SlideShare a Scribd company logo
1 of 21
© 2013 Beyond Mobile Ltd June 6, 2013
ARUBA 2013 PARTNER CONFERENCE
© 2013 Beyond Mobile Ltd June 6, 2013
INTRODUCTION
2
An	
  IT	
  infrastructure	
  specialist	
  with	
  over	
  20	
  years	
  in	
  the	
  
financial	
  services	
  sector.	
  	
  
	
  
11	
  years	
  with	
  Credit	
  Suisse	
  and	
  6	
  with	
  Chase	
  (JP	
  Morgan)	
  
	
  
Tough	
  environment	
  in	
  Financial	
  services	
  and	
  deparGng	
  a	
  
role	
  as	
  Director	
  in	
  IT	
  for	
  Credit	
  Suisse	
  to	
  start	
  Beyond	
  
Mobile.	
  
	
  
Beyond	
  Mobile	
  offers	
  Strategy,	
  Product	
  and	
  Sales	
  advice	
  to	
  
companies	
  who	
  want	
  to	
  sell	
  into	
  enterprise	
  and/or	
  develop	
  
products	
  for	
  this	
  sector.	
  
© 2013 Beyond Mobile Ltd June 6, 2013 3
WHAT IS AN ENTERPRISE
© 2013 Beyond Mobile Ltd June 6, 2013 4
ALL THE SAME RIGHT !
© 2013 Beyond Mobile Ltd June 6, 2013
DeclaraGon	
   NX	
   Sovereign	
  
circa	
  2130s	
   April	
  16,	
  2151	
   October	
  30,	
  2372	
  
52,000	
  metric	
  tonnes	
   998,000	
  metric	
  tonnes	
   3,250,000	
  metric	
  tonnes	
  
300	
  metres	
   225	
  metres	
   685.7	
  metres 	
  	
  
	
  
	
  <	
  Warp	
  2	
   Warp	
  5.2	
   Warp	
  9.995	
  
None	
   Photonic	
  torpedoes	
  
Phase	
  cannons	
  
Arrays	
  Phasers	
  
USS	
  Enterprise	
  	
  
(XCV	
  330)	
  
NX01	
   NCC-­‐1701-­‐E	
  
5
COMPARISON STAR TREK ENTERPRISE
© 2013 Beyond Mobile Ltd June 6, 2013
Enterprise	
  1	
  
(Financial) 	
  	
  
Case	
  Study	
  
(Financial)	
  
Enterprise	
  3	
  
(consulGng)	
  
COMPARISON OF AN ENTERPRISE
6
120,000	
   65,000	
   20,000	
  
143,000	
   80,000	
   2,000	
  
28,000	
   15,000	
   20,000	
  
170,000	
   120,000	
   2,500	
  
Yes	
   Yes	
   No	
  
“dirty	
  network”	
  “clean	
  network”	
   “clean	
  network”	
  
© 2013 Beyond Mobile Ltd June 6, 2013
EVIL INTERNET & WIRELESS
7
Wi-Fi BANNED
Custom laptops with Wi-Fi cards
removed
Ethernet ports and drivers locked
down
Remote access restricted to dial up
Almost impossible to be productive
unless in the office	
  
© 2013 Beyond Mobile Ltd June 6, 2013
EVOLUTION NOT REVOLUTION
8
© 2013 Beyond Mobile Ltd June 6, 2013
NETWORK STRATEGY
9
DEPERIMITISATION	
  
PROTECT	
  THE	
  DATA	
  
© 2013 Beyond Mobile Ltd June 6, 2013
2007 – 1ST GEN WI-FI
10
CISO concedes some Wi-Fi allowed
“Managed” endpoints only
Guest internet access allowed
No employee personal devices allowed
User experience not considered
Wi-Fi Design poor
Global inconsistency	
  
© 2013 Beyond Mobile Ltd June 6, 2013
2009 CHALLENGERS
11
“Why can’t I use the corporate
Wi-Fi to sync my work email”
“Cellular coverage is so bad in my
building and it’s crazy employee’s
cant use the Corporate Wi-Fi on
their personal devices”
Crumbling of IT Walled gardens
© 2013 Beyond Mobile Ltd June 6, 2013
2011 THE GAME CHANGED
12
Real estate smart strategies
Wi-Fi shifted to a core “enabling” technology
and business enabler.
BYOD strategy was built demanding better
services
CIO – build it quick but I wouldn’t start from
there, if I was you
© 2013 Beyond Mobile Ltd June 6, 2013
THE BEGINNING OR THE END?
13
Requirements
Stakeholder Management
Buy as a Service vs Build
Service Requirements
Lesson’s learnt
© 2013 Beyond Mobile Ltd June 6, 2013
REQUIREMENTS
14
Guest Standard Employee Complex Employee
Performance	
   Medium	
   Medium	
   High	
  
