Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses kontoris? (Tomas Muliuolis)

  • Upload
    primend

  • View
    115

  • Download
    0

Embed Size (px)

DESCRIPTION

Nutikasutajad soovivad olla internetti ühendatud igal ajal ja igal pool. Tavaliselt on just ettevõtte juhtkonnas ja müügiosakonnas keskmisest rohkem selliseid kasutajaid. Kuidas ehitada arvutivõrk, mis pakuks nutikasutajatele vajalikku teenust ja oleks seejuures turvaline.

Citation preview

  • 1. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. New type of user Tomas Muliuolis HPN Baltics Country Lead August 28th, 2014
  • 2. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 2 Do you feel demand for?
  • 3. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3 Instant On Behavior
  • 4. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4 Social Change:Information AddictionIndustrial Age Information Age Consumerization At Home At Work
  • 5. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5
  • 6. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 6 On which side of mirror you are...
  • 7. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 7 At home At work IT Manager/IT Operation Manager Anytime, anywhere, always on Pay-Per-Use, no capital bindings (Cloud) and always to the right price Flexibility and agility In control, standardized and transparent Predictability Young spoiled kid behavior is not a person, its a trend and transition in the market that lives in all of us! Instant On Behavior
  • 8. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 8 Changesin the marketcreate paradigmshifts
  • 9. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 9 Markedsndringer og trends
  • 10. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 10 What are the three disrupting influences for Enterprise IT?
  • 11. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 11 Main Value: Enable IT Services Main Value: Enhance Productivity 3 disrupting influences for Enterprise IT Agility Flexibility Cost reduction Connect end-users to services Social & Professional Collaboration Connected Enterprise Mobility + Social Cloud Main Value: Generate Business Value New services Creation Differentiator & value creation Business Control
  • 12. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 12 What is defining next generation access network?
  • 13. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 13 90% Net-new growth in device adoption in next four years represented by smartphones & tablets1 Impact on it staff Over 4.5 billion Personal client devices will be on the network in 20152 Pervasive mobility Approximately 1 Gartner: Gartners Top Predictions for IT Organizations & Users, 2012 & Beyond: Control Slips Away (23 November 2011) 2 IDC: The Empowered IT User: How Individuals Are Using Technology & Redefining IT (March 2012) 3 Gartner: Predicts 2012: Mobile & Wireless Technologies Rise (16 November, 2011) G00227347 The only wire required for employee work spaces will be the power connector3 Access network is changing 1 Wire By 2016 Universal Access Demands New Levels of Connectivity Define your next generation network
  • 14. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 14 Prosumer The new end-user for IT Prosumer The Prosumer uses the platforms and devices they choose in order to access data and applications they feel makes them more productive The Prosumer is always connected, consuming services on their terms
  • 15. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15 BYOD Business Drivers & Initiatives
  • 16. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16 BYOD Business Drivers & Initiatives Example -University Increasing Costs Increased Risk Business Drivers Improve student satisfaction Increase student intake YoY Reduce CapEx Reduce OpEx Initiatives Competition Reduce risk of external threats Technology Drivers
  • 17. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17 Is traditional wireless coverage enough to support new end-user and device proliferation?
  • 18. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 18 WLAN Coverage Traditional WLAN Coverage Density WLAN Coverage +
  • 19. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 19 What are the challenges of supporting this new user type?
  • 20. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 20 Challenges of supporting BYOD Plethora of devices Too many devices, too many operating systems Dropped connections, slow access Security & management Validating & on-boarding legitimate devices Health check & compliance User experience Lack of visibility into user behaviors, access, & usage
  • 21. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21 Top three most wanted BYOD capabilities 0% 20% 40% 60% 80% 100% Other Integration with other EndpointManagement Systems Endpoint Integrity Checking Role-Based Access Rules Flexible Configuration toSupport Different Requirements Configuration Controls Malware Protection Ease of Deployment Logging Monitoring and Reporting Centralized Functionality Centralized functionality Logging, monitoring & reporting Ease of deployment SANS Mobility/BYOD Security Survey March 2012 Capabilities needed for tools
  • 22. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 22 How to prepare the network to support new end-user and device proliferation?
  • 23. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 23 Gain business agility through single pane-of-glass management HP Intelligent Management Center Gain Visibility Increase efficiency Integrate security Reduce OPEX with network transparency Achieve enhanced performance and superior reliability Preserve network integrity with full featured network access control Business-Centric Network Management
  • 24. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 24 Understanding BYOD Administrator Interaction Id like access Who are you? Identity Authentication 1a Behavior Monitoring 3 Ongoing compliance management Authorized User Device Authentication 1b Is your device compliant? Unclean Quarantine Area Authorization 2 Clean Assigned to Virtual App Networks Corporate Network Unclean
  • 25. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 25 Software-Defined Networking (SDN) Unified Wired & Wireless Network & Management Unified BYOD Essentials Complete Unified Bring Your Own Device (BYOD) Solution Simple, Scalable and Secure On-boarding Provisioning Monitoring Management Infrastructure Layer SDN Architecture Control Layer Application Layer Management
  • 26. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 26 How IMC delivers BYOD essentials and more? Identity Authentication Self Registration Device Fingerprinting Security Policy Conformance BYODProcess Behavior Monitoring Unified User Behavior & Device Analysis Live Quarantine Authorization Centralized Functionality Unified user policyenforcement Onboarding Provisioning Monitoring IMC Capabilities Unified Network Support 3rdParty Device Support Ease of Deployment 2 1 3
  • 27. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 27 HP BYOD IMC Solution Flexibility to customize the solution Scalability for future growth Virtual Appliance Solution Easy to deploy solution Simple Onboarding, Provisioning and Monitoring IMC + UAM + Optional modules IMC Smart Connect Custom Solution
  • 28. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 28 Change the rulesof networking
  • 29. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 29 Thank you