Top Banner
Surviving the iPad Crush Meraki, Inc
46

Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Dec 31, 2018

Download

Documents

lamxuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Surviving the iPad CrushMeraki, Inc

Page 2: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Agenda» Meraki overview» iPad growth in the enterprise» iPad security and access » Network considerations» Enabling a superior network experience

Page 3: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Meraki builds cloud-based networks that are easy to

manage.

3

Page 4: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Complete Wireless LAN Product Line802.11a/b/g/n

802.11b/g

Rugged/Outdoor

Access points for any environment

Cloud-hosted controllers+

Indoor

Page 5: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Cloud-Managed Routers

Branch router with integrated application firewall, site to site VPN, traffic shaper

Page 6: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

17,000 sites and 35 Million Clients Connected

6

Page 7: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad:

Growth in Enterprise Networks

Page 8: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Exploding Onto Enterprise NetworksApple COO Tim Cook:» 80% of the Fortune 100 are deploying or testing the iPad.

Forrester Research Report:» Approximately 26% of enterprises with 1,000 employees or more are

using or planning to use tablets for business use.» 80% are supporting multiple smartphones and laptop models.» In general, companies plan to support more configurations in 2012.

Page 9: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Exploding Onto Enterprise Networks

Page 10: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Exploding Onto Enterprise Networks

Page 11: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 12: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 13: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad:

Security and Access

Page 14: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Security and AccessApple integrates security measures into the iPad» Device security» Data security» Network security» Application security

Prudent network administration considers all of the above when allowing new client device types on the network

Page 15: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Security and AccessDevice security includes fine-grained password policies» Enforcement of passcode requirement on device» Minimum length and complex characters » Passcode aging» Maximum failed attempts

!"#$%&$'()*+,$,*-$#"%+*#(*'!,+*'-*'./#"$,($*0#"*,(1*%(2'"#(.%($*3'$4*,*4')4*5%2%5*#0*-%(-'$'2%*&#"/#",$%*#"*&6-$#.%"*'(0#".,$'#(7*8(*,++'$'#(*$#*%(&"1/$'()*+,$,*'(*$",(-.'--'#(9*'!,+*/"#2'+%-*4,"+3,"%*%(&"1/$'#(*0#"*,55*+,$,*-$#"%+*#(*$4%*+%2'&%9*,(+*,++'$'#(,5*%(&"1/$'#(*#0*%.,'5*,(+*,//5'&,$'#(*+,$,*3'$4*%(4,(&%+*+,$,*/"#$%&$'#(7

80*,*+%2'&%*'-*5#-$*#"*-$#5%(9*'$:-*'./#"$,($*$#*+%,&$'2,$%*,(+*%",-%*$4%*+%2'&%7*8$:-*,5-#*,*

$#*$4%*+%2'&%7

!"#$%&'()"

%(&#+'()*$#*/"#$%&$*,55*+,$,*#(*$4%*+%2'&%7*;(&"1/$'#(*'-*,53,1-*%(,<5%+9*,(+*&,((#$*<%*+'-,<5%+*<1*6-%"-7

&,(*<%*%(,<5%+*<1*$4%*6-%"9*#"*%(0#"&%+*<1*6-'()*+%2'&%*"%-$"'&$'#(*-%$$'()-*'(*

*+'+,-$)'.#'()"

,$$,&4.%($-*-$#"%+*#(*$4%*+%2'&%*&,(*<%*06"$4%"*-%&6"%+*<1*6-'()*+,$,*/"#$%&$'#(*

&"'$'&,5*'(0#".,$'#(*'-*-%&6"%+*%2%(*'0*$4%*+%2'&%*'-*&#./"#.'-%+7

*&,/,<'5'$17*=#*$6"(*#(*$4%*+,$,*/"#$%&$'#(*0%,$6"%9*-'./51*%-$,<5'-4*,*/,--&#+%*#(**

*

%-$,<5'-4'()*1#6"*&#"/#",$%*/,--&#+%*/#5'&'%-7*>-%"-*&,(*2%"'01*$4,$*+,$,*/"#$%&$'#(**

=4%-%*+,$,*/"#$%&$'#(*?!8-*,"%*,5-#*,2,'5,<5%*$#*+%2%5#/%"-9*,(+*&,(*<%*6-%+*$#*-%&6"%*%($%"/"'-%*'(@4#6-%*#"*&#..%"&',5*,//5'&,$'#(*+,$,7

/.0)'.,1(&.'!,+*-6//#"$-*"%.#$%*3'/%7*80*,*+%2'&%*'-*5#-$*#"*-$#5%(9*$4%*,+.'('-$",$#"*#"*+%2'&%*#3(%"*&,(*'--6%*,*"%.#$%*3'/%*&#..,(+*$4,$*"%.#2%-*,55*+,$,*,(+*+%,&$'2,$%-*$4%*

,"%*(#$*'(*6-%7

'('$',$%*,*3'/%*,0$%"*-%2%",5*0,'5%+*/,--&#+%*,$$%./$-7*80*,*6-%"*"%/%,$%+51*%($%"-*$4%*3"#()*/,--&#+%9*'!,+*3'55*<%*+'-,<5%+*0#"*'(&"%,-'()51*5#()%"*'($%"2,5-7*?0$%"*$##*.,(1*6(-6&&%--065*,$$%./$-9*,55*+,$,*,(+*-%$$'()-*#(*$4%*+%2'&%*3'55*<%*%",-%+7

2

Choose the right mix of password policies to ensure a high level of access security.

