Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Size: px
Start display at page:

Download "Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE"

Transcription

1 Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Bhumik Patel Solutions Architect, Citrix Systems May 21 st 2013

2 App Complete Enterprise Mobility Business Apps Productivity and Collaboration App Secure Mail Data Device

3 Today: The Industry s Most Comprehensive, Best of Suite Mobile Portfolio Any app, any device, anywhere Mobile Value-on-Investment Mobile Device Sandboxed Mail and Web Mobile App Security Mobile Data Control Mobile Network Control SSO & Identity Desktop & App Virtualization Social & Web Collaboration

4 1 Secure and manage my devices My users are bringing in all types of devices I need to set PIN codes, WiFi, etc.. issuing shared tablets to shift workers in hospital/retail stores/restaurants/dist centers need to manage personal and corporate devices alongside each other Want to give device choice but what do I do if devices are lost or stolen? 2013 MDM Citrix Confidential Edition Do Not Distribute

5 1 Secure and manage my devices MDM Edition 2013 Citrix Confidential Do Not Distribute Enterprise-grade MDM: Manage & configure corporate and BYO devices Detect jailbreak, blacklist/whitelist apps Full/selective device wipe Easy to setup: Fully wizard-driven Extensible: Enterprise integration (e.g.: LDAP and PKI) Integration with Network Policy Engines

6 Cisco Validated Design Scope BYOD Smart Solution Built on Unified Access Foundation BYOD Smart Solution Workspace Productivity Apps Workspace Webex MDM Jabber Other Smart Solutions (ex. VXI) Secure Mobility Firewall AnyConnect Unified Access Policy Core Infrastructure Switching ISE Wireless Prime Mgmt One Network, One Policy, One 2013 Citrix Confidential Do Not Distribute

7 ISE Policy TIME Policy USER LOCATION DEVICE Access Method Centralized Policy Engine HTTP DNS Profiling DHCP RADIUS NETFLOW SNMP Corporate VLAN 10 VLAN 20 Corporate Resources Employee Personal Single SSID Corporate Issued Device 1. User Authentication and Authorization 2. Profiling to identify device 3. Policy decision 4. Policy enforce to VLAN 10 on same SSID 5. Full access granted 6. Full device visibility Wireless LAN Controller Unified Access Restricted Internet Only PERSONAL Device 1. User Authentication and Authorization 2. Profiling to identify device 3. Policy decision 4. Policy enforce to VLAN 10 or 20 on same SSID 5. Full or Restricted access granted 6. Full device visibility 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

8 XenMobile MDM with Cisco ISE ISE Mgr 1 Device tries to access network ISE ISE checks device Registration with MDM ISE checks device status 4 2 MDM returns device status 3 MDM returns registration status Mgt Interface 5 XenMobile MDM Push AnyConnect Certificate 2013 Citrix Confidential Do Not Distribute

9 Cisco ISE + XenMobile MDM = Mobility Control Classification/ Profiling NETWORK CONTROL (ISE) Compliance Enforcement Mobile + PC Secure Network Access (Wireless, Wired, VPN) User Managed Device Network-Based IT Control Context-Aware Access Control (Role, Location, etc.) Registration Cert + Supplicant Provisioning Inventory FULL MOBILITY MANAGEMENT (MDM) Enterprise Software Distribution (Backup, Remote Wipe, etc.) Policy Compliance Detection (Jailbreak, Pin Lock, etc.) Secure Data Containers User/IT Co-Managed Device Device and Network-Based IT Control 2013 Citrix Confidential Do Not Distribute

10 Key Takeaways Leverage joint BYOD solutions from Cisco and Citrix to enable your enterprise mobility needs. Solution Details ᵒ XenMobile MDM integration with Cisco ISE is supported with Cisco ISE 1.2 and XenMobile MDM 7.1 versions. ᵒ Next Cisco BYOD CVD will provide tested implementation details on the joint solution. More information ᵒ SYN6309: Best Practices for deploying end-to-end enterprise mobility management AM 2013 Citrix Confidential Do Not Distribute

