Más contenido relacionado
La actualidad más candente (20)
Similar a Seizing the BYOD Opportunity (20)
Más de Juniper Networks (20)
Seizing the BYOD Opportunity
- 1. SEIZING THE BYOD
OPPORTUNITY
Emilio Umeoka
SVP, Worldwide Partners and Alliances
1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 2. IN THE LAST 5 YEARS WE HAVE SEEN
Massive Consumerization Rise of Apps Move to Increasing
Connectivity of IT Cloud Threats
2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 3. PROLIFERATION OF MOBILE DEVICES SHIFTING
TRADITIONAL ENTERPRISE IT
90% 86%
Already deployed Will deploy
mobile devices tablets this year
Source: Gartner Research, June 2012
3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 4. TOP PRIORITIES OF CIO’S
72%
Expand use of mobile/tablet apps for employees, customers, business partners
71%
Significantly upgrade our security environment
67%
Increase use of business intelligence and decision-support tools and services
67%
Consolidate IT infrastructure via data center/server consolidation or virtualization
67%
Significantly upgrade disaster recovery and business continuity capabilities
62%
Implement or expand use of collaboration capabilities
Source: Forrester/Juniper, October 2012
4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 5. WHERE DO YOUR CUSTOMERS
FIT IN THE BYOD SPECTRUM?
BYOD SPECTRUM
0% 100%
“
What are good BYOD support tools, analysis, associated costs?
What are the pitfalls of BYOD? How to deploy a BYOD policy?
What is a good laptop purchase program?
What are some remote office strategies (for executives vs. sales)?
”
Who pays for device & data? Employee, company, both?
5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 6. WHERE DO YOUR CUSTOMERS
FIT IN THE BYOD SPECTRUM?
BYOD SPECTRUM
0% 100%
“
How to meet demand without compromising security policy?
What is data and licensing liability, with employee departures?
Will BYOD make it easier to on-board & off-board resources?
What are different MDM strategies: BYOD, BYOD & company
provided, or just company provided?
6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
”
- 7. WHERE DO YOUR CUSTOMERS
FIT IN THE BYOD SPECTRUM?
BYOD SPECTRUM
0% 100%
“ How to optimize networks with app delivery via smart phones?
Are ERPs ready for smart phones?
How to support legacy apps not designed for mobility & BYOD?
7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
”
- 8. OPPORTUNITY AHEAD:
Implications For Partners
8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 9. SECURITY IS THE PRIMARY CONCERN
1
Protecting Corporate IP
Managing Personal Information
Maintaining Continuity
Data Backup & Recovery
9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 10. WHAT’S REQUIRED:
SECURITY INTELLIGENCE COMPLEX ECOSYSTEM
CHALLENGE: SECURING AAT EVERY LEVEL
Proliferation of End-User Devices
Objective:
Proliferation of Applications
Pervasive
Service Provider Core Networks
Security Data Center
Intelligence
Edge Networks Enterprise Campus & Branch
10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 11. LEADERSHIP IN SECURITY
$1B Global #1 Remote Access
#1 High-End Firewalls
Security Revenue SSL VPN
Security Is Core To Our Business At Juniper
Serving customers in
over 47 countries, with
#3 Network Security a worldwide community
of over 1000 Reseller
Infonetics
Partners
Research 2012
11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 12. A WORLD OF MOBILE DEVICE MANAGEMENT
& ENTERPRISE APPS
2
Need For A New Class Of Enterprise Apps
That Can Be Rapidly Deployed
12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 13. USER EXPERIENCE VS PROTECTION & CONTROL
User Experience
Protection & Control
13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 14. JUNIPER’S MOBILE SOLUTION
FROM DEVICE TO DATA CENTER
Anytime, Anywhere Anytime, Anywhere
Secure Access Threat Protection
Corporate / Mobile Loss and Theft
Cloud VPN Connect Protect Mobile Threat
Authentication Prevention
Differentiated Access
Manage
14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 15. BYOD Will Drive an
ARCHITECTURAL TRANSITION
IN THE DATA CENTER
3
At The Point Where Users Connect
15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 16. COMPREHENSIVE SOLUTION FOR TRUSTED
MOBILITY AT SCALE
Juniper offers an integrated
portfolio of wired, wireless &
security for mobility at scale
Scalable mobility
Single client for all devices
Fewer wires and fewer devices
to manage
Comprehensive Security
16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 17. DRIVE REVENUE
AND ACCELERATE YOUR BUSINESS
Leverage BYOD To Create Business
ADVANTAGE and Distinction
17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 18. EVERY ASPECT OF BYOD
REPRESENTS OPPORTUNITY
Software Integration Design and
System Sales Consulting
Sales Services Implementation
18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 19. TAKEAWAYS…
1. Differentiate with Juniper’s security solutions
from device to data center
2. Grow your share of wallet with broader campus/branch
and data center solutions and services practices
3. Leverage resources and rewards available to you
through Juniper Partner Advantage
19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
- 20. LET’S TALK...
Here at Canalys After Canalys
Visit us on Level 2 – Jonathan Belcher, VP
“Millenia 4” room Partners - APAC
Schedule an appointment jbelcher@juniper.net
with us via your delegate Go to
zone on ccfmob.com www.Juniper.net/partners
20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net