Connected Intelligence and the 21 st Century Digital Enterprise

Size: px
Start display at page:

Download "Connected Intelligence and the 21 st Century Digital Enterprise"

Transcription

1 Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015

2 By 2025 we will become a deeply connected, digital world Digital everything everywhere, everyday, everyone connected 1 Transforming how we live and work Generating new digital ecosystems and insights Creating new business models and lowering barriers to entry Disrupting every business, in every industry 2 Sources: 1,2: IP & Science business of Thomson Reuters The world in predictions in innovation, 2014

3 Connected devices are changing business processes and people s lives Asset tracking Security Traffic lights Roadside equipment Pumps Fire & emergency Driver behavior Air quality Noise Electricity switch Lighting Product delivery Product electronics & entertainment Digital signage Telecom infrastructure Air con Vehicle leasing Water distribution Vibration Access control 3

4 SMART DEVICES Intelligence everywhere Everyday devices are infused with intelligence that is updated in real time. security devices parking control shopping trolley SENSORS constantly connected. Everything we own is connected to the Internet. shopping displays automated factories wearable monitors house control cooking smart power TVs cars kitchen appliances fire sensors medical robots TABLETS road-side sensors SMART PHONES exercise machines poaching sensors wearable devices Enable Business to create entirely new value propositions smart phones

5 Creating new waves of opportunity New types of applications New Style of Business New approaches to IT operations New demands & uses for insight New customers and buying behaviors New consumption models New revenue streams New threats and risks 5

6 IT organizations must become value creators Lower cost of doing business Host workloads & applications Provide hardened systems & networks Manage data Generate business outcomes Rapidly create and broker new services Predict threats and manage risk Provide real-time insight and understanding Respond and react Continuously deliver 6

7 Information + Applications are the Product and IT is the vehicle that will make or break your success

8 Everyone will expect more apps, delivered more quickly your customers, your partners, your users, your boss releases per year releases per year releases per year Steady Stream of Improvement Thanks to consumerization, users now expect continuous improvements to apps rather than the traditional annual mega-updates

9 and do it simply, securely, and collaboratively.

10 It will be a journey Data Center in silos Converge & Modernize Automate Tasks Orchestrate Processes Transform Delivery Hybrid Cloud Analytics

11 But the mission is a critical one Supply from anywhere IT becomes an internal service provider Business is Enabled Off Premise Fast & easy access to IT resources On Premise Continuous IT Service Delivery Application innovation 11

12 Hybrid IT is not easy confidence 100% 80% 60% 40% 20% 0% Managing mosaics of services Year IT execs expect to manage business processes confidently across services spanning data centers and public and private clouds. And yet, less than 20% of companies have an active IT as a Service Broker policy. (Gartner 2014)

13 We must automate in order to scale. Expected automation of IT Operations By 2020 the majority will have shifted to automation Today 2020 No Automation Up to 1/4 1/4 to 1/2 1/2 to 3/4 3/4 to all 6% 45% 35% 12% 2% 1% 2% 12% 49% 35%

14 We will need to break down silos between Developers, QA and Operations. A single-model DevOps system This approach allows IT Ops to better manage application performance, compliance, security, change and backup and recovery

15 Enabling rapid delivery of amazing customer experiences across mobile, cloud & traditional apps

16 The value will come from the information that s hardest to manage Wearable Headband Glasses Ear-mounted cameras Mood sweater Gait-sensing shoes Type of data generated Brain sensing headband Augmented reality Live streaming of select content Projects my mindset in advance Controls my stride

17 Human data Volume of data Big Data shift Mobile apps System logs Data centers Compliance archives Internet of Things Sensors Technology gap Machine data Business data Social networking Data Photo sharing Wearable devices Time

18 HP Haven platform Turn 100% of your data into action. Human data Machine data Haven Business data

19 HP Haven platform HP applications Customer applications Developer applications Platform ecosystem Services Over 850 trained professionals Developers Over 6,000 developers Partners Over 200 platform partners Delivery Over 10,000 customer implementations Haven Defined programming interfaces Analytics, indexing, context and categorization Scalable data stores Data connectors Social media Video Audio Texts Mobile Transactional Documents IT/OT Search data engine Images Records Compliance archives

20 Powerful software for information management and governance Information Management & Governance Solutions Archiving & ediscovery Compliance Litigation Readiness Storage Optimization Database Archiving ediscovery Supervision Legal Hold Enterprise Content Management Records Mgmt. Legal Content Mgmt. Business Process Mgmt. Document Mgmt. Records Mgmt. Legacy Clean Up Data Protection Server Data Protection Virtual Machine Data Protection Remote & Branch Office Data Protection Endpoint Device Data Protection Cloud Data Protection

