEFORE PURCHASING WI-FI.
Securing The Network EDGE December 2010
1 Cloud Services Professionals ReadySpace IDA Cloud Computing Call 6.
Enabling business beyond the corporate network.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 3 Impact bedrijven en samenleving Intelligente verbindingen • •Webbrowser.
What’s New in Fireware XTM v11.8.3
Transforming your network into a platform for mobility
SAMSUNG AUSTRALIA Paul Suhr Channel Sales Manager Device & operating system alternatives – what’s here and what’s on the horizon.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Addition 1’s to 20.
25 seconds left…...
Week 1.
Level 1:Shows the total opportunities worldwide. Size of pie is proportional to size-of-prize. Shown in black color. Revenue breakup: How to read the slides.
We will resume in: 25 Minutes.
1 Copyright © 2012 Juniper Networks, Inc. Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry,
1 Unit 1 Kinematics Chapter 1 Day
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
Ruckus Smart Wi-Fi for Retail
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
Meraki Mobile Device Management
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Introductory deck to Avaya WLAN 9100 Series
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Get your network ready for Apple Observations from Aruba Networks
©2014 Extreme Networks, Inc. All rights reserved. Microsoft Skype for Business Integration Overview Leveraging the Power of Technology Partnerships Niels.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Agenda Introductions Meraki Overview/Training New Products Promotions
CenturyLink® Business Wi-Fi
Take Advantage of the Perfect Storm
Enterprise Launch Cloud Networking Connected Experience
Improving the WiFi Customer Experience
Network Access Control 101 Securing the Critical Edge of Your Network
Wireless Technologies in the BYOD Revolution
ACMA Aerohive Certified Mobility Administrator HiveManager
What’s New In WatchGuard Wi-Fi Cloud v8.6
IT Management, Simplified
Presentation transcript:

BYOD Made Easy The Ruckus Team

Growing Share in the Enterprise World’s Top Three WLAN Suppliers (4Q12) (based on estimated revenue) 65% Others Cisco Worldwide WLAN Market Growth (1Q11 to 4Q12) 33% 51% 11% 5% Aruba 34% 33% 20% Aruba Cisco Ruckus

The Post-PC Era… A WORLD GOING Wi-Fi 220% 65% 2010 2016 694M 2.8B 874M Ethernet devices Wi-Fi Source: iSuppli 2012 A WORLD GOING Wi-Fi 220% 65% Annual Unit Shipments

More Mobile Data Consumption In 2011, mobile data traffic was 8x of entire global Internet in 2000 53x GROWTH IN MOBILE DATA Source: Cisco Visual Network Index, 2012 2020 2010 Source: Signals Research Group Note: Data represents data traffic growth and capacity in the US markets only Source: Signals Research Group Note: Data represents data traffic growth and capacity in the US market only

What’s Top Of Mind? Regional BYOD concerns Source: Readwrite BYOD Grows UP 3-26-13

BYOD technology IDENTIFY Manage Secure ONBOARD

BYOD Ruckus Style Function Ruckus Solution Identify Onboard Secure Identifying hostname, device type, operating system, and applications. Onboard Captive portal for guest and device registration Secure Context based security policies and integration with existing security authentication systems: AD, 802.1x, etc. Manage Manage and fine-tune network and security policies

Device and Application Recognition IDENTIFY iOS Availability: Application Recognition 2H CY13

Zero-IT Device Registration ONBOARD Open Network/ Guest Access Bulk DPSK Self Registered device

Zero-IT End-User Setup Connect Register Secure 1 2 3 Connect to Registration SSID with mobile device Login using AD or other security credentials Continue to Student network and access school resources

