SlideShare una empresa de Scribd logo
1 de 21
SEIZING THE BYOD
    OPPORTUNITY
    Emilio Umeoka
    SVP, Worldwide Partners and Alliances




1                        Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
IN THE LAST 5 YEARS WE HAVE SEEN




     Massive Consumerization Rise of Apps                                     Move to   Increasing
    Connectivity  of IT                                                        Cloud      Threats




2                       Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
PROLIFERATION OF MOBILE DEVICES SHIFTING
    TRADITIONAL ENTERPRISE IT




                        90%                                                                       86%

               Already deployed                                                         Will deploy
                mobile devices                                                        tablets this year



Source: Gartner Research, June 2012


3                                     Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
TOP PRIORITIES OF CIO’S

     72%
    Expand use of mobile/tablet apps for employees, customers, business partners


     71%
    Significantly upgrade our security environment
     67%
    Increase use of business intelligence and decision-support tools and services

     67%
    Consolidate IT infrastructure via data center/server consolidation or virtualization

     67%
    Significantly upgrade disaster recovery and business continuity capabilities

     62%
    Implement or expand use of collaboration capabilities
                                                                                                   Source: Forrester/Juniper, October 2012



4                                      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
WHERE DO YOUR CUSTOMERS
    FIT IN THE BYOD SPECTRUM?
                               BYOD SPECTRUM
    0%                                                                                  100%




“    
     
     
     
         What are good BYOD support tools, analysis, associated costs?
         What are the pitfalls of BYOD? How to deploy a BYOD policy?
         What is a good laptop purchase program?
         What are some remote office strategies (for executives vs. sales)?




                                                                                        ”
        Who pays for device & data? Employee, company, both?




5                           Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
WHERE DO YOUR CUSTOMERS
    FIT IN THE BYOD SPECTRUM?
                               BYOD SPECTRUM
    0%                                                                                  100%




“    
     
     
     
         How to meet demand without compromising security policy?
         What is data and licensing liability, with employee departures?
         Will BYOD make it easier to on-board & off-board resources?
         What are different MDM strategies: BYOD, BYOD & company
         provided, or just company provided?




6                           Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
                                                                                        ”
WHERE DO YOUR CUSTOMERS
    FIT IN THE BYOD SPECTRUM?
                            BYOD SPECTRUM
    0%                                                                               100%




“     How to optimize networks with app delivery via smart phones?
      Are ERPs ready for smart phones?
      How to support legacy apps not designed for mobility & BYOD?




7                        Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
                                                                                     ”
OPPORTUNITY AHEAD:

    Implications For Partners




8                   Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
SECURITY IS THE PRIMARY CONCERN




                                     1
              Protecting Corporate IP
              Managing Personal Information
              Maintaining Continuity
              Data Backup & Recovery


9              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
WHAT’S REQUIRED:
 SECURITY INTELLIGENCE COMPLEX ECOSYSTEM
 CHALLENGE: SECURING AAT EVERY LEVEL



                           Proliferation of End-User Devices


     Objective:
                              Proliferation of Applications



      Pervasive
             Service Provider Core Networks
       Security                                                             Data Center
     Intelligence



                    Edge Networks                           Enterprise Campus & Branch


10                          Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
LEADERSHIP IN SECURITY


        $1B Global                 #1 Remote Access
                                                                                       #1 High-End Firewalls
      Security Revenue                 SSL VPN




                Security Is Core To Our Business At Juniper


                                                             Serving customers in
                                                            over 47 countries, with
                 #3 Network Security                        a worldwide community
                                                             of over 1000 Reseller
Infonetics
                                                                   Partners
Research 2012



11                         Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
A WORLD OF MOBILE DEVICE MANAGEMENT
          & ENTERPRISE APPS




                                      2
      Need For A New Class Of Enterprise Apps
          That Can Be Rapidly Deployed



12              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
USER EXPERIENCE VS PROTECTION & CONTROL



     User Experience

                                                                             Protection & Control




13                     Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
JUNIPER’S MOBILE SOLUTION
 FROM DEVICE TO DATA CENTER

