1 Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE OVERVIEW The volume, velocity and variety of data that businesses and government agencies are expected to manage have become overwhelming. Traditional data management tools simply do not have the reach or capacity to keep up with the size, scope and structure of Big Data. The challenge is finding solutions that provide the ability to move, secure and control information, identities and access to your valuable assets. Today s forward-thinking C-level executives and IT professionals are exploring new ways to integrate, extract, transmit, transform and secure data in the manner required to harness its value across multiple usage patterns. Together, Axway and CA offer the only comprehensive solution set designed to ensure control, compliance, information security and data protection in everything that you do, so you can solve Big Data challenges while protecting your data and your brand. IN THIS WHITE PAPER: Executive Overview Section 1: Big Data Opportunities & Challenges Section 2: Getting A Handle On Big Data Section 3: A Comprehensive Approach Section 4: Why Axway & CA? 1
2 SECTION 1: BIG DATA CHALLENGES & OPPORTUNITIES Big Data is being hailed as a key strategic asset as well as the next frontier for innovation, competition and productivity. It is also quickly overwhelming many businesses and government agencies. DEFINING BIG DATA Data sets whose size and complexity are beyond the capture, management and processing abilities of commonly used data management tools are known as Big Data. Data is generated at a greater velocity and with greater variability than ever before. According to a recent McKinsey Global Institute (MGI) report on Big Data: In 15 of the U.S. economy s 17 sectors, companies with more than 1,000 employees store, on average, over 235 terabytes of data more data than is contained in the U.S. Library of Congress. 1 Organizations are increasingly tasked with moving, managing, processing, analyzing and protecting data stores comprised of structured, unstructured and raw data, which can measure in terabytes and petabytes (potentially scaling to exabytes and zettabytes). However, experts such as Gartner note that volume represents only one aspect of the Big Data challenge. In a recent report on Big Data, Gartner analysts outline 12 distinct dimensions of extreme information management including velocity, volume, variety, complexity and classification. They point out that, Information managers may be tempted to focus on volume alone when they are losing control of the access and qualification aspects of data at the same time. If they do focus too narrowly, their enterprises will have to make massive reinvestments within two or three years to address the other dimensions of big data. 2 Today s increasing volume of data is coming at high velocity from multiple directions. Data is being transferred not just from machine-to-machine and application-to-application; it is also passing from human-to-human and human-tomachine via multiple portals. New information channels, including social media networks, mobility, text messaging, edge devices, instant messaging (IM) and location-based services, are generating huge volumes of non-traditional data, which must be managed and secured. While structured data is already contained in a database and is organized in fixed fields within a record or file, unstructured or raw data is not. It is typically unorganized, unprocessed data that does not reside in a fixed location. Free-form text from word processing documents, video and audio files, messages and Web pages are great examples of unstructured data, and further illustrate the wide variety and complexity of data that organizations are tasked with managing, moving and securing today. Big Data can mean big money. MGI estimates that the U.S. healthcare industry could generate more than $300 billion in value every year by harnessing data related to quality of care, patient history and success rates. Government administration in developed European economies could save more than 100 billion ($149 billion) in operational efficiency improvements alone by leveraging Big Data. And, in the private sector, retailers using Big Data could increase operating margins by more than 60 percent. 3 2
3 However, Big Data can also mean big risk. Financial and legal risks abound for companies and agencies charged with protecting sensitive data, managing financial transactions and complying with laws and regulations mandated by the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act, European Union privacy laws and more, which restrict the use, collection, storage and transfer of personal data. The 2010 Annual Study: U.S. Cost of a Data Breach, released in March 2011 by The Ponemon Institute, a privacy and information management research firm, found that the cost of data breach incidents to U.S. companies across multiple industry sectors averages $214 per compromised customer record. Moreover, the number of breaches due to lack of compliance with a company s security policies on the part of employees and/or company partners rose 41 percent from 2009 to Legal costs and fines, civil suits and damage to an organization s reputation or brand can quickly add up to millions or even billions of dollars in damages and lost revenue. Big Data may be a relatively new problem, but the costs and inherent risks of moving, transforming and protecting data assets are impossible to ignore. SECTION 2: GETTING A HANDLE ON BIG DATA Regardless of their size or mission, companies and government agencies must securely exchange vast amounts of data with their partners, suppliers, customers and constituents. Today s CEOs, CIOs, Compliance Officers, Security and Data Professionals working in multiple industries are all looking for new ways to manage the secure transmission of Big Data and each industry has a unique set of challenges. In the financial industry, data transmission includes securing payments, invoices, cash transfers and more, involving multiple businesses, partners and customers. Healthcare organizations must protect patient information and create health information and insurance exchanges that incorporate HIPAA compliance mandates. Utility companies must ensure critical infrastructure protection. Government agencies need to move highly sensitive data under the highest levels of encryption. Businesses are working to improve the efficiency of their supply chain ecosystems, and also want to take advantage of virtualized infrastructure and make the cloud a safe and trusted place to conduct business. Across all industries and government segments, compliance and audit concerns, data black holes, limited reporting capabilities, change management issues, lack of centralized control and process breakdowns plague the most sophisticated organizations. Regardless of industry or data type, organizations must also be able to deliver the right information, in the right context, to the right people, at the right time. Traditional Enterprise Data Warehouses (EDW) and Business Intelligence (BI) tools often lack the visibility and transparency required to move, monitor, track, analyze and manage exceptions across all types of data interactions. In order to capture and capitalize on the value of Big Data, business enterprises and government agencies must be able to integrate, extract, transmit and transform data safely in real time across multiple usage patterns, including business-to-business (B2B) and application-to-application (A2A) portals, as well as ad hoc human-to-machine and human-to-human collaborative interactions. 3