11 Work better. Live better.

The Context Aware Network A Holistic Approach to BYOD

The Context Aware Network A Holistic Approach to BYOD The Context Aware Network A Holistic Approach to BYOD Trends Bring Your Own Device BYOD at Cisco Cisco BYOD Solution Use Cases Summary Trends #CiscoPlusCA Demand for Mobility 15 billion new networked mobile

More information

2012 Cisco and/or its affiliates. All rights reserved. 1

2012 Cisco and/or its affiliates. All rights reserved. 1 2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access

More information

BYOD Business year of decision!

BYOD Business year of decision! Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

Managing Windows 8.1 Devices with XenMobile

Managing Windows 8.1 Devices with XenMobile Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

Beyond BYOD Mobility, Cloud and the Internet of Everything

Beyond BYOD Mobility, Cloud and the Internet of Everything Beyond BYOD Mobility, Cloud and the Internet of Everything COCCOC-2002 Donald Gunn, Program Manager Cisco IT Agenda Changing Environment Devices Security Support Cloud & Apps Questions COCCOC-2002 2015

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

CertKiller q

CertKiller q CertKiller.500-451.28q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 5.3 500-451 Cisco Unified Access Systems Engineer Exam I just passed today with 89%. My sole focus was the VCE.

More information

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 ONE POLICY Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 Agenda Secure Unified Access with ISE Role-Based Access Control Profiling TrustSec Demonstration How ISE is Used Today

More information

The Cisco BYOD Smart Solution

The Cisco BYOD Smart Solution 1 Security, Flexibility, and Performance for Any Workspace 2 Today, organizations have various devices on their networks. To manage the proliferation of personal devices, bring your own device (BYOD) policies

More information

2013 InterWorks, Page 1

2013 InterWorks, Page 1 2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations

More information

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test. Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?

More information

ClearPass Design Scenarios

ClearPass Design Scenarios ClearPass Design Scenarios Austin Hawthorne Feb 26, 2015 Agenda 1. Better user experience and tighter security, is that possible? 2. Employees on Guest Network 3. The headless device dilemma 2 CONFIDENTIAL

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

Integrating Cisco Identity Services Engine with NotifyMDM

Integrating Cisco Identity Services Engine with NotifyMDM Integrating Cisco Identity Services Engine with NotifyMDM NotifyMDM Version 3.x Overview 1 Table of Contents Overview 3 Deployment Models 4 Getting NotifyMDM Ready for ISE 5 Grant ISE Access to the NotifyMDM

More information

Cisco Hosted Collaboration Solution (HCS) and Cisco Collaboration Cloud

Cisco Hosted Collaboration Solution (HCS) and Cisco Collaboration Cloud Cisco Hosted Collaboration Solution (HCS) and Cisco Collaboration Cloud Tony Reyes Technical Solutions Architect Chuck Millet - Technical Solutions Architect PSOCOL-1020 Agenda Cisco Hosted Collaboration

More information

Designing Workspace of the Future for the Mobile Worker

Designing Workspace of the Future for the Mobile Worker Designing Workspace of the Future for the Mobile Worker Paulo Jorge Correia Technical Solutions Architect Building Business Value Enable mobile workers and BYOD Locate and access remote experts Collaborate

More information

EM L01 Introduction to Mobile

EM L01 Introduction to Mobile EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions

More information

Citrix SSO for Mac OS X. User Guide

Citrix SSO for Mac OS X. User Guide Citrix SSO for Mac OS X User Guide Contents OVERVIEW... 3 FEATURE COMPARISON BETWEEN CITRIX VPN AND CITRIX SSO... 4 COMPATIBILITY WITH MDM PRODUCTS... 5 CONFIGURE AN MDM MANAGED VPN PROFILE FOR CITRIX

