Cisco Customer Education · Today’s Agenda Welcome from Cisco The BYOD Revolution Conclusion...
Transcript of Cisco Customer Education · Today’s Agenda Welcome from Cisco The BYOD Revolution Conclusion...
Territory Business Manager – Florida Territory
Cisco Customer Education
Brian Avery
Do You Even BYOD? Implement a Mobile Device Strategy With Cisco
This session was recorded via Cisco WebEx! You can watch the live session recording via the following URL:
Watch the WebEx Recording
Thanks for your interest and participation!
Territory Business Manager – Florida Territory
Cisco Customer Education
Brian Avery
Do You Even BYOD? Implement a Mobile Device Strategy With Cisco
Connect using the audio conference box or you can call into the meeting:
1. Toll-Free: (866) 432-9903
2. Enter Meeting ID: 207 972 497
3. Press “1” to join the conference.
Today’s Agenda
► Welcome from Cisco
► The BYOD Revolution
► Conclusion
► Cisco BYOD Smart Solution
► BYOD Building Blocks About Your Host Brian Avery Territory Business Manager
Cisco Systems, Inc.
Cisco Confidential 4 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Welcome from Cisco
Cisco Confidential 5
Computer scientists, Len Bosack and Sandy Lerner found Cisco Systems
Bosack and Lerner run network cables between two different buildings on the Stanford University campus
A technology has to be invented to deal with disparate local area protocols; the multi-protocol router is born
1984
Cisco Confidential 6 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
WellFleet
SynOptics
3Com
ACC
DEC
Proteon
IBM
Bay Networks
Newbridge
Cabletron
Ascend
Fore
Xylan
3Com Nortel
Ericsson
Alcatel
Juniper Lucent
Siemens
NEC
Foundry
Redback
Riverstone
Extreme Arista
HP
Avaya
Juniper
Huawei
Aruba
Brocade
Checkpoint
Fortinet
ShoreTel
Polycom
Microsoft
F5
Riverbed
Dell
Internet of Everything
1990 – 1995 1996 – 2000 2001 – 2007 2008 – Today
The Landscape is Constantly
Changing
Leading for Nearly 30 Years
2016
Cisco Confidential 7
Who Is Cisco?
Chuck Robbins, CEO, Cisco
• Dow Jones Industrial Average Fortune 100 Company (AAPL, CSCO, INTC, MSFT)
• $117B Market Capitalization
• $49.6B in Revenue
• $10B in Annual Net Profits
• $34B More Cash than Debt
• $6.3B in Research and Development
http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics
No. 1 Voice
41%
No. 1 TelePresence
50%
No. 1 Web
Conferencing 43%
No. 1 Wireless LAN
50%
No. 2 x86 Blade Servers
29%
No. 1 Routing Edge/Core/
Access 47%
No. 1 Security
31%
No. 1 Switching Modular/Fixed
65%
No. 1 Storage Area
Networks 47%
Market Leadership Matters
Cisco Confidential 9 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
§ CCE is an educational session for current and prospective Cisco customers
§ Designed to help you understand the capabilities and business benefits of Cisco technologies
§ Allow you to interact directly with Cisco subject matter experts and ask questions
§ Offer assistance if you need/want more information, demonstrations, etc.
What Is the Cisco Customer Education Series?
The BYOD Revolution Enabling Better Connected Experiences
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Mobile Devices as the “Most Important” Technology
OF STUDENTS
OF EMPLOYEES
SAY A MOBILE DEVICE (LAPTOP, SMARTPHONE, TABLET) IS “THE MOST IMPORTANT TECHNOLOGY IN THEIR LIVES.”
SMARTPHONES ARE POISED TO SURPASS DESKTOPS AS THE MOST PREVALENT TOOL FROM A GLOBAL PERSPECTIVE
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Changing People
COLLEGE STUDENTS AND YOUNG PROFESSIONALS
CONSIDER THE INTERNET TO BE A “FUNDAMENTAL” HUMAN RESOURCE
OF COLLEGE STUDENTS
OF YOUNG EMPLOYEES
AND
SAY THEY COULD NOT LIVE WITHOUT THE INTERNET
Air Water Food Shelter Internet
Cisco Confidential 13 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Fundamental shift in behavior Desktop as primary Mobile as primary
Salesforce
Task workers
Knowledge workers
Industry-specific roles
Cisco Confidential 14 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Are You Ready for The Business and IT Transformation Of BYOD?
