Cloud, Big Data, Mobile, Social and Security
|
|
|
- Nora Beasley
- 10 years ago
- Views:
Transcription
1 IBM Software Group 2014 Cloud, Big Data, Mobile, Social and Security Pairoj Ruamviboonsuk Software Client Architect IBM SWG Thailand
2 Igniting change the transformative power of computing Back-office computing Client server PC World Wide Web and e-business Big data, social, mobile and cloud We are here IBM Software Group
3 Evidence - of this shift is everywhere Transactions to personalized engagement Millions of PCs to billions of mobile devices Rigid infrastructure to an elastic cloud Structured data to unstructured big data Static applications to dynamic services Reactive security to proactive protection IBM Software Asean
4 Data the new natural resource & new basis of competitive advantage Percentage of uncertain data We are here. Sensor & Devices Social Media 3000 Voice Over IP Enterprise Data Strategic Imperative: Make Markets by transforming industries and professions with data Source: IBM Global Technology Outlook IBM Software Asean
5 Automate Embed volume - velocity - variety - veracity Plan Collaborate Big Data & Analytics the value is in actionable Data Acquisition Context Analyze/Embed Moment of Impact Data Traditional data warehouse, transactions, descriptive Distributed datamarts, spreadsheets Big Data Unstructured notes, logs Social Media pulse, emerging issues Survey Research attitudes, opinions Sense-making Creates New Value from Actionable Insight / / Model Scale Simplify What-if? DECISIONS New Mix of Data Broader Application New Buyers & Decision Types Mobile ACTION Dashboard Case Management moment of decision applied analytics Insight Sensors people, process
6 IBM Big Data & Analytics platform All Data Information Ingestion & Operational Information Zone IBM Big Data & Analytics Platform Real-time Analytics Zone Exploration, Landing & Archive Zone Enterprise Warehouse, Data Mart & Analytic Appliance Zone Cognitive Decision Management Predictive Analytics & Modeling Reporting, Analysis, Content Analytics New/ Enhanced Applications Information Governance Zone Exploration & Discovery IBM Big Data & Analytics Infrastructure Systems, Security, Storage 6 IBM Software Asean
7 Multiple entry points All Data Information Ingestion & Operational Information Zone IBM Big Data & Analytics Platform InfoSphere Streams Real-time Analytics Zone InfoSphere BigInsights Exploration, Landing & Archive Zone Enterprise PureData Warehouse, Systems Data Mart & Analytic Appliance Zone DB2 BLU Enterprise Content Management Cognitive Decision Management Predictive Analytics & Modeling Reporting, Analysis, Content Analytics New/ Enhanced Applications Information Governance Zone InfoSphere Information Server Exploration & Discovery Master Data Management IBM Big Data & Analytics Infrastructure InfoSphere Guardium Systems, Security, Storage InfoSphere Optim IBM Watson 7 IBM Software Asean
8 s sp corp flexibi #users size speed corpus flexibility #users size speed corpus flexibility #users Watson has opened up a world of new possibilities 2880 cores Single user system 2-3 sentences input 5+ days to retrain Wikipedia, general corpus Single Power 750, 240% faster 1000s of users 20 pages of input < Day to ingest and train Medical corpus Watson cloud service Millions of users Dialog chaining Few hours Broad industry corpus 201
9 Watson is cognitive computing Watson understands me. Watson engages me. Understands natural language Watson learns and improves over time. Watson helps me discover. Watson establishes trust. Watson has endless capacity for insight. Watson operates in a timely fashion. Adapts and learns Generates and evaluates hypotheses
10 Announcing The Watson family IBM Watson Solutions Bespoke solutions designed to meet some of industries most demanding needs leveraging cognitive capabilities IBM Watson Advisors IBM Watson Ecosystems Products based on Watson s core attributes and capabilities IBM Watson Cognitive Fabric APIs, tools, methodologies, SDKs, and infrastructure that fuels Watson IBM Watson family IBM Watson Foundations The Watson Developer Cloud, Watson Content Store and Watson Talent Hub driving innovation from partners Provides the big data and analytics capabilities that fuel Watson
11 Mobile Adoption Continues to Explode 41% CAGR Wearable Wireless Devices 1 Trillion Connected Devices 5.6 Billion Personal Devices Sold IBM Software Asean