21 (IoT) devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries

22 70% used unencrypted network services 70% allow an attacker to identify valid user accounts through account enumeration 90% collected at least one piece of personal information 100% of security systems and 80% of IoT devices don t require sophisticated passwords 6 of10 had user interfaces vulnerable to issues such as persistent XSS and weak credentials

23 HP Software for the Attack Life Cycle Research Research potential targets Threat Intelligence HP Security Research Infiltration Phishing attack and malware Block Adversary HP TippingPoint HP Fortify Monetization Data sold on Black Market Discovery Mapping breached environment Detect Adversary HP ArcSight Exfiltration/Damage Exfiltrate/destroy stolen data Action HP Services HP Info Governance Capture Obtain data Protect Data HP Atalla HP Voltage Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

24 Leaders across the portfolio according to Gartner and Forrester App Delivery Cloud Security Big Data - Solutions Big Data - Platform Gartner Magic Quadrant Integrated Software Quality Suites Forrester ranked HP top for private cloud Gartner Magic Quadrant Application Security Testing Gartner Magic Quadrant Enterprise Information Archiving Gartner Magic Quadrant Enterprise Search HP HP HP HP

25 HP Software: The Power to Act Now

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence

More information

IoT and Distributed Mesh Computing

IoT and Distributed Mesh Computing IoT and Distributed Mesh Computing Connected Cloud Summit Bobby Patrick CMO, HP Cloud September 18, 2014 Connected devices are changing business processes and people s lives Security Pumps Air quality

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Improving Customer Communications by Proper Personalization

Improving Customer Communications by Proper Personalization Improving Customer Communications by Proper Personalization Paweł Walczak Commercial Account Manager for CEE HP Exstream March 13, 2015 The Customer is the most important. There is just one boss. The customer.

More information

Find the intruders using correlation and context Ofer Shezaf

Find the intruders using correlation and context Ofer Shezaf Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find

More information

Discover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management

Discover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management Discover 2014 Update Big Data changes everything Roy Ritthaler Vice President, IT Operations Management 2014 By 2020 Every 60 seconds 98,000+ tweets 695,000 status updates 11million instant messages 698,445

More information

HP Software, Big Data Rethinking Data Protection

HP Software, Big Data Rethinking Data Protection HP Software, Big Data Rethinking Data Protection EPIC Technology Day, November 19 th, 2014 HP Software The 6th largest software company in the world Applications Delivery Management IT Operations Management

More information

Digitization of Enterprise - New Style of IT

Digitization of Enterprise - New Style of IT Digitization of Enterprise - New Style of IT Neeraj Tolmare Oct 2014 What happens in an Internet Minute? 20 identity thefts 20 million photo views 1.3 million video views 6 million Facebook views 100,000

More information

Innovation Session. MOBILITY Pieter Schouten. HP EMEA Software Performance Tour 2014

Innovation Session. MOBILITY Pieter Schouten. HP EMEA Software Performance Tour 2014 HP EMEA Software Performance Tour 2014 Innovation Session MOBILITY Pieter Schouten Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015 Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted HP Atalla Data-Centric Security & Encryption Solutions Jean-Charles

More information

Security Operation Centre 5th generation

Security Operation Centre 5th generation Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

The transformation of client device and the rise of cloud computing

The transformation of client device and the rise of cloud computing The transformation of client device and the rise of cloud computing 客 戶 端 設 備 的 轉 化 和 雲 端 運 算 的 崛 起 Jason Lui HP Inc. Agenda 1. Some Definition & Industry Trends 2. Trend for Client end in Cloud Computing

More information

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Mobility Exploiting and Maintaining the New Face of Engagement Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

Cloud Application Success for Joint and Combined Operations

Cloud Application Success for Joint and Combined Operations Cloud Application Success for Joint and Combined Operations NITEC 2015 - Madrid Roger Mallett CSAM; CHAMP; CITAM; SIIP-F; IAITAM Fellow Senior Architect, Strategy & Technology Team HP Software EMEA Copyright

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg

(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg (S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back Johannesburg Bharat Mistry Security Chief Technologist HP Enterprise Security Tweet using #HPWorldZA Johannesburg

More information

Assuring Application Security: Deploying Code that Keeps Data Safe

Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,

More information

Managing the Challenges of Cloud Management November 7, 2013

Managing the Challenges of Cloud Management November 7, 2013 Copyright 2013 Vivit Worldwide Managing the Challenges of Cloud Management November 7, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Mihai Grigorescu Vivit Chapter Leader South Africa