     Anytime, Anywhere                                                                  Anytime, Anywhere
       Secure Access                                                                     Threat Protection
  Corporate /                                                                          Mobile Loss and Theft
   Cloud VPN                Connect                                   Protect           Mobile Threat
  Authentication                                                                        Prevention
  Differentiated Access




                                                 Manage




14                         Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
BYOD Will Drive an

     ARCHITECTURAL TRANSITION
        IN THE DATA CENTER




                                  3
      At The Point Where Users Connect




15          Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
COMPREHENSIVE SOLUTION FOR TRUSTED
 MOBILITY AT SCALE
                                             Juniper offers an integrated
                                             portfolio of wired, wireless &
                                             security for mobility at scale
                                                  Scalable mobility
                                                  Single client for all devices
                                                  Fewer wires and fewer devices
                                                   to manage
                                                  Comprehensive Security




16            Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
DRIVE REVENUE
     AND ACCELERATE YOUR BUSINESS




       Leverage BYOD To Create Business
          ADVANTAGE and Distinction



17            Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
EVERY ASPECT OF BYOD
 REPRESENTS OPPORTUNITY




                    Software                Integration                                      Design and
     System Sales                                                             Consulting
                     Sales                   Services                                      Implementation




18                         Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
TAKEAWAYS…

 1. Differentiate with Juniper’s security solutions
    from device to data center
 2. Grow your share of wallet with broader campus/branch
    and data center solutions and services practices
 3. Leverage resources and rewards available to you
    through Juniper Partner Advantage




19                 Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
LET’S TALK...

     Here at Canalys                                     After Canalys
      Visit us on Level 2 –                                 Jonathan Belcher, VP
       “Millenia 4” room                                      Partners - APAC
      Schedule an appointment                                jbelcher@juniper.net
       with us via your delegate                             Go to
       zone on ccfmob.com                                     www.Juniper.net/partners




20                      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
Seizing the BYOD Opportunity

Más contenido relacionado

La actualidad más candente

Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
Cisco Public Relations
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
Mahbubul Alam
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
Clay Melugin
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 branded
Nalneesh Gaur
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
Gen-i
 

La actualidad más candente (20)

Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Energistyring via mobilen af Peter W. Christensen, GreenWave Reality
Energistyring via mobilen af Peter W. Christensen, GreenWave RealityEnergistyring via mobilen af Peter W. Christensen, GreenWave Reality
Energistyring via mobilen af Peter W. Christensen, GreenWave Reality
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
 
A View From the CIO's Driver Seat
A View From the CIO's Driver SeatA View From the CIO's Driver Seat
A View From the CIO's Driver Seat
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDM
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruption
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 branded
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Video the new voice
Video the new voiceVideo the new voice
Video the new voice
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Healthcare HIPAA Compliance
Healthcare HIPAA ComplianceHealthcare HIPAA Compliance
Healthcare HIPAA Compliance
 
Business Models for Interoperability
Business Models for InteroperabilityBusiness Models for Interoperability
Business Models for Interoperability
 

Similar a Seizing the BYOD Opportunity

Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
stefriche0199
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
Agora Group
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
Shafaq Abdullah
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud
Central NyT
 

Similar a Seizing the BYOD Opportunity (20)

Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Mobile Service Edge
Mobile Service EdgeMobile Service Edge
Mobile Service Edge
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
 
Lam Chee Keong
Lam Chee KeongLam Chee Keong
Lam Chee Keong
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 

Más de Juniper Networks

Más de Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 
What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Seizing the BYOD Opportunity