12 Mobile Is Changing Interactions And How Work Gets Done People are transacting on mobile The average mobile phone user checks their phone 150 times a day This data is helping organizations deliver new value By 2020, 90% of new passenger cars sold will have some form of vehicle mobile platform, up from 10% in But the experience of mobile is not yet meeting expectations 80% of apps are used once then deleted Mobile transactions are generating unprecedented amounts of data Global mobile data traffic will increase 26-fold between 2010 and 2015, reaching 6.3 exabytes per month by 2015 Mobile enterprises leverage this data, putting the right information into the right hands at the right times By 2015, 2/3 of the workforce will own a smartphone, and 40% of the workforce will be mobile
13 Four Part Strategic approach to helping our clients set their mobile agendas (CxO, LOB Exec) In order to take full advantage of these new mobile opportunities, organizations need comprehensive business-led strategies to maximize their return on investment in mobile capabilities. (CISO, CIO, IT Exec ) Prioritize mobile infrastructure to support an open, secure and scalable environment while addressing the dynamic demands of the enterprise (CMO) Gain visibility into the customer mobile experience to improve conversions and grow revenue, improving customer service resolution and drive customer loyalty 13 (VP Apps, Developer) Making mobility the critical business enabler for future growth and competitive differentiation
14 Strategy & Design Services IBM MobileFirst Can Help You Accomplish Your Mobile Goals Industry Solutions Banking Insurance Retail Transport Telecom Government Healthcare Automotive IBM & Partner Applications Application & Data Platform Management Security Devices Network Servers Analytics Development & Integration Services Cloud & Managed Services
15 What we announced with Apple IBM and Apple will collaborate to address these problems with a set of new offerings tailored for the ios experience MobileFirst for ios MobileFirst Platform for ios AppleCare for Enterprise MobileFirst Supply and Management
16 The Evolution of Cloud Technologies Virtualization I want to get more out of my existing hardware Cloud Enabled I want to move my existing middleware workloads to the cloud Dynamic Hybrid I want to strategically use public and private cloud together. Business Services (SaaS) I want to use an app without having to own it Cloud Native I want to rapidly build new, born on the cloud, engaging applications in a continuous delivery model
17 It is estimated that by 2016 more than one-fourth of the world s applications will be available in the cloud, and 85% of new software is now being built for cloud deployment. Application Aware Service Driven Resource Smart Composable Business On or Off Premise 17 The Composable Business is built on the as a Service environment with a goal of enabling the API economy
18 Client Manages Client Manages Client Manages Cloud Service Models SoftLayer Bluemix IBM Business Service Traditional On-Premises Infrastructure as a Service Platform as a Service Applications Applications Applications Applications Data Data Data Data Runtime Runtime Runtime Runtime Middleware Middleware Middleware Middleware O/S O/S O/S O/S Virtualization Virtualization Virtualization Virtualization Servers Servers Servers Servers Storage Storage Storage Storage Software as a Service Networking Networking Networking Networking Customization; higher costs; slower time to value Vendor Manages in Cloud OpenStack CloudFoundry Vendor Manages in Cloud Vendor Manages in Cloud Standardization; lower costs; faster time to value
19 IBM Cloud marketplace features IBM and Business Partner cloud services and click on Marketplace Comprehensive catalog including both IBM and 3 rd party offerings and supported by multi-billion dollar investments: - Biz (line of business) features IBM s world class SaaS portfolio - Dev (developer) supports traditional application styles (patterns) and new application styles (composable services / Bluemix) - Ops (IT operations) features SoftLayer s high performance infrastructure services Purpose built Solutions (e.g., Mobile, DevOps) help you navigate the catalog Enables IBM customers to discover and experiment with a broad portfolio of offerings in a consistent way
20 SoftLayer provides access to unique capabilities Enterprise class, optimized infrastructure Built using open standards Infrastructure as a Service Compute Storage Networking Performance Web Mobile API Common user interface and application programming interface Gaming and entertainment Flexibility Bare Metal Servers Virtual Server Instances Private Clouds Marketing and digital media Automation Triple Network Architecture seamless communication across distributed environments Infrastructure Management System provides orchestration and automation Enterprise