More information

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul

More information

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing

More information

Digital Citizen Services & Security

Digital Citizen Services & Security Digital Citizen Services & Security Tony West Unisys May 2016 2016 Unisys Corporation. All Rights Reserved. Unisys provides a range of solutions to address the drive toward Digital Citizens and Government

More information

Bezpečnosť dát v HP Cloude

Bezpečnosť dát v HP Cloude Bezpečnosť dát v HP Cloude Ochrana dát a súkromia v cloudových službách Február 2013 Agenda TRENDY RIEŠENIA HP PRÍKLADY 2 Security awareness at board level Security leadership is under immense pressure

More information

Mobile Enterprise and IPv6 Consumerization of IT

Mobile Enterprise and IPv6 Consumerization of IT Mobile Enterprise and IPv6 Consumerization of IT Yanick Pouffary Distinguished Technologist - Technology Services - Networking HP IPv6 Global Leader April 18, 2013 Copyright 2012 Hewlett-Packard Development

More information

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies. HP CLOUD SYSTEM The most complete, integrated platform for building and managing clouds featuring Intel technologies Presenter Title 2010 2011 Hewlett-Packard Development Company, L.P. The information

More information

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Big Data nichts ist mehr wie es war Ulrich (Ulli) Pfeiffer Director and CT HP Software EMEA Volume of data Information Gap Mobile apps System logs Data centers Compliance archives Internet of Things Industrie

More information

Internet of Things and Wearables Driving the next phase of growth in Computing

Internet of Things and Wearables Driving the next phase of growth in Computing Internet of Things and Wearables Driving the next phase of growth in Computing Sridhar Solur Director, Next Gen Computing and Cloud Services, Mobility GBU, Printing & Personal Systems Population penetration

More information

Simple, scalable and secure unified wired and wireless networking

Simple, scalable and secure unified wired and wireless networking Simple, scalable and secure unified wired and wireless networking The only Complete BYOD solution Lars Kølendorf Head of Wireless Business HP Networking EMEA Email: lars@hp.com Copyright 2012 Hewlett-Packard

More information

Big Data Analytics- Innovations at the Edge

Big Data Analytics- Innovations at the Edge Big Data Analytics- Innovations at the Edge Brian Reed Chief Technologist Healthcare Four Dimensions of Big Data 2 The changing Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human

More information

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China Welcome to Services Discovery Channel Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China Connecting Analytics to Insight Are You Ready? Keynote Speakers: Mike Riegel, VP,

More information

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

HP and the Intelligent Service Desk (SPM Product Updates) March 6, 2014

HP and the Intelligent Service Desk (SPM Product Updates) March 6, 2014 Copyright 2014 Vivit Worldwide HP and the Intelligent Service Desk (SPM Product Updates) March 6, 2014 Brought to you by Copyright 2014 Vivit Worldwide Hosted by Laura Walker Vivit Director HP Service

More information

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Copyright 2013 Vivit Worldwide Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Brought to you by Vivit Cloud Builders Special Interest Group (SIG) Jim Murphy Cloud

More information

Circuit Protection is Key in Maintaining Growth for The Internet of Things

Circuit Protection is Key in Maintaining Growth for The Internet of Things Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this

More information

Public, Private, Hybrid:

Public, Private, Hybrid: Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud

More information

Successful Data Management Strategies for the Modern Data Center & Beyond

Successful Data Management Strategies for the Modern Data Center & Beyond Successful Data Management Strategies for the Modern Data Center & Beyond May 3 rd 2016 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. Business Dynamics and Challenges Budget Constraints Lines of Business

More information

HP Converged Infrastructure & Cloud

HP Converged Infrastructure & Cloud HP Converged Infrastructure & Cloud Mark Linesch Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. A new style of IT emerging

More information

A NEW KIND OF ENTERPRISE

A NEW KIND OF ENTERPRISE A NEW KIND OF ENTERPRISE David McMurdo ISS Sales & Business Unit Manager 23 rd February 2011 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown

More information

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges

More information

The digital future for entertainment and media.

