More Related Content
Similar to The Path to BYOD in Financial Enterprise (20)
The Path to BYOD in Financial Enterprise
- 1. © 2013 Beyond Mobile Ltd June 6, 2013
ARUBA 2013 PARTNER CONFERENCE
- 2. © 2013 Beyond Mobile Ltd June 6, 2013
INTRODUCTION
2
An
IT
infrastructure
specialist
with
over
20
years
in
the
financial
services
sector.
11
years
with
Credit
Suisse
and
6
with
Chase
(JP
Morgan)
Tough
environment
in
Financial
services
and
deparGng
a
role
as
Director
in
IT
for
Credit
Suisse
to
start
Beyond
Mobile.
Beyond
Mobile
offers
Strategy,
Product
and
Sales
advice
to
companies
who
want
to
sell
into
enterprise
and/or
develop
products
for
this
sector.
- 5. © 2013 Beyond Mobile Ltd June 6, 2013
DeclaraGon
NX
Sovereign
circa
2130s
April
16,
2151
October
30,
2372
52,000
metric
tonnes
998,000
metric
tonnes
3,250,000
metric
tonnes
300
metres
225
metres
685.7
metres
<
Warp
2
Warp
5.2
Warp
9.995
None
Photonic
torpedoes
Phase
cannons
Arrays
Phasers
USS
Enterprise
(XCV
330)
NX01
NCC-‐1701-‐E
5
COMPARISON STAR TREK ENTERPRISE
- 6. © 2013 Beyond Mobile Ltd June 6, 2013
Enterprise
1
(Financial)
Case
Study
(Financial)
Enterprise
3
(consulGng)
COMPARISON OF AN ENTERPRISE
6
120,000
65,000
20,000
143,000
80,000
2,000
28,000
15,000
20,000
170,000
120,000
2,500
Yes
Yes
No
“dirty
network”
“clean
network”
“clean
network”
- 7. © 2013 Beyond Mobile Ltd June 6, 2013
EVIL INTERNET & WIRELESS
7
Wi-Fi BANNED
Custom laptops with Wi-Fi cards
removed
Ethernet ports and drivers locked
down
Remote access restricted to dial up
Almost impossible to be productive
unless in the office
- 8. © 2013 Beyond Mobile Ltd June 6, 2013
EVOLUTION NOT REVOLUTION
8
- 9. © 2013 Beyond Mobile Ltd June 6, 2013
NETWORK STRATEGY
9
DEPERIMITISATION
PROTECT
THE
DATA
- 10. © 2013 Beyond Mobile Ltd June 6, 2013
2007 – 1ST GEN WI-FI
10
CISO concedes some Wi-Fi allowed
“Managed” endpoints only
Guest internet access allowed
No employee personal devices allowed
User experience not considered
Wi-Fi Design poor
Global inconsistency
- 11. © 2013 Beyond Mobile Ltd June 6, 2013
2009 CHALLENGERS
11
“Why can’t I use the corporate
Wi-Fi to sync my work email”
“Cellular coverage is so bad in my
building and it’s crazy employee’s
cant use the Corporate Wi-Fi on
their personal devices”
Crumbling of IT Walled gardens
- 12. © 2013 Beyond Mobile Ltd June 6, 2013
2011 THE GAME CHANGED
12
Real estate smart strategies
Wi-Fi shifted to a core “enabling” technology
and business enabler.
BYOD strategy was built demanding better
services
CIO – build it quick but I wouldn’t start from
there, if I was you
- 13. © 2013 Beyond Mobile Ltd June 6, 2013
THE BEGINNING OR THE END?