IT leaders consider BYOD growth as positive
Policy for employee device access**
the network is not ready for BYOD*
Knowledge workers use mobile devices for work
*2013 Cisco Global IT Impact Survey, **2012 Cisco IBSG Horizons Study
Differentiate with Innovative Experiences
Seamlessly Roll Out Business Applications
Provide a Mobile Workspace
Reduce Operational Costs
$
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Internet Email Instant Messaging Voice Video
Everything That Makes You Efficient and Productive
Desktop Company Applications Optimized Voice Optimized Video Intellectual Property Expertise Collaboration
Internet Email Instant Messaging Processing Bandwidth Storage
Productivity Meter
In the Office On the Go
Implementing a Multiple Device Strategy IT concerns – “how do I…”
“…simplify trouble shooting and management?” “…manage connectivity
between sites, wifi access points and high client density
issues?”
“…defend against infected devices?”
“…manage onboarding and access rights for students, faculty, staff and guests?”
“…enable a secure and reliable user experience?”
“…simplify ongoing operations?”
“…make mobile learning safe and secure?”
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Tactical
Strategic
I Need a Workspace Strategy
BYOD I need to allow iPads
on my network End User
I need to retain and attract top talent who highly value their devices
I need to ensure workers can be more mobile and more productive CEO
I need to protect intellectual property and confidential data
I need enable users on diverse platforms without compromising the experience CIO
I need to onboard and provide policy-based access to devices for employees,
partners, and contractors
I need to support multiple device types without
increasing cost or complexity
I need to enable legacy applications
on diverse mobile operating systems
IT
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Delivered by Cisco Smart Solutions
Experience Security Mobility
ANYWHERE
ANY DEVICE
ANY APPLICATION
ANY EXPERT
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Smart Solution Components: Scale from Commercial to Enterprise
Tested, Validated, Documented Designs
Integrated Cisco + 3rd Party Roadmaps
Technical Training and Support
Enablement: Demos, ROI Tools, Financing
Cisco and Partner Services
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Only Gartner MQ Leader in All Categories
Paul B
Best-in-Class Technology Converged Policy and Management
Identity Services Engine
Mobility Optimized Experience on Wireless Client acceleration and optimized video protected by proactive spectrum management
Security Protecting Data in Motion Context-aware VPN and firewall, cloud-based email and content scanning
Collaboration Rich Experience Across Devices One platform for voice, video, and IM across mobile devices
Who? What? When?
Where? How?
Cisco Prime Infrastructure
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Flexible Options
Workspace Management
Secure Mobility
Policy Management Infrastructure
Core Infrastructure
Collaboration Applications
Workspace Management
Secure Mobility
Policy Management Infrastructure
Core Infrastructure
Collaboration Applications
Workspace Management
Secure Mobility
Policy Management Infrastructure
Core Infrastructure
Collaboration Applications
Grey out the boxes and text
dialog
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Limit Advanced Enhanced Basic
Environment requires tight controls
Company’s only device Manufacturing environments
Trading floors Classified government
networks Traditional enterprises
Focus on basic services and easy access for
almost anybody
Broader device types but Internet only
Education environments Public institutions
Simple guests
Enable differentiated services and on-boarding with security both onsite
and offsite
Multiple device types plus access methods
Healthcare Early BYOD adopters Contractor enablement
Company’s native applications, new
services, and full control
Multiple device types, company issued
Innovative enterprises Retail on demand
Mobile sales services (video, collaboration, etc.)
BYOD Building Blocks
o Pervasive Wireless o Network Security,
Identity Services and Mobile Device Mgmt
o Collaboration o VDI/VXI
ü
Market: Why Gigabit Wi-Fi / 802.11ac now…!!!
