> > > SBYOD Detailed outline

Selling BYOD in a Unified Access Network (SBYOD)

Course Description Schedule Course Outline

Detailed Course Outline

1. Understanding the BYOD Phenomenon
  • Trends and Business Drivers behind BYOD
    • Consumerization of IT
    • A Diversity of Devices
    • The IT Management Problem in a Post-PC error
    • The demand for multimedia capable apps and collaboration on any device, any where
  • The BYOD Adoption Spectrum: Limited, Basic, Advanced and Embraced
  • How BYOD affects the IT Department
    • BYOD – Choice and Support
    • Management – Visibility and Control
    • On Boarding New Devices
    • The Uncompromised User Experience
    • Authentication for Wired and Wireless Devices
    • Potential for new Attack Vectors
    • Securing Remote Access
    • Securing Smart Phones
    • Real Time Network Usage and Visibility
    • Prevention of Corporate Fraud and DLP
    • Revoking Access
2. Overview of Cisco’s BYOD Solution
  • Alignment with Borderless Network and Secure X Architectures
  • Simplified Management across wired and wireless
  • Simplified Policy development and implementation
  • Native Mode BYOD or Virtual (VDI) Mode
  • BYOD Components Overview
    • Wireless, R & S: Catalyst Switch Portfolio, ISRs, WLAN APs & WLCs
    • Security: ASA, Anyconnect 3.0 Client, ISE 1.1.1MR, ScanSafe
    • Management: Cisco Prime Infrastructure (NCS and LMS)
    • Enabling Mobility and Collaboration: Jabber, Mobility Services Engine
    • Third Party Components: RSA SecurID, MDM, CA, AD
3. BYOD Use Cases
  • Secure Campus Access for Mobile Devices
  • Secure Campus Access for Workstations
  • Remote Access for Mobile Devices and Workstations
  • Enterprise wide security and policy management
    • Asset Recovery, Inventory Management, Reduce Shrinkage, Location by Name, Locating Hosts or VMs, Infrastructure location management
    • Port Utilization, Device/Employee Movement , Suspicious or unauthorized access
    • Location of missing or stolen assets, Location of unknown devices
    • Historical data – utilization, location access, Enabling – who, what, where, When
    • Tracking – how it works
4. Selling Cisco’s BYOD Smart Solution
  • Trigger Points – what to look for
  • BYOD Discussion based on the buyer agent: CxO level, LoB Level, Technical
  • Linking Customer Goals to the right BYOD Solution
  • Linking Solutions and Concerns to BYOD
  • Articulating Value and Building a Business Case
  • Differentiating Cisco’s holistic approach from the competition
  • Creating a Quote and Licensing

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!