Nutikasutajad soovivad olla internetti ühendatud igal ajal ja igal pool. Tavaliselt on just ettevõtte juhtkonnas ja müügiosakonnas keskmisest rohkem selliseid kasutajaid. Kuidas ehitada arvutivõrk, mis pakuks nutikasutajatele vajalikku teenust ja oleks seejuures turvaline.
Citation preview
1. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice.
New type of user Tomas Muliuolis HPN Baltics Country Lead August
28th, 2014
2. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 2
Do you feel demand for?
3. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 3
Instant On Behavior
4. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 4
Social Change:Information AddictionIndustrial Age Information Age
Consumerization At Home At Work
5. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice.
5
6. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 6
On which side of mirror you are...
7. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 7
At home At work IT Manager/IT Operation Manager Anytime, anywhere,
always on Pay-Per-Use, no capital bindings (Cloud) and always to
the right price Flexibility and agility In control, standardized
and transparent Predictability Young spoiled kid behavior is not a
person, its a trend and transition in the market that lives in all
of us! Instant On Behavior
8. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 8
Changesin the marketcreate paradigmshifts
9. Copyright 2012 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice. 9
Markedsndringer og trends
10. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 10 What are the three disrupting influences for Enterprise
IT?
11. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 11 Main Value: Enable IT Services Main Value: Enhance
Productivity 3 disrupting influences for Enterprise IT Agility
Flexibility Cost reduction Connect end-users to services Social
& Professional Collaboration Connected Enterprise Mobility +
Social Cloud Main Value: Generate Business Value New services
Creation Differentiator & value creation Business Control
12. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 12 What is defining next generation access network?
13. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 13 90% Net-new growth in device adoption in next four years
represented by smartphones & tablets1 Impact on it staff Over
4.5 billion Personal client devices will be on the network in 20152
Pervasive mobility Approximately 1 Gartner: Gartners Top
Predictions for IT Organizations & Users, 2012 & Beyond:
Control Slips Away (23 November 2011) 2 IDC: The Empowered IT User:
How Individuals Are Using Technology & Redefining IT (March
2012) 3 Gartner: Predicts 2012: Mobile & Wireless Technologies
Rise (16 November, 2011) G00227347 The only wire required for
employee work spaces will be the power connector3 Access network is
changing 1 Wire By 2016 Universal Access Demands New Levels of
Connectivity Define your next generation network
14. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 14 Prosumer The new end-user for IT Prosumer The Prosumer
uses the platforms and devices they choose in order to access data
and applications they feel makes them more productive The Prosumer
is always connected, consuming services on their terms
15. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 15 BYOD Business Drivers & Initiatives
16. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 16 BYOD Business Drivers & Initiatives Example
-University Increasing Costs Increased Risk Business Drivers
Improve student satisfaction Increase student intake YoY Reduce
CapEx Reduce OpEx Initiatives Competition Reduce risk of external
threats Technology Drivers
17. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 17 Is traditional wireless coverage enough to support new
end-user and device proliferation?
18. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 18 WLAN Coverage Traditional WLAN Coverage Density WLAN
Coverage +
19. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 19 What are the challenges of supporting this new user
type?
20. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 20 Challenges of supporting BYOD Plethora of devices Too
many devices, too many operating systems Dropped connections, slow
access Security & management Validating & on-boarding
legitimate devices Health check & compliance User experience
Lack of visibility into user behaviors, access, & usage
21. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 21 Top three most wanted BYOD capabilities 0% 20% 40% 60%
80% 100% Other Integration with other EndpointManagement Systems
Endpoint Integrity Checking Role-Based Access Rules Flexible
Configuration toSupport Different Requirements Configuration
Controls Malware Protection Ease of Deployment Logging Monitoring
and Reporting Centralized Functionality Centralized functionality
Logging, monitoring & reporting Ease of deployment SANS
Mobility/BYOD Security Survey March 2012 Capabilities needed for
tools
22. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 22 How to prepare the network to support new end-user and
device proliferation?
23. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 23 Gain business agility through single pane-of-glass
management HP Intelligent Management Center Gain Visibility
Increase efficiency Integrate security Reduce OPEX with network
transparency Achieve enhanced performance and superior reliability
Preserve network integrity with full featured network access
control Business-Centric Network Management
24. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 24 Understanding BYOD Administrator Interaction Id like
access Who are you? Identity Authentication 1a Behavior Monitoring
3 Ongoing compliance management Authorized User Device
Authentication 1b Is your device compliant? Unclean Quarantine Area
Authorization 2 Clean Assigned to Virtual App Networks Corporate
Network Unclean
25. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 25 Software-Defined Networking (SDN) Unified Wired &
Wireless Network & Management Unified BYOD Essentials Complete
Unified Bring Your Own Device (BYOD) Solution Simple, Scalable and
Secure On-boarding Provisioning Monitoring Management
Infrastructure Layer SDN Architecture Control Layer Application
Layer Management
26. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 26 How IMC delivers BYOD essentials and more? Identity
Authentication Self Registration Device Fingerprinting Security
Policy Conformance BYODProcess Behavior Monitoring Unified User
Behavior & Device Analysis Live Quarantine Authorization
Centralized Functionality Unified user policyenforcement Onboarding
Provisioning Monitoring IMC Capabilities Unified Network Support
3rdParty Device Support Ease of Deployment 2 1 3
27. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 27 HP BYOD IMC Solution Flexibility to customize the
solution Scalability for future growth Virtual Appliance Solution
Easy to deploy solution Simple Onboarding, Provisioning and
Monitoring IMC + UAM + Optional modules IMC Smart Connect Custom
Solution
28. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 28 Change the rulesof networking
29. Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without
notice. 29 Thank you