The digital future for entertainment and media. What digital means for entertainment and media and why the network is key to success. The digital future for entertainment and media. Time to press play Few sectors have been so radically transformed by

More information

Big Data Analytics: Today's Gold Rush November 20, 2013

Big Data Analytics: Today's Gold Rush November 20, 2013 Copyright 2013 Vivit Worldwide Big Data Analytics: Today's Gold Rush November 20, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Bernard Szymczak Vivit Leader Ohio Chapter TQA SIG Copyright

More information

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app

More information

Delivering Quality Service with IBM Service Management

Delivering Quality Service with IBM Service Management Delivering Quality Service with IBM Service Milos Nikolic, Global Technology Services Manager Dragan Jeremic, Technical Sales Specialist for Tivoli December 10th 2008 Innovation is the Process, Success

More information

HP IT Operations Management (ITOM)

HP IT Operations Management (ITOM) HP IT Operations Management (ITOM) Powered by Big Data and automation Ajay Singh, Senior Vice President and General Manager, IT Operations Management Software, HP Software September 18, 2013 Old Style

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

HP Cloud technologies

HP Cloud technologies HP Cloud technologies ari.saareks@hp.com Cloud & Presales Manager Finland & Baltics 1 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Hewlett Packard Securities Analyst Meeting 2015. #hpesam2015

Hewlett Packard Securities Analyst Meeting 2015. #hpesam2015 Hewlett Packard Securities Analyst Meeting 2015 #hpesam2015 1 Software Robert Youngjohns Executive Vice President and General Manager Executive summary Software is delivering consistent revenues with high

More information

What s New With HP Service Manager and Universal CMDB December 18, 2014

What s New With HP Service Manager and Universal CMDB December 18, 2014 What s New With HP Service Manager and Universal CMDB December 18, 2014 Copyright 2014 Vivit Worldwide Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide Hosted by Laura Walker

More information

Investor Presentation. Second Quarter 2015

Investor Presentation. Second Quarter 2015 Investor Presentation Second Quarter 2015 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences

More information

Gain big value from Big Data - Govern the information

Gain big value from Big Data - Govern the information Gain big value from Big Data - Govern the information Pawel Walczak HP Exstream Robert Lejnert (mental support) HP Software Big Data Volume of data Human data Data Big Data shift Mobile apps System logs

More information

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD

More information

HP S POINT OF VIEW TO CLOUD

HP S POINT OF VIEW TO CLOUD HP S POINT OF VIEW TO CLOUD Frank Bloch Director Technology Consulting 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice 3 GLOBAL MEGA

More information

Information Archiving

Information Archiving Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive

More information

The Internet of Things

The Internet of Things The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs cvetor@us.ibm.com More and more of the world s activity

More information

Luka Markota. Enterprise Networking, Central Europe. April 2015

Luka Markota. Enterprise Networking, Central Europe. April 2015 Luka Markota Enterprise Networking, Central Europe April 2015 The Customer Journey Can you make the leap? Today Digitisation IoT/IoE 2015 000100101011010101001001001001000101 101001010011100100101010001001001010

More information

Big Data ça change tout. Colin Mahony SVP & GM, HP Software Big Data

Big Data ça change tout. Colin Mahony SVP & GM, HP Software Big Data Big Data ça change tout Colin Mahony SVP & GM, HP Software Big Data 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3/20/2015

More information

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Jim Wittry HP Cloud Partner Business Manager Jim.wittry@hp.com http://www8.hp.com/us/en/cloud/helion-overview.html Copyright 2014

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Please give me your feedback

Please give me your feedback Please give me your feedback Session DT4691 Speaker Brent Juelich Use the mobile app to complete a session survey 1. Access My schedule 2. Click on this session 3. Go to Rate & review If the session is

More information

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD 2 Unless you operate out of a cave, chances are your

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information

Hybrid Cloud Architectures for Operational Performance Management

Hybrid Cloud Architectures for Operational Performance Management Hybrid Cloud Architectures for Operational Performance Management Delbert Murphy Solution Architect / Data Scientist Microsoft Corporation GPDIS_2014.ppt 1 Delbert Murphy and Microsoft s Data Insights

More information

Enabling Digitization with Next Generation Cloud

Enabling Digitization with Next Generation Cloud Enabling Digitization with Next Generation Cloud Nick Earle SVP, Global Cloud and Managed Services, Cisco December 10, 2015 Live tweeting? I m @nearle Cisco Is Changing of deferred revenue is software

More information

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA SaaS Packaged applications Employees IT metrics/analytics Storage Public cloud Security Challenges for IT Environments are

More information

Welcome. Lynn Anderson Senior Vice President, Communications

Welcome. Lynn Anderson Senior Vice President, Communications Welcome Lynn Anderson Senior Vice President, Communications Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Extends Converged

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

How the Internet of Things Will Transform the Manufacturing Industry

How the Internet of Things Will Transform the Manufacturing Industry How the Internet of Things Will Transform the Manufacturing Industry Dinesh Malkani President, Cisco India & SAARC February 26, 2015 By 2018, Video will be 62% of India's mobile data traffic India Is Ready

