Cisco Cisco Aironet 3600e Access Point 入門ガイド
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
The Cisco BYOD Service Kit
MOBILITY, SECURITY, AND FLEXIBILITY FOR ANY WORKSPACE
At-A-Glance
Mobility and BYOD Are
Today’s Top Business Priorities
Today, personal smartphones, tablets, and other mobile devices are playing an
increasingly central role in how employees work and collaborate over a corporate
network. Not surprisingly, enterprise IT departments identify mobility as the number 1
priority, and bring-your-own-device (BYOD) as the largest mobility initiative. Supporting
BYOD allows greater employee, contractor, and business partner productivity and
efficiency.
A recent survey shows that more than 50 percent of U.S. companies allow personal
mobile devices to connect to the network, but few have rolled out a robust BYOD
architecture that allows employees, partners, and other users to use a personal mobile
device to execute enterprise applications and access secure data. Although employee
“stealth” use has always existed, the proliferation of mobile devices makes formal IT
policies and procedures a critical necessity.
“stealth” use has always existed, the proliferation of mobile devices makes formal IT
policies and procedures a critical necessity.
It is time to see BYOD as an opportunity for organizational effectiveness and shift
the conversation from “whether” to “how.” As companies step into a BYOD
environment, corporate data security, regulatory compliance, and device management
the conversation from “whether” to “how.” As companies step into a BYOD
environment, corporate data security, regulatory compliance, and device management
are primary considerations. Security is not just about keeping people and devices out; it
is also about developing policies to let them in without compromising user experience or
the safety of the company
’s private information.
The best strategy to deal with the rise of BYOD is to address it with a combination of
policy, software, infrastructure controls, and education. But where does a company begin?
Best Practices to Accelerate Deployment
Cisco is leading the way to help companies embrace the BYOD phenomenon successfully.
Planning, building, and managing a secure BYOD solution requires more than the
successful integration of security, wireless, wired infrastructure and network management;
it must also address business and technical requirements from multiple stakeholder groups
including compliance, legal, and human resources. Aligning business objectives, use
cases, and legal and security requirements with an IT architecture is a complex and often
organizationally challenging task. Cisco
®
Services helps companies navigate these areas
and create a secure and practical roadmap for deployment.
The Cisco BYOD Service Kit provides customers with the key components to plan and
build a secure BYOD solution using industry-relevant best practices and methodologies
delivered by experienced Cisco engineers.
Core service deliverables of the Cisco BYOD Service Kit include:
●
BYOD Strategy and Architecture Roadmap: Helps customers align their IT
architecture strategy and policies with business goals and objectives, including
security, compliance, user experience, interoperability, and integration
●
BYOD Foundationa
l Assessment: Reviews the customer’s current network
infrastructure and provides recommendations to achieve a secure BYOD architecture
●
BYOD Foundational Architecture Design: Maps business objectives and technical
requirements to develop a architecture design for use in a preproduction environment
●
BYOD Preproduction Deployment: Validates the BYOD solution design in a
preproduction environment for use cases within scope