Personal	
  or	
  Corp	
   Personal	
   Mixed	
   Corporate	
  
BYOD	
   Yes	
   Yes	
   Yes	
  	
  &	
  Corporate	
  
Security	
   None	
   MAM	
   MDM	
  &	
  MAM	
  
Filtered	
   No	
   Yes	
   Yes	
  
© 2013 Beyond Mobile Ltd June 6, 2013
STAKEHOLDER MANAGEMENT
15
Clean	
  vs.	
  dirty	
  wireless	
  =	
  same	
  
On	
  campus	
  =	
  enterprise	
  policed	
  
Keep	
  out	
  of	
  trouble	
  with	
  	
  the	
  
regulator	
  
Employee	
  traffic	
  content	
  filtered	
  
Info	
  Sec,	
  HR/Legal	
  
© 2013 Beyond Mobile Ltd June 6, 2013
STAKEHOLDER MANAGEMENT
16
Apply	
  IT	
  policy	
  
Same	
  quality	
  as	
  LAN	
  
Wi-­‐Fi	
  as	
  a	
  commodity	
  
Protect	
  data	
  vs.	
  network	
  
BYOD	
  Don’t	
  compromise	
  usability	
  for	
  security	
  
Container	
  (s)	
  vs	
  	
  MAM	
  
© 2013 Beyond Mobile Ltd June 6, 2013
BUY VS BUILD
Corporate	
  IT	
  in	
  Financial	
  Services	
  idenGty	
  crisis	
  
Buy	
  as	
  a	
  service	
  a	
  preference	
  
RFP	
  processes	
  
Market	
  not	
  Mature,	
  	
  surely	
  an	
  opportunity	
  for	
  
partners	
  
One	
  Vendor	
  stood	
  out	
  in	
  access	
  control	
  and	
  
provisioning	
  =	
  
One	
  partner	
  stood	
  out	
  in	
  experience	
  &	
  engagement	
  
=	
  
Aruba	
  
Vanix	
  
© 2013 Beyond Mobile Ltd June 6, 2013
Wi-­‐Fi	
  1st	
  Gen 	
  	
   Wi-­‐Fi	
  2nd	
  Gen	
   Wi-­‐Fi	
  FUTURE	
  
SERVICE REQUIREMENTS
18
802.11a/b/g	
   802.11	
  n	
  to	
  ac	
   802.11ac	
  
Data	
   Data	
  /	
  Voice	
   Data	
  /	
  Voice	
  /	
  Video	
  
Manual	
   Online	
  registraGon	
  &	
  
Sponsor	
  approval	
  
Federated	
  B2B	
  
Build	
   Build	
  &	
  Buy	
   Buy	
  
None	
   non-­‐criGcal	
  service	
  
severity	
  4	
  SLA	
  	
  
Clearpass	
  CPPM	
  6.x	
   Aruba	
  end	
  to	
  end	
  
ParGally	
  supported	
  	
  	
  	
  	
  	
  	
  	
  	
  
Cisco	
  BBSM	
  4.x	
  
CriGcal	
  service	
  	
  
LAN	
  replacement	
  
© 2013 Beyond Mobile Ltd June 6, 2013
LESSONS LEARNT
TesGng	
  
•  BYOD	
  footprint	
  for	
  tesGng	
  can	
  be	
  never	
  ending	
  
•  Amount	
  &	
  complexity	
  of	
  devices	
  leads	
  to	
  issues	
  with	
  tools	
  for	
  
troubleshooGng	
  
	
  
Support	
  	
  
•  Specialists	
  too	
  thin	
  on	
  ground	
  	
  
•  Mobility	
  support	
  is	
  a	
  specialist	
  skillset	
  
•  OpportuniGes	
  for	
  companies	
  &	
  partners	
  	
  
•  Certainty	
  to	
  support	
  costs	
  
	
  
Process	
  engineering	
  important	
  
	
  
Credit'Suisse'Employee
Aruba
Clearpass
Cloud'Service
Access'Point
Intranet'Controller
DMZ'Controller
BYOD
SSID
Guest'&'
Provisioning
SSID
Internet
Bluecoat'DMZ
Proxy
1
2
5
7
8
9
6
10
CS'BYOD'Device
CS'Desktop
4
3
© 2013 Beyond Mobile Ltd June 6, 2013
YOUR PATH TO BYOD IN FINANCIALS
20
ObjecGves	
  
• 	
  Have	
  clear	
  business	
  objecGves	
  &	
  Conduct	
  senior	
  stakeholders	
  briefings.	
  