More information

The State of Application Delivery in 2015

The State of Application Delivery in 2015 The State of Application Delivery in 2015 a report by F5 f5.com/soad 1 Introduction F5 surveyed customers from more than 300 organizations (of all sizes) across a broad spectrum of vertical markets such

More information

The Amazing Future of the IoE

The Amazing Future of the IoE The Amazing Future of the IoE Shaun Kirby CTO, Cisco Consulting Services November 2014 The Internet of Everything: People, Process, Data, and Things People Connecting people in more relevant, valuable

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY? CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY? Jennifer Ellard HP Session ID: SPO-W01B Session Classification: General Interest Agenda What is hype? What we hear from you? Separating

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services Solution brief An integrated and open platform to build and manage cloud services The industry s most complete cloud system for enterprises and service providers Approximately every decade, technology

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

Your New Cloud Storage Business. Three solutions that will impact your organization

Your New Cloud Storage Business. Three solutions that will impact your organization Your New Cloud Storage Business Three solutions that will impact your organization Agenda Infrascale Overview: Our company and our platform What Infrascale technology can do for you Security and encryption

More information

Industrial Automation. A Manufacturing Revolution in Automotive and Industrial Equipment

Industrial Automation. A Manufacturing Revolution in Automotive and Industrial Equipment Industrial Automation A Manufacturing Revolution in Automotive and Industrial Equipment 1 Automated production, integrated end-to-end: transparent, reliable, predictable and efficient. That s the promise

More information

2014 DATA CENTER TRENDS

2014 DATA CENTER TRENDS 2014 DATA CENTER TRENDS CONTENTS Overview _2 Small and Medium Business Move-In 3 Cloud computing use continues to grow _ 4 the internet of things gaining speed _ 5 disaster recovery is a necessity _ 7

More information

Connected Manufacturing

Connected Manufacturing Connected Manufacturing The Internet of Things: Connecting the Unconnected Robert Dean, Executive Director, Business Transformation, Manufacturing Industry May 14, 2015 The Internet of Everything (IoE)

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

HP Microsoft. Unified Communications & Collaborations. Francisco Martinez. Alfredo Alvarez. UC Architect Microsoft. Solutions Architect HP Networking

HP Microsoft. Unified Communications & Collaborations. Francisco Martinez. Alfredo Alvarez. UC Architect Microsoft. Solutions Architect HP Networking HP Microsoft Unified Communications & Collaborations Francisco Martinez UC Architect Microsoft Alfredo Alvarez Solutions Architect HP Networking 2011Hewlett-Packard Development Company, L.P. The information

More information

Surak Thammarak. Advisory Systems Engineer EMC. surak.thammarak@emc.com +668-1700-6333

Surak Thammarak. Advisory Systems Engineer EMC. surak.thammarak@emc.com +668-1700-6333 Surak Thammarak Advisory Systems Engineer EMC surak.thammarak@emc.com +668-1700-6333 1 2 ?? Today s Life?? - ส งคมก มหน า 3 4 Gartner and IDC Mobile Platform 5 The DIGITAL UNIVERSE of OPPORTUNITIES 6 Digital

More information

Designing, Building and Deploying Hybrid and Private Clouds

Designing, Building and Deploying Hybrid and Private Clouds Designing, Building and Deploying Hybrid and Private Clouds James Robinson Enterprise Solution Specialist George Dobson Partner Business Manager Agenda Factors driving IT transformation to cloud architectures

More information

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation

More information

Securing The Hyper-Connected Cloud

Securing The Hyper-Connected Cloud Securing The Hyper-Connected Cloud Alvin Rodrigues, Market development director South East Asia and Hong Kong arodrigues@fortinet.com Copyright Fortinet Inc. All rights reserved. The rise of a new IOT

More information

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Modern Data Management & Intelligent Archive Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Agenda Who is CommVault? Why CommVault? Microsoft and CommVault Cloud Use Cases A Brief History

More information

From the Bottom to the Top: The Evolution of Application Monitoring

From the Bottom to the Top: The Evolution of Application Monitoring From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Finding the right cloud solutions for your organization

Finding the right cloud solutions for your organization Finding the right cloud solutions for your organization Business white paper If you manage technology today, you know the story: everything is mobile, connected, interactive, immediate, and fluid. Expectations

More information

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The image part with relationship ID rid2 was not found in the file. Insight

More information

DAY 1 MONDAY, SEPT 28 2015

DAY 1 MONDAY, SEPT 28 2015 MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information