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency Cisco Virtual Experience Infrastructure for Government Virtualize Your Desktop and Increase Agency Efficiency County Enhances Municipal Services Muskegon County offers a wide range of diverse programs

More information

Identity Based Network Access

Identity Based Network Access Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco

More information

Secure Access - Update

Secure Access - Update Secure Access - Update for people, devices, things and services Jonas Gyllenhammar Senior Consultant Engineer - Specialist The New Reality All Major OSs One Client On-the-go Home network Untrusted LAN

More information

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 3 Cisco ISE Policy Service Node Ports, page 4 Cisco ISE pxgrid Service Ports, page 8 OCSP

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

BIG IDEAS FOR SmAll BuSInESS:

BIG IDEAS FOR SmAll BuSInESS: BIG IDEAS FOR SmAll BuSInESS: powering productivity With Byod Letting BYOD go unchecked can leave your business at risk. But supporting workers with mobile devices can have great benefits, starting with

More information

P ART 2. BYOD Design Overview

P ART 2. BYOD Design Overview P ART 2 BYOD Design Overview CHAPTER 2 Summary of Design Overview Revised: August 7, 2013 This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment

More information

Secure Network Access for Personal Mobile Devices

Secure Network Access for Personal Mobile Devices White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Cisco Identity Services Engine (ISE) Mentored Install - Pilot

Cisco Identity Services Engine (ISE) Mentored Install - Pilot Cisco Identity Services Engine (ISE) Mentored Install - Pilot Skyline Advanced Technology Services (ATS) offers Professional Services for a variety of Cisco-centric solutions. From inception to realization,

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 648-385 Exam Questions & Answers Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 34.4 http://www.gratisexam.com/ Cisco 648-385 Exam Questions & Answers Exam Name: CXFF - Cisco

More information

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco AnyConnect as a Service György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline

More information

NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES. Tim McCarthy

NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES. Tim McCarthy NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES Tim McCarthy MAJOR MARKET TRENDS DATA MOBILITY AND SCALE AT AN ALL TIME HIGH AND GROWING Sophisticati on (Maturity) Device Proliferation

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express

More information

Visibility, control and response

Visibility, control and response Visibility, control and response Protecting Clients and Unifying Policy Tomas Muliuolis Baltics Lead September 2018 Today s Escalating Customer Challenges Advanced attacks and unforeseen threats continue

More information

Cisco TrustSec How-To Guide: Central Web Authentication

Cisco TrustSec How-To Guide: Central Web Authentication Cisco TrustSec How-To Guide: Central Web Authentication For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 1

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Bring Your Own Device. Peter Silva Technical Marketing Manager

Bring Your Own Device. Peter Silva Technical Marketing Manager Bring Your Own Device Peter Silva Technical Marketing Manager Bring-Your-Own-Device (BYOD) Personal devices for business apps Why implement BYOD? Increase employee satisfaction, productivity Reduce mobile

More information

WLAN Security Preparing For BYOD and IoT

WLAN Security Preparing For BYOD and IoT Next Presentation Begins at 13:00 WLAN Security Preparing For BYOD and IoT Mathew Edwards, Product Marketing Manager & Gregor Vucajnk, Global Training Manager Your Past and possibly present ANYTIME ANYWHERE

More information

Cisco and Citrix for Productive and Secure Enterprise Mobility

Cisco and Citrix for Productive and Secure Enterprise Mobility Cisco and Citrix for Productive and Secure Enterprise Mobility 2 Contents Introduction...3 Mobile Infrastructure Opportunities and Challenges...4 A Compelling Productivity Imperative...4 New Challenges

More information

Purchase Intentions Spring 2013 EMEA

Purchase Intentions Spring 2013 EMEA Consumerization of IT and BYOD Plans Purchase Intentions Spring 2013 EMEA 1 Key Takeaways: Primary drivers of BYOD: - To make workers more productive - To make worker collaboration better - Pressure from