Context Aware Security iOS SECURE

Device-Specific Policy Enforcement Configuration steps 1 VLAN 10 Resources VLAN 20 Resources VLAN 40 Resources INTERNET 1. Configure device access policies (staff policy shown) 2. Configure WLANs with device- specific policies (staff WLAN shown) What happens next 3. Staff laptops (sanctioned Windows devices) connect and receive full network permissions 2 4. Staff iOS / Android devices connect, gain access to staff resources with some limits Staff SSID Guest SSID Student SSID 3 4 5 6 7 5. All guest users receive the same Internet-only policies Web GUESTS STUDENT DEVICES iOS iPad VLAN 20 5 Mbps Android All VLAN 99 1 Mbps iOS Laptop VLAN 10 No Rate Limit Laptops/iOS VLAN 40 3 Mbps iOS Others Blocked 6. Student laptops and tablets (sanctioned) connect and receive equal access to resources with rate limits 7. Students attempt to connect with non-sanctioned device types and are denied access STAFF DEVICES

Dynamic Pre-Shared Key Device limits by user Prevent sharing of user name/password Automatically removes expired D-PKS Teacher - unlimited device connectivity Student – limited to 1 device

Bonjour Bridging: The SmartWay SmartWay™ Simplifies Managing and Optimizing Service Discovery Device VLAN 100 Student VLAN 200 Teacher VLAN 300 Guest VLAN 400 Availability: Bonjour Gateway 2H CY13

Network and Device Management

Industry partners Partnering for a full ecosystem Education Healthcare RIOT Partnerships Partnering for a full ecosystem Education Healthcare Hospitality Retail Warehousing Technology integration POC lab - proof of concept Voice over WiFi Real Time Location Services BYOD / NAC / MDM Access Gateway Warehouse and Logistics

MDM MAM Introducing Filewave Cross Platform Support Windows, iOS & MacOSX Granular reporting Device Configuration Device registration, inventory, inventory dashboard Wi-FI/VPN/Exchange profiles Full Certificate management Mobile Application Management Push apps Push apps through VPP, custom apps Role based app access End User Kiosk User can pick and choose apps based on user role

What About The Wireless? Interference Reliability Capacity Constraints Easy Fast Stable

Independent test results AVG. TCP THROUGHPUT 20 18 16 14 12 10 8 6 4 2 Highest, most reliable performance Ruckus 7982 Cisco 2602i HP 430 Cisco 3602i Xirrus 4820 Aerohive AP330 Juniper 532 Aruba 135 HP 460 Aruba 105 Meraki MR24 Aerohive AP121 Meraki MR16 Linksys EA4500 Ubiquiti UniFi Pro Lowest, least reliable performance 20 30 40 50 60 70 80 VIDEO ERRORS WI-FI STRESS TEST

Independent test results Industry’s First 3x3:3 802.11n Competitive Testing 6% 2% 12% 14% 66% Percentage of Vendor Test Wins (87 tests)

Integrated Solution x Ruckus Cisco Cisco Cloud Aruba Aruba Instant Pervasive Wireless x Device/ OS Fingerprinting Easy-of-use Application Fingerprinting Guest Access Auto-Device provision Bonjour Gateway Dynamic-PSK Dashboard view

Technology Definitions Dynamic PSK Dynamic PSK is an easy to implement, but highly secure alternative to 802.1x and Passphrases. Dynamic PSK device limiting D-PSK device limiting is a mechanism to limit number of devices a user can have on the wireless network. Zero-IT Activation Provides an intuitive self-registration process to on-board and secure ubiquitous devices without IT staff intervention. Directory Integration Allows businesses to leverage existing directory investments — ActiveDirectory, LDAP, eDirectory — for BYOD device onboarding, user authentication, and policy. Device Recognition This provides additional context to create authorization profiles based on user, role, and device type. Application Recognition Provides additional granular visibility to application traffic for application control and policy. Client Visibility Delivers granular monitoring and diagnostics so administrators and support staff can keep better tabs on, and make informed decisions about, usage trends and network behavior Pervasive Performance With unique features like BeamFlex+, ChannelFly, and SmartCast, businesses can count on reliable connections and optimized mobile device capacity with fewer APs and less expensive solutions.

Why Ruckus Ruckus Proprietary and Confidential Focus – Committed to the SME Market Best-in-class wireless in capacity and throughput Low TCO with single ‘box’ integrated solutions Intuitive setup and management Ruckus Proprietary and Confidential

Thank you! Open for Q/A