4 To get a handle on the secure transmission of Big Data, and match the right solutions to appropriate data usage patterns, organizations must first ask themselves several pointed questions: 1) What kind of information must be exchanged? Information may include files, orders, utility meter readings, payments, invoices, financial data, pricing, proprietary data and more. Understanding the type of information that you need to share is the first step toward implementing solutions and processes required to safely transmit and protect your data assets. 2) What are you connecting? Are you extracting or moving data from internal applications, automated systems, external gateways or human interfaces? Knowing where your data is coming from is essential to moving and securing it effectively. 3) Where is the information going? With whom will you be sharing your data? Communities of partners, vendors, suppliers, retailers, distributors, customers and constituents all have different needs and requirements when it comes to the secure transmission of data. 4) What do you need to manage this? Every organization has different priorities regarding the secure transmission of data. Are you most interested in establishing reliability, visibility, security, compliance, accuracy, integration, governance, flexibility or all of the above? 5) What is the value of your information? It is important to understand the value of your data, and more importantly, what it is worth if it is compromised or breached. You must also understand that SLAs require the control and management of the data that underpin business critical applications. Many big data strategies arise when executives feel an urgent need to respond to a threat, or see a chance to disrupt an industry s value pools. Once you have the answers to these questions, you can work with experts in the transmission and security of Big Data like Axway and CA Technologies to create secure data exchanges, as well as set and enforce global, consolidated policies that enable both business and IT users to see, analyze and proactively manage all of the different types of interactions happening within them. 4
5 SECTION 3: A COMPREHENSIVE APPROACH Trying to secure and manage the movement of data in different channels with piecemeal solutions doesn t work. Instead, organizations need both technology and governance to speed and secure interactions by optimizing the way information is moved, managed and protected both within and outside the enterprise. Axway and CA Technologies are working closely together to address Big Data challenges, delivering a combined, comprehensive solution set that controls identity, access and information along with governance for heavily regulated and/or serviceoriented industries, including Financial Services, Automotive, Manufacturing/ Consumer Packaged Goods, Retail, Healthcare, Life Sciences, Technology, Transportation/Logistics, Public Sector and more. By taking a comprehensive approach to Big Data, Axway and CA do more than simply help you manage the volume of Big Data. Our solutions also solve velocity, variety, complexity and classification challenges that next generation data warehousing and analysis tools fail to address. KEY BENEFITS Enhanced Data Visibility, Transparency & Tracking Adaptive Community Management Real Time SLA Management for Data Control of Identity & Access to Data Data Protection and Control (DLP) Data Governance, Risk and Compliance Full Audit and Reporting Continual Data Process Improvement Cloud Enablement and Readiness Axway handles the secure movement of Big Data across multiple usage patterns, which is unique among solution providers. Together, Axway and CA create communities and secure data exchanges designed specifically to streamline and protect the transmission of Big Data, as well as help you implement enforceable governance policies that structure the interactions in your trading community and ensure robust Data Loss Prevention. To effectively secure the transmission of Big Data across every possible data usage pattern, Axway provides: Managed File Transfer (MFT) for secure, auditable and easy-to-manage B2B, Application-to-Application (A2A) and Ad Hoc information exchange within existing infrastructures. Business-to Business (B2B) for automating and integrating supply or value chain activities such as order processing, delivery, invoicing and payments, which can involve multiple business partners and customers. Integration for orchestrating end-to-end enterprise application integration and data exchanges, both within your organization and with your trading community of external partners, suppliers and customers. and Identity Security to reduce the risk introduced by human-to-machine and human-to-human interactions by: o safeguarding inbound and outbound traffic, o simplifying file attachment management, o preventing data loss, o ensuring compliance with corporate policies and government regulations through policy-based security, real-time identity validation and encryption. 5
6 Axway also offers multiple CA Technologies security solutions, such as Single-Sign- On (SSO), Identity and Access Management (IAM), federated identity, multi-level authentication and data loss prevention. These capabilities, combined with Axway s industry-leading secure data transmission, visibility, compliance and community management solutions, provide powerful ROI and governance to organizations. To meet the needs of any business organization or government, Axway and CA offer flexible, scalable file management options, including Cloud, hosted/saas, Virtualization, On-Premise Appliances and Software. Axway and CA also provide the superior professional and managed services enterprises require to rapidly assess, deploy and configure their chosen solutions. 6
7 SECTION 4: WHY AXWAY & CA? Thousands of organizations across the globe, including the majority of the Global 500, rely on Axway and CA to achieve the securely managed transmission, monitoring, integration and access control capabilities necessary to manage Big Data in today s competitive global market and regulatory climate. Axway s flexible, extensible technologies control the movement, management and transmission of Big Data and CA s security solutions control identity and access to Big Data. Together, Axway and CA have created powerful exchanges for the secure transmission of Big Data for some of the largest financial organizations in the world, global healthcare providers, telecommunications and utility companies, retailers, enterprises doing business in the cloud and government agencies requiring the highest levels of encryption. With Axway and CA, it is finally possible to gather and integrate Big Data and create a shared services framework that allows the secure transfer of data and guarantees the delivery of information to the right people at the right time, even via the cloud. To learn more about how Axway and CA can help you secure, manage and control Big Data, contact us today: CONTACT US TO LEARN MORE Phone: (855) McKinsey Global Institute. Big Data: The Next Frontier for Innovation, Competition and Productivity. May Gartner, Inc. Big Data is Only the Beginning of Extreme Information Management. April McKinsey Global Institute. Big Data: The Next Frontier for Innovation, Competition and Productivity. May The Ponemon Institute Annual Study: U.S. Cost of a Data Breach. March
8 For More Information, visit Copyright Axway All rights reserved.