Wi-Fi as Primary – Ethernet as Fallback
Connectivity
Wireless (53%) will bypass Wired traffic
(40%) by 20171
50% new devices will be 802.11ac by end of 2014, 75%
by 20152
1 Cisco VNI Global Mobile Data Forecast 2012-2017, 2 AVI Research 3 Nemertes Research Global Mobile Research 2013
Wi-Fi Speed Gigabit Wi-Fi as Primary
No Price Premium over 802.11n
3X the Performance over 802.11n
2X the Battery Life over 802.11n
4SS Desktops
3SS Desktops / Laptops
2SS Laptops / Tablets
1SS Tablets / Smartphones
*Assuming 80 MHz channel is available and suitable
**Assuming 160 MHz channel is available and suitable
802.11 802.11n 802.11b 802.11a/g 802.11ac Wave 1
802.11ac Wave 2
2 11
24
54 65
600
450
300
6900** 6900**
3500**
2340**
1730** 1300*
430* 430*
= Connect Rates (Mbps)
= Spatial Streams SS
1997 1999 2003 2007 2013 2016 G
igab
it
Ethe
rnet
Upl
ink
2 G
igab
it
Ethe
rnet
Upl
inks
1 Spatial Stream
8 Spatial
Streams
2 Spatial Stream
4 Spatial
Streams
870*
Why Cisco for Gigabit Wi-Fi / 802.11ac
Only AP manufacturer that built their own
Radio ASIC
Most CPU and Memory per AP in
the industry
Suite of High Client and Access Point
Density capabilities
Only Modular and Future Proofed Access Point in the
industry
Cisco Confidential 27 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Unique Gigabit Wi-Fi / 802.11ac Access Point Design
DRAM (512)
5GHZ Radio
CPU
DRAM (128) CPU
DRAM (128) CPU
2.4GHZ Radio
THE CISCO ADVANTAGE
More onboard CPU Processing and Memory than any other Access Point design in the industry – with no price premium over previous generations
Cisco High Density Experience (HDX)
*Future
Cisco CleanAir® 80Mhz Mitigates interference and improves channel capacity
Optimized Roaming Intelligently determines the optimum time to roam
Turbo Performance Improves the efficiency of airtime utilization and channel capacity
Cisco ClientLink 3.0 Improves legacy and 802.11ac Client performance
Noise Reduction* Enables Dense Access Point Coexistence / implementation
Cisco Confidential 29 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Optimized AP Roaming
Makes sure users on the move associate to the AP with the strongest signal for best performance
Cisco Confidential 30 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Optimized Roaming: Reduces Client Stickiness
MOBILE DEVICE PERFORMANCE • Device Connects to First Access
Point it Encounters • Stays Connected to Same
Access Point as User Moves • Impacts Device Performance
Cisco Confidential 31 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Optimized Roaming: Reduces Client Stickiness
• Device Connects to Most Effective Access Point as User Moves
• Improves Device Performance
MOBILE DEVICE PERFORMANCE
Cisco Confidential 32 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
CleanAir Detect and Classify
High-resolution interference detection and classification logic built-in to Cisco’s Wi-Fi chip design.
Detect and Classify Interference
• Uniquely identify and track multiple interferers
• Assess unique impact to Wi-Fi performance
• Monitor Air Quality
Microwave
63
Rogue AP
100 Wireless Phone
67
Security Cameras
90
Bluetooth Headset
63
Cisco Confidential 33 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Air Quality Index
• Air Quality is a measurement of non-wifi and adjacent channel interference
• All Individual devices when Classified are assigned a Severity Value
• Air Quality is a measure of all Devices/Severities within a Radio, Floor, Building, or Campus Good
Bad
Information passed from the AP to controllers is minimal: it all happens on the AP
Cisco Confidential 34 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
CleanAir – Locate and Mitigate
Mitigate Wireless LAN Controller
Maintain Air Quality
GOOD POOR
CH 1 CH 11
Locate PRIME, MSE
Visualize and Troubleshoot
§ Classification processed on Access Point § Interference impact and data
sent to WLC for real-time action § WCS and MSE store data for
location, history, and troubleshooting
Cisco CleanAir Technology integrates interference information from the AP into the entire system
Cisco Confidential 35 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Cisco ClientLink: Improves Downlink Performance for ALL Devices
Boost signal strength wherever you are and as you
move for 802.11a/g/n/ac clients
Improved Performance For All Clients
1SS 1SS 2SS 3SS
802.11a/g/n/ac
ClientLink 3.0 Beamforming
Cisco Confidential 36 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Access Point Noise Reduction
Focused Communication
Noisy Communication
• Mobile Devices Being Heard By Multiple Access Points Creates Noise –Impacts Performance
Channel 11 Channel 11
Channel 11
Channel 11 Channel 11
Cisco Confidential 37 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Access Point Noise Reduction
Focused Communication
Noisy Communication
Channel 11 Channel 11
Channel 11
Channel 11 Channel 11
• All Access Points Share what clients they are servicing
• Access Points then focus on Specific Client Devices
• Result is a 10-12% Performance Increase
Not All Gigabit Wi-Fi Solutions are Created Equal
802.11ac
All Gigabit Wi-Fi
Vendors
Improved Device Power Efficiency
Support More Devices Than 802.11n
Support Bandwidth Intensive Apps.