Page 16: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Security and AccessHighly robust data security» Always-on 256-bit AES hardware encryption» Backup data on user computer can also be encrypted» Highly sensitive data, such as email and attachments, are further

encrypted using a key based on the user passcode» Remote and local wipe methods are supported

Ensuring passcode strength increases data protection.

Page 17: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Security and AccessNetwork security support is built-in» VPN supported through IPsec, SSL/TSL VPN» Safari, Mail, Calendar, and applications use SSL

Flexible access and authentication security » Supports digital certificates and token methods» Access via 128-bit AES WPA2 and many 802.1X protocols

Built-in security supports a wide variety of configurations and methods, making integration smooth.

Page 18: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Security and AccessApplication security is baked into iOS» Applications are isolated and shielded from system components» Encrypted keychain stores identities, usernames, and passwords» Custom applications are enabled through a provisioning profile

iOS platform ensures safe handling and encryption of application and user data.

Page 19: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad:

Network Considerations

Page 20: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Network ConsiderationsYour wireless infrastructure must be ready» 802.11n for high-density deployment» Adequate coverage of areas likely to see the iPad» Automatic management of clients and access point radio settings:-assigning clients to the right 2.4 GHz or 5 GHz channel-power of access point and client power saving- channel selection- client roaming-and mesh routing

The iPad has no wired access – there is no other way!

Page 21: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Network ConsiderationsNetwork traffic types must be considered» Canʼt degrade experience for existing, non-iPad clients» Critical traffic should be prioritized, such as VoIP, meeting

applications, or video conferencing» On the other hand…

Page 22: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Network ConsiderationsConsider iPad use cases» Email and calendar-Microsoft and open standards supported

Page 23: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Network ConsiderationsConsider iPad use cases» Business applications-Document reading and editing-Meeting and webcasts-Business-specific apps

Page 24: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad Network ConsiderationsConsider iPad use cases» VoIP

» Recreational video

» Video conferencingYouTube Hulu

Skype

FaceTime

Skype WebEx GoToMeeting

Page 25: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad:

Enabling the proper network experience

Page 26: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Meraki MR12 Meraki MR16 Meraki MR58Single-Radio 802.11ab/g/n Dual-Radio 802.11a/b/g/n 3-Radio 802.11a/b/g/n

300 Mbit/s 600 Mbit/s 900 Mbit/sMost economical Most popular Rugged, outdoor

All enterprise access points feature:802.11n, 2x2 MIMO, Beamforming, 802.3af PoENAC, Teleworker VPN, AutoRF, Client FingerprintingHardware accelerated encryptionSelf-configuration, self-optimization, mesh networkingSeamless management with the Enterprise Cloud Controller

Enterprise 802.11n Access Points

Page 27: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Built for highest-performance and density» Triple stream 3x3 MIMO» Dual concurrent radios» 900 Mbit/s» Up to 50% more clients

More than just an access point:» Cloud management» Application (L7) traffic shaping» Multi-radio mesh routing» Spectrum analysis and RF planning» Priority voice and video» Layer 2/3 VPN

Meraki MR24 Cloud-Managed Access Point

Page 28: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Auto RF: Cloud-based Optimization

Spectrum AnalysisNearby 802.11 APsInter-AP interferenceClient Channel Utilization20 vs. 40MHz channelsLegacy Devices

Page 29: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Integrated Enterprise Security

Page 30: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Secure Guest Access

Page 31: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

Secure Guest Access

Page 32: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 33: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 34: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 35: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 36: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 37: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 38: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 39: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 40: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior
Page 41: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad: Are You Ready?

Page 42: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad: Are You Ready?

Page 43: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad: Five Recommended Best Practices1. Ensure device security with integrated methods provided by Apple

2. Use standards-based authentication such as 802.1X if providing access to the corporate LAN

3. Block LAN access if providing internet-only guest access

4. Use automatic RF optimization to ensure performance and reduce management overhead

5. Monitor and shape application usage with integrated user/device fingerprinting and application traffic shaping

Page 44: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad: Are You Ready?» iPads and tablets are here and theyʼre coming to the enterprise.

»Network administrators needs to protect critical assets while providing the right network experience for all end users.

»Merakiʼs cloud-based networks provide the infrastructure needed to:

- Make integration of iPads and tablets painless- Allow your network to survive the crush of iPads- Deliver the proper network experience for all your users.

Page 45: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

iPad

Enabling the proper network experience

Page 46: Surviving the iPad Crush - Cisco Meraki · Agenda » Meraki overview » iPad growth in the enterprise » iPad security and access » Network considerations » Enabling a superior

http://meraki.com/ipad