13
Requirements
Stakeholder Management
Buy as a Service vs Build
Service Requirements
Lesson’s learnt
- 14. © 2013 Beyond Mobile Ltd June 6, 2013
REQUIREMENTS
14
Guest Standard Employee Complex Employee
Performance
Medium
Medium
High
Personal
or
Corp
Personal
Mixed
Corporate
BYOD
Yes
Yes
Yes
&
Corporate
Security
None
MAM
MDM
&
MAM
Filtered
No
Yes
Yes
- 15. © 2013 Beyond Mobile Ltd June 6, 2013
STAKEHOLDER MANAGEMENT
15
Clean
vs.
dirty
wireless
=
same
On
campus
=
enterprise
policed
Keep
out
of
trouble
with
the
regulator
Employee
traffic
content
filtered
Info
Sec,
HR/Legal
- 16. © 2013 Beyond Mobile Ltd June 6, 2013
STAKEHOLDER MANAGEMENT
16
Apply
IT
policy
Same
quality
as
LAN
Wi-‐Fi
as
a
commodity
Protect
data
vs.
network
BYOD
Don’t
compromise
usability
for
security
Container
(s)
vs
MAM
- 17. © 2013 Beyond Mobile Ltd June 6, 2013
BUY VS BUILD
Corporate
IT
in
Financial
Services
idenGty
crisis
Buy
as
a
service
a
preference
RFP
processes
Market
not
Mature,
surely
an
opportunity
for
partners
One
Vendor
stood
out
in
access
control
and
provisioning
=
One
partner
stood
out
in
experience
&
engagement
=
Aruba
Vanix
- 18. © 2013 Beyond Mobile Ltd June 6, 2013
Wi-‐Fi
1st
Gen
Wi-‐Fi
2nd
Gen
Wi-‐Fi
FUTURE
SERVICE REQUIREMENTS
18
802.11a/b/g
802.11
n
to
ac
802.11ac
Data
Data
/
Voice
Data
/
Voice
/
Video
Manual
Online
registraGon
&
Sponsor
approval
Federated
B2B
Build
Build
&
Buy
Buy
None
non-‐criGcal
service
severity
4
SLA
Clearpass
CPPM
6.x
Aruba
end
to
end
ParGally
supported
Cisco
BBSM
4.x
CriGcal
service
LAN
replacement
- 19. © 2013 Beyond Mobile Ltd June 6, 2013
LESSONS LEARNT
TesGng
• BYOD
footprint
for
tesGng
can
be
never
ending
• Amount
&
complexity
of
devices
leads
to
issues
with
tools
for
troubleshooGng
Support
• Specialists
too
thin
on
ground
• Mobility
support
is
a
specialist
skillset
• OpportuniGes
for
companies
&
partners
• Certainty
to
support
costs
Process
engineering
important
Credit'Suisse'Employee
Aruba
Clearpass
Cloud'Service
Access'Point
Intranet'Controller
DMZ'Controller
BYOD
SSID
Guest'&'
Provisioning
SSID
Internet
Bluecoat'DMZ
Proxy
1
2
5
7
8
9
6
10
CS'BYOD'Device
CS'Desktop
4
3
- 20. © 2013 Beyond Mobile Ltd June 6, 2013
YOUR PATH TO BYOD IN FINANCIALS
20
ObjecGves
•
Have
clear
business
objecGves
&
Conduct
senior
stakeholders
briefings.
•
Mature
requirements
&
early
engagement
necessary
with
IT
suppliers
•
What
are
your
security
policy
objecGves
• Think
about
process
&
support
design
as
well
as
the
technology
• Translate
the
risk
posture
to
security
controls
• Don’t
compromise
usability
for
security
(impact
of
security
discussions)
• Select
technology
planorms
and
suppliers
• Build
in
compliance
from
the
beginning
• Test,
Test
and
test
some
more
And finally …. Celebrate a success !
Design
Partner
Execute
• Will
the
enterprise
buy
“as
a
service”
• Are
there
opportuniGes
to
create
Managed
services
(hosted
or
mobility
support)
• Shioing
CIO’s
cost
from
fixed
-‐>
Mobile
(not
cost
increases!)