21 IBM Bluemix A composable services development environment accessible from marketplace Run Your Apps The developer can chose any language runtime or bring their own. Just upload your code and go. DevOps Development, testing, monitoring, deployment and logging tools allow the developer to run the entire application APIs and Services A catalog of open source, IBM and third party APIs services allow a developer to stitch together an application in minutes. Cloud Integration Build hybrid environments. Connect to on-premises systems of record plus other public and private clouds. Expose your own APIs to your developers. Extend SaaS Apps Drop in SaaS App SDKs and extend to new use cases (e.g,. Mobile, Analytics, Web)
22 IBM Cloud Capabilities includes 100+ SaaS offerings, expanding fast Enabling business transformation Business Process as a Service Business process solutions Application Application Application Application Application Marketplace of high value consumable business applications Software as a Service External ecosystem Industry Collaboration Human resources Big Data & analytics Commerce Marketing IT Management Accelerate Business Process Innovation E-commerce Customer self-service Public safety Service delivery Deliver Business Analytics at Point of Impact Digital marketing optimization Pricing, promotion, product mix analytics Procurement analytics Business insights Intelligent city operations Connect People with Collaborative Business Networks Employee and partner collaboration Strategic supply management Product planning and development Talent management
23 Today, the social media revolution has sparked another transformation, forever changing the way people interact and share information Twitter >1.5 billion social networking users globally Google+ Vimeo Vine 25% of search results for the world s top 20 largest brands are links to user-generated content Instagram YouTube Linkedin Pinterest 50% of users access the internet with their mobile device Wordpress Facebook Meetup
24 A new era of human influence is upon us New social technologies are amplifying the innate desires of people to Engage, share knowledge and build relationships Consume and understand complex information Learn from human sensory & instrumented experiences SENSORY ENGAGEMENT COGNITION 24
25 Integrating social into core business functions is creating new opportunities for competitive advantage Customer Service Can achieve 5% reduction in customer defection rate increasing profits by up to 68%. 2 Sales Can increase sales manager revenue by 40% and improve efficiency by up to 50%. 1 HR Can save $2M in recruiting costs. 5 Product Development Can develop and bring new products to market in 1/3 time. 3 Marketing Can achieve 100% increase in market exposure. 4 Source 1: VCC case study, Source 2:Bain & Co, Source 3: Cemex case study, Source 4. Amadori case study; Source 5: Apollo Group case study
26 IBM Social Business Patterns Repeatable methodologies to improve business processes by embedding social capabilities that create business impact Patterns represent modernized processes with dynamic, repeatable and measurable people interactions created by building social into work and life
27 IBM has a market leading portfolio of technology and services to help clients become social businesses
28 A new security reality is here 61 % of organizations say data theft and cybercrime are their greatest threats 2012 IBM Global Reputational Risk & IT Study 70 % of security executives have cloud and mobile security concerns 2013 IBM CISO Survey 83 % of enterprises have difficulty finding the security skills they need 2012 ESG Research $3.5M Average cost of a data breach 2014 Cost of Data Breach, Ponemon Institute % security tools from 45 vendors Mobile malware growth in just one year Juniper Mobile Threat Report IBM client example
29 Security is a board room discussion, and security leaders are more accountable than ever before Sou rce:
30 IBM Security strategy Delivering intelligence, integration and expertise across a comprehensive framework The IBM Security Framework CISO s changing role Security mega trends Advanced threats Cloud Mobile Compliance Skills shortage
