This page contains a Flash digital edition of a book.
BUSINESS INTERVIEW


Cisco pushes BYOD button


Cisco is driving for greater awareness around BYOD, mobility and collaboration, according to Chintan Patel, Head of Business Development.


O


ne of the biggest trends to affect organisations of all sizes is the


need for employees to access work-related resources using their mobile devices. The challenges start at the policy level where many companies are still in protecting the network mode. “While some of the hurdles of connecting, securing and managing mobile devices have been solved with recent advances in the Cisco BYOD portfolio, the channel needs to consider the entire series of implications that face end customers,” said Patel.


He categorises these implications into three main areas. Firstly, user experience and utility challenges. “The main challenges would include video, intelligent applications, bandwidth availability and roaming,” said Patel. “Companies that either sponsor or embrace tablets are certainly looking to maximize their RoI from those devices and make employees as productive as possible. The importance of a robust wireless infrastructure is paramount.”


Next, the network needs to provide a strong and secure connection. “Obtaining a secure connection and provisioning the right


access criteria can be one of the biggest challenges IT will have to solve with tablets, particularly when dealing with unmanaged devices,” stated Patel. “The main security challenges would include profiling and posture, policy assignment, off-premise access and threat defence.”


Thirdly, Patel points to the manageability challenges. “Typical IT departments see their resources quickly drained from the increasing needs for device management and troubleshooting,” he said. “In many cases, especially before the BYOD era, those demands could exceed 25 and even 30 per cent of IT budgets. Areas of focus would be troubleshooting, capacity planning and guest access.”


All of this offers channel partners a multitude of opportunities around helping the customer navigate the best path to BYOD, whether it’s the early stages of embracing the idea with consultancy or full blown deployment with infrastructure and technology rollout. “Of utmost importance for a channel provider will be to ensure they are proposing a solution that supports the


multi-vendor environment they have today, but also one that continues to evolve as the market changes,” added Patel. “New platforms and devices are appearing on the market at a staggering rate, so backing the right communications platform and architecture becomes critical and will ensure that the channel provider becomes a trusted partner.”


Raising awareness In its drive to raise awareness around BYOD, mobility and collaboration, one of Cisco’s most recent activities has been around its Jabber announcement. Cisco Jabber enables users to be more productive from anywhere on any device. As a new UC application Cisco Jabber lets users access presence, instant messaging (IM), voice, video, voice messaging, desktop sharing and conferencing across a broad set of devices and operating systems. “Channel partners now have the opportunity to offer solutions that take into account years of customer feedback in terms of features, capabilities and deployment models,” claimed Patel.


The influx of tablets and other unmanaged devices in the enterprise creates a complex set of problems. These problems can’t


Chintan Patel


holistically be addressed without an architectural approach. “Most solutions are primarily point solutions for wireless only and ignore most other challenges,” observed Patel. “We need to think about role-based access for wired, wireless and VPN, while performing device fingerprinting out of band. It also addresses critical security concerns such as what happens when a device is infected with viruses, when the device is lost or stolen and corporate data is compromised, or when the device is upgraded.”


One of the largest


challenges with any BYOD implementation is ensuring protection of corporate data. If a corporate asset such as a laptop is used to access business applications and data, typically that asset is tightly controlled by IT and subject to more restrictive usage policies. “Some industries need to comply with confidentiality regulations like HIPAA, security compliance regulations like PCI, or more general security practice regulations like Sarbanes-


Have you booked your table for the Comms Dealer Sales Awards? Visit www.cdsalesawards.com


54 COMMS DEALER MAY 2011 www.comms-dealer.com


Oxley and others,” said Patel. “Companies need to show compliance is possible with BYOD adoption which can be more challenging than with a corporate-owned and managed device.”


An employee-owned tablet or smartphone is probably being routinely used for personal access and business applications. Cloud-based file sharing and storage services are convenient for personal data but can be potential sources of leakage for confidential corporate data.


“IT must have a strategy for protecting business data on all devices whether corporate managed or employee self- supported and managed,” commented Patel. “This may include a secure business partition on the device that acts as a container of corporate data that can be tightly controlled. It may also include the need for a Virtual Desktop Infrastructure (VDI) application to allow access to sensitive or confidential data without storing the data on the device. Understanding all of these implications will be critical for the channel.” n


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72