1 / 11

Dell Networking for bring- your-own-device (BYOD) and guest access projects

Dell offers end-to-end solutions for BYOD and guest access projects, including scalable solutions, improved productivity, risk mitigation, and customer-centricity.

yip
Télécharger la présentation

Dell Networking for bring- your-own-device (BYOD) and guest access projects

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dell Networking for bring- your-own-device (BYOD) and guest access projects

  2. Dell end-to-end solutions: Your competitive advantage Scale Efficiency Speed Productivity Customer centricity Risk mitigation Ourpurpose Deliver technology solutions that enable people everywhereto grow, thrive and reach their full potential. Our differentiated strategy Be the leading provider of end-to-end scalable solutions. Profitably growour (and your) business. Build and integrate oursolutions portfolio. Expand our reach and improve your customers' experiences. Transform Connect Inform Protect Your customers’ imperatives Ourend-to-endportfolio Connecting end users Integrating and optimisingthe enterprise Simplifying and securing through software Acceleratinginnovation with services Confidential

  3. BYOD and guest access BYOD enables secure and controlled employee access to corporate applications and data from any device, from any location. Guest access provides company visitors secure wireless connectivity that meets their high-performance expectations, as well as your management and security requirements.   Confidential

  4. Required framework • Mobility business model • BYOD • Choose your own device (CYOD) • Corporate-issued Security Protect networks from intrusions and ensure the privacy of sensitive information. Management Streamline ongoing management functions and contain costs. Scalability Consider future network capacity and access control requirements. Confidential

  5. Dell enables you to implement BYOD and guest access for your customers. Dell can complement your capabilities in the preparation, deployment, management and scalability of BYOD and guest access solutions. Preparation Assess current network structure and consider future needs. Deployment Assess in-house capabilities and determine whether outside resources are necessary. Management Consider appropriate services and solutions to manage the network easily. Scalability Ensure the network can expand for future performance, capacity and security requirements. Confidential

  6. Start with these Dell products Dell™Networking W-Series mobility controllers Dell Networking access points and instant access points For organisationsthat seek maximum security, functionality and centralisedmanagement features, Dell Networking offers a complete portfolio of access and instant access points. ClearPass Access Management • Easy to add and manage both guest and employee-owned devices • Self-registration eliminates need for IT to touch every device • User, device and application fingerprinting apply access and quality-of-service policies • Seamless network integration Confidential

  7. Distributed clustering topology • Central/distributed administrative domains • Redundancy/load balancing • Cluster-wide licenses Wireless access point Identity stores Dell NetworkingW-ClearPass PolicyManager (publisher) Dell NetworkingW-ClearPass PolicyManager (subscriber) DNS1/DHCP2 Regional office Firewall Wireless access point Identity stores Dell NetworkingW-ClearPass PolicyManager (subscriber) Dell NetworkingW-ClearPass PolicyManager (subscriber) Dell Networking W-ClearPassPolicy Manager (guest) Main data centre DMZ Mid-size branch 1. Domain Name System 2. Dynamic Host Configuration Protocol Confidential

  8. Some of the most common use cases and benefits Use cases • Organisations that invite guest executives or clients to in-house meetings • Employers who want to allow employees to bring their own devices • Hotel guest connections to network • Conference centres with many attendees using different devices Benefits across all use cases • Easy accessibility • Secure accessibility • Flexibility • End-user choice of device • Centralised manageability of network access • Easy management of organisational versus guest access privileges • Possibility of monetising wireless access Confidential

  9. Real-world example: Austin City Limits Music Festival Challenge To effectively showcase Dell products to the thousands of attendees of the Austin City Limits Music Festival in Austin, Texas, Dell needed to ensure high-quality, fast connectivity with zero downtime. Solution The organisation implemented a comprehensive wired and wireless networking solution to provide high-speed internet connectivity and live video streaming within its tent and other remote sites. Benefits • Solution provided flawless internet connectivity for three days • Technology offered simple, fast setup and easy remote network monitoring • High-speed network delivered fast video gaming with virtually zero lag time • Festival attendees were able to view remote live streams from main stages Solutions featured Dell Networking 8132 10-Gigabit Ethernet switches, Dell Networking 7024P Ethernet switches, Dell Networking 2800 web-managed Ethernet switches, Dell Networking W-IAP 135 wireless LAN instant access points Confidential Global Commercial Channels

  10. Real-world example: Vechtdal College in the Netherlands Challenge Vechtdal College in the Netherlands has three locations with more than 3,000 students and 350 teachers. They originally installed the Dell Networking W-3600 controller with 90 access points. Due to the increasing number of devices accessing the wireless local area networks (WLAN), the college was struggling to handle security and redundancy. Solution Dell Networking W-Series provides Vechtdal College with controller redundancy and ClearPass meets their stringent guest and BYOD requirements. Plus, the onboarding functionality offers students the ability to use their devices on the WLAN without the intervention of the network administrator. Benefits • Access points were more than doubled • Redundancy was added for their wireless controller • Self-service/BYOD capabilities were implemented Solutions featured Dell Networking W7210, Dell Networking W-AP105, Dell Networking W-AP135, ClearPass 12/30/2013 Confidential 10 Global Commercial Channels

  11. How to start the BYOD conversation 1. Identify goals and pain points of your customers by asking: 2. Explain the Dell difference. “Dell has a different and better approach to BYOD. They provide an end-to-end flexible and scalable mobility solution set. Our expertise and capabilities in conjunction with Dell’s allows us to provide you with the right solutions to meet your needs for BYOD. We can help you: manage mobile devices and users, secure data, modernise applications and optimise your infrastructure. Based on our conversation so far, I believe we should start by helping you optimise your network.” 3. Learn more. For more information about Dell Networking, visit the Partner Portal or contact your local Dell representative. Do you have visibility into which users, devices and applications are consuming resources in your business? How are you planning for the impact BYOD can have on your network performance? • Do you havea guestWiFinetwork? • How is your network handling the bandwidth usage of personal smartphone, tablet and notebook devices? How do you manage BYOD, their users and applications when they are on-site? Do you have separate networks for corporate-owned versus BYOD versus guest devices? Do you have control over policies based on user, device, location, application and time? Confidential

More Related