Increased Scale and Coverage
Improved Experience on ALL Devices
Optimized Wi-Fi Network
Cisco is the ONLY SOLUTION with High-Definition
Experience Technology (HDX)
802.11ac with HDX
Cisco Unified Access On-Premises Managed
Enabling IT to Be More Responsive to the Business Less Time on IT Operations, More Time on IT Business Innovation
Single solution for comprehensive lifecycle management and user, network, and application visibility
Integrated industry-leading networking and mobility capabilities for a single network infrastructure
World-class unified policy definition and enforcement across wired, wireless, and VPN
One Policy
One Management
One Network
Simple
Secure
Lower TCO
BYOD Building Blocks
o Pervasive Wireless o Network Security,
Identity Services and Mobile Device Mgmt
o Collaboration o VDI/VXI
ü
Cisco Confidential 41 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
§ Remove the Risk & Accelerate Business
Mobile Devices & BYOD
Top 3 Concerns Forrester Research
Data Security Breach Mobile Device Security Mobile Application Security
SECURITY
A New Approach is Required • Network is the root of control
NETWORK Sees All Traffic
Routes All Requests Sources All Data
Controls All Flows
Handles All Devices
Touches All Users
Shapes All Streams
Cisco Confidential 43 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Web Filtering Webpage Web
Reputation
Application Visibility and
Control Anti-
Malware Outbreak
Intelligence File
Reputation Cognitive
Threat Analytics
X X X X
Before After
www.website.com
During
X
File Retrospection
www
Roaming User
Reporting
Log Extraction
Management
Branch Office
www www
Allow Warn Block Partial Block Campus Office
ASA Standalone WSA ISR G2 AnyConnect® Admin Traff ic Redirections
Talos Cisco® Cloud Web Security (CWS)
www
HQ
File Sandboxing
X
Cisco’s AnyConnect Technology • Industry’s First Context-Based and Persistent VPN Connectivity
BEFORE Unmanaged devices—
risk of data loss and lack of access
AFTER Always-on VPN connectivity
Cisco AnyConnect—Always On VPN Connectivity
Mobile Worker
Acceptable Use Access Control Data Loss Prevention
45
ISE
Cisco Identity Services Engine • All-in-One Enterprise Policy Control Solution Leveraging Real Context that is Practical for
Today’s Threat Landscape
Wired Wireless
VPN
Dynamic Segmentation Options: VLANs, DACLs, or TrustSec
Intelligent Cyber Security policy and segmentation is impractical without Real Threat Context in todays Security
Landscape
- Who are you? à Bob
- What Device? à BYOD or Corporate Endpoint
- Where are you? à Building 200, 1st Floor Lobby
- When?à 11:00 AM CST on April 10th
- How ? à Wired, Wireless, or VPN
One Policy - Cisco Identity Services Engine (ISE) Consistent Policy For Enterprise
Consistent policy for wired, wireless, and VPN
Access compliance and control of network devices and mobile endpoints
Comprehensive, highly secure access based on who, what, when, where, and how Context-Aware
Central Policy Platform
Comprehensive, Secure Access
Cisco Confidential 47 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Device Management MDM is a key element but there is more
ü Device inventory
ü Device provisioning and deprovisioning
ü Device data security
ü Device application security
ü Cost management
ü Full or selective device remote wipe
MDM Solutions
Cisco® ISE Cisco AnyConnect™
Cisco ASA Cisco ScanSafe Cisco WSA
Cisco ü User and device
authentication
ü Posture assessment ü Policy enforcement
ü Context-aware access control
ü Secure remote access ü Threat defense
ü Web use policy
ü Web application DLP
Cisco ISE
Cisco Confidential 48 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Secure Mobile Device Management • Cisco ISE MDM Partner Ecosystem
Wired or Wireless
Cisco Catalyst Switches
Window or OS X Computers
Cisco WLAN Controller
ISE MDM Mgr Contextual
Policy
Smartphones including iOS or Android Devices
Wireless
AD/LDAP
User X User Y
?