More information

Five Tips to Mastering Enterprise Mobility

Five Tips to Mastering Enterprise Mobility Five Tips to Mastering Enterprise Mobility Table of Contents Introduction Tip 1: Assess Your Environment Tip 2: Review Security Protocols Tip 3: Be Smart About BYOD Tip 4: Consider Customized Mobility

More information

Network Access Control

Network Access Control Network Access Control It is about saying YES! to BYOD but staying on control Jan Michael de Kok Sales Engineering Manager Caribbean & Central America Realities of Smart Devices, Like It Or Not A new device

More information

Cisco Unified Data Center Strategy

Cisco Unified Data Center Strategy Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Cisco Unified Access Roadshow

Cisco Unified Access Roadshow Cisco Unified Access Roadshow Osama Rasoul Sales Manager, Network Architectures CCIE R&S # 10165 osrasoul@cisco.com 2012 Cisco and/or its affiliates. All rights reserved. Cisco Unified Access System Introduction

More information

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Maximize your investment in Microsoft Office 365 with Citrix Workspace White Paper Maximize your investment in Microsoft Office 365 with Citrix Workspace Maximize your investment in Microsoft Office 365 with Citrix Workspace Accelerate migration, simplify maintenance, and

More information

Cisco VXI Smart Solution with VMware View

Cisco VXI Smart Solution with VMware View Cisco VXI Smart Solution with VMware View What You Will Learn IT departments are inundated with user demands for wider mobile access, video and interactive multimedia services, new devices, and more flexible

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

What Is Wireless Setup

What Is Wireless Setup What Is Wireless Setup Wireless Setup provides an easy way to set up wireless flows for 802.1x, guest, and BYOD. It also provides workflows to configure and customize each portal for guest and BYOD, where

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

Cisco.Realtests v by.TAMMY.29q. Exam Code: Exam Name: CXFF - Cisco Express Foundation for Field Engineers

Cisco.Realtests v by.TAMMY.29q. Exam Code: Exam Name: CXFF - Cisco Express Foundation for Field Engineers Cisco.Realtests.648-385.v2014-07-08.by.TAMMY.29q Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: 648-385 Exam Name: CXFF - Cisco Express

More information

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc.

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc. VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc. Trends and Technologies Inc. Gold Partner - Cisco Enterprise

More information

Move beyond BYOD to Mobile Workspace with Cisco and Citrix

Move beyond BYOD to Mobile Workspace with Cisco and Citrix Move beyond BYOD to Mobile Workspace with Cisco and Citrix Delivering the Complete Mobile Experience Jonathan Gilad Solutions Manager, Enterprise Mobility Cisco Todd Terbeek Sr. Director, Strategic Alliances

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

Secure wired and wireless networks with smart access control

Secure wired and wireless networks with smart access control Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly

More information

Guest Access User Interface Reference

Guest Access User Interface Reference Guest Portal Settings, page 1 Sponsor Portal Application Settings, page 17 Global Settings, page 24 Guest Portal Settings Portal Identification Settings The navigation path for these settings is Work Centers

More information

Cisco Borderless Networks Value Proposition

Cisco Borderless Networks Value Proposition Cisco Borderless Networks Value Proposition Enabling the Borderless Organization 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Why Borderless Networks? Cisco s Architectural Approach

More information

DumpsFree. DumpsFree provide high-quality Dumps VCE & dumps demo free download

DumpsFree.   DumpsFree provide high-quality Dumps VCE & dumps demo free download DumpsFree http://www.dumpsfree.com DumpsFree provide high-quality Dumps VCE & dumps demo free download Exam : 300-208 Title : Implementing Cisco Secure Access Solutions Vendor : Cisco Version : DEMO Get

More information

Mobile Device policy Frequently Asked Questions April 2016

Mobile Device policy Frequently Asked Questions April 2016 Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration

More information

ShareFile Technical Presentation

ShareFile Technical Presentation ShareFile Technical Presentation Joerg Vosse Senior Systems Engineer - Citrix ShareFile CEE joerg.vosse@citrix.com ShareFile Enterprise Architecture Overview ShareFile Document Cloud ShareFile.com ShareFile.eu

More information

Cisco Secure Access Control

Cisco Secure Access Control Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security

More information

Citrix XenMobile and Windows 10

Citrix XenMobile and Windows 10 White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access

More information

Peter Sakala Systems Engineer Cisco Systems Slovakia

Peter Sakala Systems Engineer Cisco Systems Slovakia Peter Sakala Systems Engineer sapeter@cisco.com Cisco Systems Slovakia Desktop Virtualization Suite of Technologies Desktop Streaming Application Virtualization Terminal Services VDI Virtual Desktop Infrastructure

More information

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS Table of Contents Executive Summary VMware Reference Architectures Audience Reference Architecture Design Methodology

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013 Beyond Your Device Control, Connect, Experience BT GS Analyst and consultant call 2 July 2013 Agenda Welcome & situation in the market Neil Sutton, Vice President Portfolio Our solution Connect Jayne Smith,

More information

Implementing Cisco Edge Network Security Solutions ( )

Implementing Cisco Edge Network Security Solutions ( ) Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to

More information

Mobility First How Tomorrow Moves for Education

Mobility First How Tomorrow Moves for Education Mobility First How Tomorrow Moves for Education Presented by: Sponsored by: CONFIDENTIAL Copyright 2016. Aruba Networks, an HP Company. All rights reserved GENMOBILE IS AT THE HEART OF OUR TECHNOLOGY STRATEGY

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and  Management SharePoint 2013 and Colligo Apps Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Email Management SharePoint 2013 is the latest release of Microsoft s leading business collaboration

More information

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R

More information

For Sales Kathy Hall

For Sales Kathy Hall IT4E Schedule 13939 Gold Circle Omaha NE 68144 402-431-5432 Course Number Course Name Course Description For Sales Chris Reynolds 402-963-4465 creynolds@it4e.com www.it4e.com SISE v1.1 SKY For Sales Kathy

More information

Systems Manager. Endpoint Management

Systems Manager. Endpoint Management Datasheet Systems Manager Systems Manager Endpoint Management Overview As Cisco s endpoint management solution, Cisco Meraki Systems Manager supports a variety of platforms allowing for the diverse ecosystem

More information

AirWatch for Android Devices for AirWatch InBox

AirWatch for Android Devices for AirWatch InBox Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Citrix is the Cloud Computing company that Enables Mobile Workstyles

Citrix is the Cloud Computing company that Enables Mobile Workstyles Citrix is the Cloud Computing company that Enables Mobile Workstyles BYO Devices Multiple Locations App Proliferation Unmanaged Data 3 Devices 65% Employees 200+ Apps 80%+ Fortune 500 Average per Employee

More information

CENTRAL AUTHENTICATION USING RADIUS AND 802.1X

CENTRAL AUTHENTICATION USING RADIUS AND 802.1X CENTRAL AUTHENTICATION USING RADIUS AND 802.1X This is part of my experience I implemented in the Organization while I was doing my summer interns as the Part of my Curriculum. This Entirely is a very

More information

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved.

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved. Next Generation Infrastructure Outsourcing 1 Digital Vision for the future 2 Focus Shifts to developing solutions that connect technology, businesses and customers through innovative platforms Connected

More information

Cisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant

Cisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant Cisco AnyConnect Secure Mobility Solution György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security Deployment Methods Live Q&A 2011 Cisco and/or its affiliates.

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

CounterACT Afaria MDM Plugin

CounterACT Afaria MDM Plugin Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...

More information

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies Daniel Yeung Technical Manager, Hong Kong & Taiwan AUG 2017 2017 Citrix Why Worry? Security needs to be top-of-mind

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Support Device Access

Support Device Access Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 8 Device Portals Configuration Tasks, on page

More information

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information