• 	
  Mature	
  requirements	
  &	
  early	
  engagement	
  necessary	
  with	
  IT	
  suppliers	
  
• 	
  What	
  are	
  your	
  security	
  policy	
  objecGves	
  
• Think	
  about	
  process	
  &	
  support	
  design	
  as	
  well	
  as	
  the	
  technology	
  
• Translate	
  the	
  risk	
  posture	
  to	
  security	
  controls	
  	
  
• Don’t	
  compromise	
  usability	
  for	
  security	
  (impact	
  of	
  security	
  discussions)	
  
• Select	
  technology	
  planorms	
  and	
  suppliers	
  
• Build	
  in	
  compliance	
  from	
  the	
  beginning	
  
• Test,	
  Test	
  and	
  test	
  some	
  more	
  
And finally …. Celebrate a success !
Design	
  
Partner	
  	
  
Execute	
  
• Will	
  the	
  enterprise	
  buy	
  “as	
  a	
  service”	
  
• Are	
  there	
  opportuniGes	
  to	
  create	
  Managed	
  services	
  (hosted	
  or	
  mobility	
  support)	
  
• Shioing	
  CIO’s	
  cost	
  from	
  fixed	
  -­‐>	
  Mobile	
  (not	
  cost	
  increases!)	
  	
  
© 2013 Beyond Mobile Ltd June 6, 2013

More Related Content

What's hot

Extreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeExtreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation Challenge
US-Ignite
 
IoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalIoT System SalesBytes Overview Final
IoT System SalesBytes Overview Final
Sarah Reinbolt, MBA
 
Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...
Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...
Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...
MobileMonday Switzerland
 

What's hot (20)

Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Extreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking StrategyExtreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking Strategy
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
 
Extreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeExtreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation Challenge
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Vitra AG
Vitra AGVitra AG
Vitra AG
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014
 
Extreme Networks IdentiFi
Extreme Networks IdentiFiExtreme Networks IdentiFi
Extreme Networks IdentiFi
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter networkCisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
IoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalIoT System SalesBytes Overview Final
IoT System SalesBytes Overview Final
 
Fujitsu Italy
Fujitsu ItalyFujitsu Italy
Fujitsu Italy
 
Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...
Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...
Mobile Monday Switzerland #35; Where 4G networks are much more than just mobi...
 

Viewers also liked (7)

Gazetka Osaa wrzesień-październik
Gazetka Osaa wrzesień-październikGazetka Osaa wrzesień-październik
Gazetka Osaa wrzesień-październik
 
Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0
 
Wish — creative digital campaign
Wish — creative digital campaignWish — creative digital campaign
Wish — creative digital campaign
 
Carla mathis instructional program analysis
Carla mathis   instructional program analysisCarla mathis   instructional program analysis
Carla mathis instructional program analysis
 
Katalog osaa 2013 a
Katalog osaa 2013   aKatalog osaa 2013   a
Katalog osaa 2013 a
 
27 000 товаров или как мы делали интернет-аптеку
27 000 товаров или как мы делали интернет-аптеку27 000 товаров или как мы делали интернет-аптеку
27 000 товаров или как мы делали интернет-аптеку
 
Методы увеличения «конверсии» на мебельных сайтах
Методы увеличения «конверсии» на мебельных сайтахМетоды увеличения «конверсии» на мебельных сайтах
Методы увеличения «конверсии» на мебельных сайтах
 

Similar to The Path to BYOD in Financial Enterprise

Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
Bessie Wang
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
Cisco Russia
 
Service Provider SDN – New Business Opportunities
Service Provider SDN – New Business OpportunitiesService Provider SDN – New Business Opportunities
Service Provider SDN – New Business Opportunities
Ericsson
 
ig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xgig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xg
Ian Messiter
 

Similar to The Path to BYOD in Financial Enterprise (20)

IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
VFB 2013 - Growth Funding - Raising money for a technology startup
VFB 2013 - Growth Funding - Raising money for a technology startupVFB 2013 - Growth Funding - Raising money for a technology startup
VFB 2013 - Growth Funding - Raising money for a technology startup
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
 