Integration with Leading MDM Vendors *
Ecosystem offering choice for customers
Features
Comprehensive Device Provisioning
Detailed User and Device Context
Increased Device and Application Security
Cisco Confidential 49 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Systems Manager for Enterprise
Cisco Confidential 50 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Deploy and manage BYOD and company-owned devices • Rapidly deploy 100,000s of devices out-of-the-box
• Assign users automatically with Active Directory or LDAP integration
• Automatically push out applications, security policies, WiFi and auto-VPN settings
• Apply network policies using identity and compliance
• Secure data and track devices using Geofencing
Cisco Confidential 51 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Secure your data
Ensure compliance with dynamic security policies including anti-virus checks
Automatically trigger device entry, quarantines, locks, or wipes
Manage file access permissions
Continuously monitor security posture to prevent malicious attempts to compromise devices
Cisco Confidential 52 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
End-to-end visibility and control of your network
• Dynamically apply Meraki network group policies to devices
• Obtain end-to-end control from the device through
the Meraki network stack
• Remediation for non-compliant devices without exposing critical network services
• Filter harmful content when using the Meraki
Security Appliance
BYOD Building Blocks
o Pervasive Wireless o Network Security o Identity Services and Mobile
Device Mgmt o Collaboration o VDI/VXI ü
Spotlight: Unified Presence - How Do People Work?
7 AM 5 PM 12 PM
ASYNC
SYNC
Cisco Confidential 55 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Introducing Cisco Jabber
56 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Moves Like Jabber
http://www.youtube.com/watch?v=iEPTlhBmwRg
Cisco Public Information 57 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
All-in-One UC Application § Presence and IM § Voice, video, voice messaging § Desktop sharing, conferencing
Rich, Real-time Collaboration with Cisco Jabber® Any Device, Any Location
Collaborate from Any Workspace § PC, Mac, tablet, smart phone § On-premises and Cloud § Integration with Microsoft Office
The Cisco Spark Application
Easily start face-to-face meetings with screen
sharing
Work confidently with end-to-end encryption in
the cloud
Less email. More agility. Better teamwork.
The Cisco Spark application brings your teams together in a place that makes it easy to keep people and work connected.
Send messages, share files,
integrate services
Find key information fast with search, message filters, and mentions
One Offer
One Experience
Message Meeting Call 1:1 and team messaging in virtual rooms
Persistent Chat, Content Sharing, Iteration
Voice and video calling via a cloud based PBX1
Make calls within or outside organization via the PSTN
Audio, video, and web meetings
Before/during/after-meeting messaging and content
Cisco Spark
1 The Cisco Spark service doesn’t include PSTN services. Customers need to purchase PSTN services from a 3rd party provider. For the complete Spark service, Cisco preferred media provider ecosystem partners can provide PSTN local, long-distance, and direct-inward-dial services. Existing Cisco UC customers will use Spark Hybrid Services to connect on-premises call capabilities to Cisco Spark capabilities in the cloud.
BYOD Building Blocks
o Pervasive Wireless o Network Security o Identity Services and Mobile
Device Mgmt o Collaboration o VDI/VXI ü
Cisco Confidential 61 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Today’s Thin Client aka “Virtual Workspace”
Cisco Public Information 62 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
The Time Is Now For Desktop & App Virtualization
The market and technology have matured. Our customers are asking for this
We now have multiple infrastructure options to choose. Private, Cloud, Hybrid
The proliferation of mobile devices is driving demand to have your enterprise apps accessible everywhere
Market leading eco-system that is best delivered by partners
Business are expected to add 59M more virtual desktops by 2016. This growth can drive sales of 500k servers1
1 Gartner Forecast: Hosted Virtual Desktops, WW 2012-2016 (G00234666)
Desktop OS continues to be in transition. This creates a compelling event.