  • 1. SEIZING THE BYOD OPPORTUNITY Emilio Umeoka SVP, Worldwide Partners and Alliances 1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 2. IN THE LAST 5 YEARS WE HAVE SEEN Massive Consumerization Rise of Apps Move to Increasing Connectivity of IT Cloud Threats 2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 3. PROLIFERATION OF MOBILE DEVICES SHIFTING TRADITIONAL ENTERPRISE IT 90% 86% Already deployed Will deploy mobile devices tablets this year Source: Gartner Research, June 2012 3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 4. TOP PRIORITIES OF CIO’S 72% Expand use of mobile/tablet apps for employees, customers, business partners 71% Significantly upgrade our security environment 67% Increase use of business intelligence and decision-support tools and services 67% Consolidate IT infrastructure via data center/server consolidation or virtualization 67% Significantly upgrade disaster recovery and business continuity capabilities 62% Implement or expand use of collaboration capabilities Source: Forrester/Juniper, October 2012 4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 5. WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM? BYOD SPECTRUM 0% 100% “     What are good BYOD support tools, analysis, associated costs? What are the pitfalls of BYOD? How to deploy a BYOD policy? What is a good laptop purchase program? What are some remote office strategies (for executives vs. sales)? ”  Who pays for device & data? Employee, company, both? 5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 6. WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM? BYOD SPECTRUM 0% 100% “     How to meet demand without compromising security policy? What is data and licensing liability, with employee departures? Will BYOD make it easier to on-board & off-board resources? What are different MDM strategies: BYOD, BYOD & company provided, or just company provided? 6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net ”
  • 7. WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM? BYOD SPECTRUM 0% 100% “  How to optimize networks with app delivery via smart phones?  Are ERPs ready for smart phones?  How to support legacy apps not designed for mobility & BYOD? 7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net ”
  • 8. OPPORTUNITY AHEAD: Implications For Partners 8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 9. SECURITY IS THE PRIMARY CONCERN 1  Protecting Corporate IP  Managing Personal Information  Maintaining Continuity  Data Backup & Recovery 9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 10. WHAT’S REQUIRED: SECURITY INTELLIGENCE COMPLEX ECOSYSTEM CHALLENGE: SECURING AAT EVERY LEVEL Proliferation of End-User Devices Objective: Proliferation of Applications Pervasive Service Provider Core Networks Security Data Center Intelligence Edge Networks Enterprise Campus & Branch 10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 11. LEADERSHIP IN SECURITY $1B Global #1 Remote Access #1 High-End Firewalls Security Revenue SSL VPN Security Is Core To Our Business At Juniper Serving customers in over 47 countries, with #3 Network Security a worldwide community of over 1000 Reseller Infonetics Partners Research 2012 11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 12. A WORLD OF MOBILE DEVICE MANAGEMENT & ENTERPRISE APPS 2 Need For A New Class Of Enterprise Apps That Can Be Rapidly Deployed 12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 13. USER EXPERIENCE VS PROTECTION & CONTROL User Experience Protection & Control 13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 14. JUNIPER’S MOBILE SOLUTION FROM DEVICE TO DATA CENTER Anytime, Anywhere Anytime, Anywhere Secure Access Threat Protection  Corporate /  Mobile Loss and Theft Cloud VPN Connect Protect  Mobile Threat  Authentication Prevention  Differentiated Access Manage 14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 15. BYOD Will Drive an ARCHITECTURAL TRANSITION IN THE DATA CENTER 3 At The Point Where Users Connect 15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 16. COMPREHENSIVE SOLUTION FOR TRUSTED MOBILITY AT SCALE Juniper offers an integrated portfolio of wired, wireless & security for mobility at scale  Scalable mobility  Single client for all devices  Fewer wires and fewer devices to manage  Comprehensive Security 16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 17. DRIVE REVENUE AND ACCELERATE YOUR BUSINESS Leverage BYOD To Create Business ADVANTAGE and Distinction 17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 18. EVERY ASPECT OF BYOD REPRESENTS OPPORTUNITY Software Integration Design and System Sales Consulting Sales Services Implementation 18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 19. TAKEAWAYS… 1. Differentiate with Juniper’s security solutions from device to data center 2. Grow your share of wallet with broader campus/branch and data center solutions and services practices 3. Leverage resources and rewards available to you through Juniper Partner Advantage 19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 20. LET’S TALK... Here at Canalys After Canalys  Visit us on Level 2 –  Jonathan Belcher, VP “Millenia 4” room Partners - APAC  Schedule an appointment jbelcher@juniper.net with us via your delegate  Go to zone on ccfmob.com www.Juniper.net/partners 20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net