Appi fi
Appi fiAppi fi
Appi fi
 
Service Provider SDN – New Business Opportunities
Service Provider SDN – New Business OpportunitiesService Provider SDN – New Business Opportunities
Service Provider SDN – New Business Opportunities
 
Perceptions of BYOD
Perceptions of BYODPerceptions of BYOD
Perceptions of BYOD
 
ig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xgig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xg
 
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businessesUnderstanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
 
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
Mobile UCaaS Unified Comms as a Service - Disruptive Analysis Oct 2013
Mobile UCaaS Unified Comms as a Service - Disruptive Analysis Oct 2013Mobile UCaaS Unified Comms as a Service - Disruptive Analysis Oct 2013
Mobile UCaaS Unified Comms as a Service - Disruptive Analysis Oct 2013
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
CANTO 2013 Keynote: Wi-Fi and Heterogeneous Networks
CANTO 2013 Keynote: Wi-Fi and Heterogeneous NetworksCANTO 2013 Keynote: Wi-Fi and Heterogeneous Networks
CANTO 2013 Keynote: Wi-Fi and Heterogeneous Networks
 
Unlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WANUnlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WAN
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

The Path to BYOD in Financial Enterprise

  • 1. © 2013 Beyond Mobile Ltd June 6, 2013 ARUBA 2013 PARTNER CONFERENCE
  • 2. © 2013 Beyond Mobile Ltd June 6, 2013 INTRODUCTION 2 An  IT  infrastructure  specialist  with  over  20  years  in  the   financial  services  sector.       11  years  with  Credit  Suisse  and  6  with  Chase  (JP  Morgan)     Tough  environment  in  Financial  services  and  deparGng  a   role  as  Director  in  IT  for  Credit  Suisse  to  start  Beyond   Mobile.     Beyond  Mobile  offers  Strategy,  Product  and  Sales  advice  to   companies  who  want  to  sell  into  enterprise  and/or  develop   products  for  this  sector.  
  • 3. © 2013 Beyond Mobile Ltd June 6, 2013 3 WHAT IS AN ENTERPRISE
  • 4. © 2013 Beyond Mobile Ltd June 6, 2013 4 ALL THE SAME RIGHT !
  • 5. © 2013 Beyond Mobile Ltd June 6, 2013 DeclaraGon   NX   Sovereign   circa  2130s   April  16,  2151   October  30,  2372   52,000  metric  tonnes   998,000  metric  tonnes   3,250,000  metric  tonnes   300  metres   225  metres   685.7  metres        <  Warp  2   Warp  5.2   Warp  9.995   None   Photonic  torpedoes   Phase  cannons   Arrays  Phasers   USS  Enterprise     (XCV  330)   NX01   NCC-­‐1701-­‐E   5 COMPARISON STAR TREK ENTERPRISE
  • 6. © 2013 Beyond Mobile Ltd June 6, 2013 Enterprise  1   (Financial)     Case  Study   (Financial)   Enterprise  3   (consulGng)   COMPARISON OF AN ENTERPRISE 6 120,000   65,000   20,000   143,000   80,000   2,000   28,000   15,000   20,000   170,000   120,000   2,500   Yes   Yes   No   “dirty  network”  “clean  network”   “clean  network”  
  • 7. © 2013 Beyond Mobile Ltd June 6, 2013 EVIL INTERNET & WIRELESS 7 Wi-Fi BANNED Custom laptops with Wi-Fi cards removed Ethernet ports and drivers locked down Remote access restricted to dial up Almost impossible to be productive unless in the office  
  • 8. © 2013 Beyond Mobile Ltd June 6, 2013 EVOLUTION NOT REVOLUTION 8
  • 9. © 2013 Beyond Mobile Ltd June 6, 2013 NETWORK STRATEGY 9 DEPERIMITISATION   PROTECT  THE  DATA  
  • 10. © 2013 Beyond Mobile Ltd June 6, 2013 2007 – 1ST GEN WI-FI 10 CISO concedes some Wi-Fi allowed “Managed” endpoints only Guest internet access allowed No employee personal devices allowed User experience not considered Wi-Fi Design poor Global inconsistency  
  • 11. © 2013 Beyond Mobile Ltd June 6, 2013 2009 CHALLENGERS 11 “Why can’t I use the corporate Wi-Fi to sync my work email” “Cellular coverage is so bad in my building and it’s crazy employee’s cant use the Corporate Wi-Fi on their personal devices” Crumbling of IT Walled gardens