Cisco Confidential 63 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Citrix XenDesktop: Delivery for Every Work Style Deliver every type of virtual desktop – each specifically tailored to meet the performance, security, and flexibility requirements of any user, enabling work your way
63
Offline access to desktops
LAN-based access to desktops
Online access to desktops from anywhere
Access to apps from anywhere
Local device Office device Any device Any device, online or offline Factory
workers, retail clerks, bank
tellers, nurses’ stations
Execs, engineers,
researchers ü Mobile workers w/ offline needs
ü Road warriors ü Knowledge workers ü Contractors
ü Shared workstations ü Labs, conference,
training, classrooms, task workers
ü On-demand apps ü Knowledge workers ü Contractors
ü Knowledge workers
ü Task workers call centers
Cisco Public Information 64 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Cisco Unified Computing System A differentiated/revolutionary approach for desktop and app virtualization
Unified Management
• Faster deploy/ provision
• Unification leads to reduced complexity
• Management via a single interface
Simplified Architecture
• Networking with fewer components
• Lower cost and easier scaling
• Fewer management touch points
• Stateless: any resource, any time
• Better TCO/ROI
Scale
• Ultimate Scalability
• Enhanced design capability
• Designed for the future, today
Higher Performance
• Brings out the best of x86 architecture
• Optimized resource utilization for compute, networking, and management
Cisco Public Information 65 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
DV and UCS Performance Proof Points
Windows 7 Desktops on a Single B200 M4
Blade Server
more responsive app virtualization sessions with…
better CPU Utilization
Virtual desktop users booted within 30 minutes
Lower cost storage per desktop and…
Less power consumed
per desktop **
**w ith Cisco UCS Storage
Cisco Public Information 66 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Desktop-as-a-Service
• Cisco Desktop-as-a-Service • Joint Cisco and Citrix offering
• Customer Benefits • The benefits of desktop virtualization
without having to acquire, build, and manage your own infrastructure
Cisco Public Information 67 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Cisco Desktop Virtualization Solutions
Cisco Desktop Virtualization (On-Premise)
Cisco DV Solution with
Citrix XenDesktop
Cisco Desktop as a Service Solution
(Cloud-Based, Cloud Provider Delivered)
Cisco DaaS Solution with
Citrix
Cisco Desktop-as-a-Service (DaaS) Solutions
Enterprise focused Customer premises-based and managed Customer data center and staff CapEx and OpEx
Cloud provider focused Cloud provider hosted and managed Cloud provider data center and staff Subscription-based OpEx
Conclusion
Beyond BYOD: Mobile Freedom
BYOD Beyond BYOD
Device Onboarding and Guest Access
Unified Policy
Uncompromised User
Experience Simplified
IT experience
Secure, Customized Experience per User, per Device
Cisco Confidential 70 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
§ Higher user expectations
§ Users don’t care about certs, MAC addresses, provisioning… § “Just make it work!”
§ Bring Your Own Device = Brought Your Own Device
§ Adapt or pay the price in lower user experience & serious security implications
What have we learned?
The office is everywhere. Your customers’ networks should be too!!.
The Apple and Cisco Partnership
Expanding mobile use cases
BYOD
Company Purchased
Basic Communications
Transforming Work
Mobile Transactions
New tools and high-performance networks support this transformation
Apple and Cisco are working together to enable this
Voice Collaboration Networking
Mobile users need fast, reliable, and effective connections to company Wi-Fi networks.
Enhanced interactions between iOS devices and Cisco networks will allow optimized connections.
iOS devices will perform dramatically better on Cisco networks.
Tighter integration with Cisco Collaboration Cloud will give iPhone unique capabilities for enterprise voice.
Source: Workfront “The State of Enterprise Work” (2014)
30% Office workers’ time spent in meetings or email
Cisco collaboration solutions Integrated with iOS
iOS dramatically better on Cisco networks
Enterprise voice integration with iPhone
Seamless collaboration for mobile workers
Cisco Confidential 86 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
Thank You and Next Steps
Brian Avery [email protected]
Contact Your Cisco Partner https://tools.cisco.com/WWChannels/LOCATR/performBasicSearch.do
www.
Learn more about Cisco For BYOD: www.cisco.com/go/byod
Cisco Confidential 87 © 2013-2014 Cisco and/or its affi l iates. All rights reserved.
§ CCE sessions are held weekly on a variety of topics
§ CCE sessions can help you understand the capabilities and business benefits of Cisco technologies
§ Watch replays of past events and register for upcoming events!
Visit http://cs.co/cisco101 for details
Join us again for a future Cisco Customer Education Event
Thank you.