> > > SBYOD Detailed outline

Selling BYOD in a Unified Access Network (SBYOD)

Course Description Kurs tarihleri Course Outline

Detailed Course Outline

1. Understanding the BYOD Phenomenon
  • Trends and Business Drivers behind BYOD
    • Consumerization of IT
    • A Diversity of Devices
    • The IT Management Problem in a Post-PC error
    • The demand for multimedia capable apps and collaboration on any device, any where
  • The BYOD Adoption Spectrum: Limited, Basic, Advanced and Embraced
  • How BYOD affects the IT Department
    • BYOD – Choice and Support
    • Management – Visibility and Control
    • On Boarding New Devices
    • The Uncompromised User Experience
    • Authentication for Wired and Wireless Devices
    • Potential for new Attack Vectors
    • Securing Remote Access
    • Securing Smart Phones
    • Real Time Network Usage and Visibility
    • Prevention of Corporate Fraud and DLP
    • Revoking Access
2. Overview of Cisco’s BYOD Solution
  • Alignment with Borderless Network and Secure X Architectures
  • Simplified Management across wired and wireless
  • Simplified Policy development and implementation
  • Native Mode BYOD or Virtual (VDI) Mode
  • BYOD Components Overview
    • Wireless, R & S: Catalyst Switch Portfolio, ISRs, WLAN APs & WLCs
    • Security: ASA, Anyconnect 3.0 Client, ISE 1.1.1MR, ScanSafe
    • Management: Cisco Prime Infrastructure (NCS and LMS)
    • Enabling Mobility and Collaboration: Jabber, Mobility Services Engine
    • Third Party Components: RSA SecurID, MDM, CA, AD
3. BYOD Use Cases
  • Secure Campus Access for Mobile Devices
  • Secure Campus Access for Workstations
  • Remote Access for Mobile Devices and Workstations
  • Enterprise wide security and policy management
    • Asset Recovery, Inventory Management, Reduce Shrinkage, Location by Name, Locating Hosts or VMs, Infrastructure location management
    • Port Utilization, Device/Employee Movement , Suspicious or unauthorized access
    • Location of missing or stolen assets, Location of unknown devices
    • Historical data – utilization, location access, Enabling – who, what, where, When
    • Tracking – how it works
4. Selling Cisco’s BYOD Smart Solution
  • Trigger Points – what to look for
  • BYOD Discussion based on the buyer agent: CxO level, LoB Level, Technical
  • Linking Customer Goals to the right BYOD Solution
  • Linking Solutions and Concerns to BYOD
  • Articulating Value and Building a Business Case
  • Differentiating Cisco’s holistic approach from the competition
  • Creating a Quote and Licensing

Cookies help us deliver our services. By using our services, you agree to our use of cookies.   Got it!