  • 12. © 2013 Beyond Mobile Ltd June 6, 2013 2011 THE GAME CHANGED 12 Real estate smart strategies Wi-Fi shifted to a core “enabling” technology and business enabler. BYOD strategy was built demanding better services CIO – build it quick but I wouldn’t start from there, if I was you
  • 13. © 2013 Beyond Mobile Ltd June 6, 2013 THE BEGINNING OR THE END? 13 Requirements Stakeholder Management Buy as a Service vs Build Service Requirements Lesson’s learnt
  • 14. © 2013 Beyond Mobile Ltd June 6, 2013 REQUIREMENTS 14 Guest Standard Employee Complex Employee Performance   Medium   Medium   High   Personal  or  Corp   Personal   Mixed   Corporate   BYOD   Yes   Yes   Yes    &  Corporate   Security   None   MAM   MDM  &  MAM   Filtered   No   Yes   Yes  
  • 15. © 2013 Beyond Mobile Ltd June 6, 2013 STAKEHOLDER MANAGEMENT 15 Clean  vs.  dirty  wireless  =  same   On  campus  =  enterprise  policed   Keep  out  of  trouble  with    the   regulator   Employee  traffic  content  filtered   Info  Sec,  HR/Legal  
  • 16. © 2013 Beyond Mobile Ltd June 6, 2013 STAKEHOLDER MANAGEMENT 16 Apply  IT  policy   Same  quality  as  LAN   Wi-­‐Fi  as  a  commodity   Protect  data  vs.  network   BYOD  Don’t  compromise  usability  for  security   Container  (s)  vs    MAM  
  • 17. © 2013 Beyond Mobile Ltd June 6, 2013 BUY VS BUILD Corporate  IT  in  Financial  Services  idenGty  crisis   Buy  as  a  service  a  preference   RFP  processes   Market  not  Mature,    surely  an  opportunity  for   partners   One  Vendor  stood  out  in  access  control  and   provisioning  =   One  partner  stood  out  in  experience  &  engagement   =   Aruba   Vanix  
  • 18. © 2013 Beyond Mobile Ltd June 6, 2013 Wi-­‐Fi  1st  Gen     Wi-­‐Fi  2nd  Gen   Wi-­‐Fi  FUTURE   SERVICE REQUIREMENTS 18 802.11a/b/g   802.11  n  to  ac   802.11ac   Data   Data  /  Voice   Data  /  Voice  /  Video   Manual   Online  registraGon  &   Sponsor  approval   Federated  B2B   Build   Build  &  Buy   Buy   None   non-­‐criGcal  service   severity  4  SLA     Clearpass  CPPM  6.x   Aruba  end  to  end   ParGally  supported                   Cisco  BBSM  4.x   CriGcal  service     LAN  replacement  
  • 19. © 2013 Beyond Mobile Ltd June 6, 2013 LESSONS LEARNT TesGng   •  BYOD  footprint  for  tesGng  can  be  never  ending   •  Amount  &  complexity  of  devices  leads  to  issues  with  tools  for   troubleshooGng     Support     •  Specialists  too  thin  on  ground     •  Mobility  support  is  a  specialist  skillset   •  OpportuniGes  for  companies  &  partners     •  Certainty  to  support  costs     Process  engineering  important     Credit'Suisse'Employee Aruba Clearpass Cloud'Service Access'Point Intranet'Controller DMZ'Controller BYOD SSID Guest'&' Provisioning SSID Internet Bluecoat'DMZ Proxy 1 2 5 7 8 9 6 10 CS'BYOD'Device CS'Desktop 4 3
  • 20. © 2013 Beyond Mobile Ltd June 6, 2013 YOUR PATH TO BYOD IN FINANCIALS 20 ObjecGves   •   Have  clear  business  objecGves  &  Conduct  senior  stakeholders  briefings.   •   Mature  requirements  &  early  engagement  necessary  with  IT  suppliers   •   What  are  your  security  policy  objecGves   • Think  about  process  &  support  design  as  well  as  the  technology   • Translate  the  risk  posture  to  security  controls     • Don’t  compromise  usability  for  security  (impact  of  security  discussions)   • Select  technology  planorms  and  suppliers   • Build  in  compliance  from  the  beginning   • Test,  Test  and  test  some  more   And finally …. Celebrate a success ! Design   Partner     Execute   • Will  the  enterprise  buy  “as  a  service”   • Are  there  opportuniGes  to  create  Managed  services  (hosted  or  mobility  support)   • Shioing  CIO’s  cost  from  fixed  -­‐>  Mobile  (not  cost  increases!)    
  • 21. © 2013 Beyond Mobile Ltd June 6, 2013