31 IBM Security capabilities to help reach security maturity Prevent transactions from malware infected endpoints Predictive analytics Flow analysis Big data workbench Threat modeling Protocol analysis Anomaly detection Virtualization security App state awareness ADVANCED Login challenge questions Device ID rules SIEM Vulnerability management Log management Endpoint / network security management Perimeter security Host security Anti-virus Advanced Threat Cloud BASIC Identity governance Fine-grained entitlements Privileged user management Crown Jewel protection Data governance Hybrid scanning and correlation Mobile app scanning Mobile Compliance User provisioning Access management Directory management Data masking DB activity monitoring Data loss prevention Encryption / key management Web application protection Source code scanning Application scanning
32 IBM Security Integrated capabilities delivered across a comprehensive security framework The IBM Security Framework Detect, analyze, and prioritize threats QRadar Reduce fraud and malware Manage users and their access Discover and harden valuable assets Secure critical business applications Protect infrastructure against attacks Monitor and evaluate today s threats Trusteer Identity and Access Management InfoSphere Guardium AppScan Network and Endpoint Protection IBM X-Force
33 33 IBM Software Asean
34 34 Next : IBM Cloud Orchestrator Demonstration Two Offerings Cloud Orchestrator On Premise Cloud Orchestrator On Cloud Need of deep customization and integration into the enterprise Need to control the management infrastructure Choice of Managed Cores and Managed Virtual Server pricing, perpetual or fixed term licensing Manages to on-prem and off-prem resources Organizations looking for a low CAPEX solution Cost sensitive organizations requiring an agile pricing model monthly pricing per managed virtual server Need to gain early access to new capabilities Manages to on-prem and off-prem resources Total Flexibility start where you want and move when you want to the other model. IBM Confidential :: 2014 IBM Corporation
Analytics In the Cloud
Analytics In the Cloud 9 th September Presented by: Simon Porter Vice President MidMarket Sales Europe Disruptors are reinventing business processes and leading their industries with digital transformations
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data IBM Software Group Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL
Securing the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: [email protected] 12015 IBM Corporation Cloud is rapidly transforming
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Innovate with the Cloud built for Cognitive Business - IBM Cloud.
Innovate with the Cloud built for Cognitive Business - IBM Cloud. Nancy Pearson Vice President Corporate Marketing Cognitive Business Sandy Carter General Manager IBM Cloud Ecosystem and Developers What
Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security
Staying Ahead of the Cyber Security Game Nigel Tan ASEAN Technical Leader IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED Cyber Criminals Use BUSINESS INTELLIGENCE NOBODY IS IMMUNE
Cloud Security. Vaughan Harper IBM Security Architect
Cloud Security Vaughan Harper IBM Security Architect A new security reality is here Sophisticated attackers break through conventional safeguards every day Cloud, mobile, social and big data drive unprecedented
Leverage security intelligence for retail organizations
Leverage security intelligence for retail organizations Embrace mobile consumers, protect payment and personal data, deliver a secure shopping experience Highlights Reach the connected consumer without
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
IBM Cloud :Infrastructure-as-a-Service
IBM :Infrastructure-as-a-Service July 30 th, 2014 www.ibm.com/investor Forward Looking Statements and Non-GAAP Information Certain comments made in this presentation may be characterized as forward looking
Addressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : [email protected] Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
Ragy Magdy Regional Channel Manager MEA IBM Security Systems
Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by
Security of Cloud Computing for the Power Grid
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Overview of IBM Cloud Integration
March 25, 2014 Overview of IBM Cloud Integration Adam Gunther Program Director, Cloud Offerings, WebSphere Product Management Matt Lucas Lead Architect, IBM Integration Bus Agenda Market Observations API
Lunch and Learn: BlueMix to Mainframe making development accessible in the
Lunch and Learn: BlueMix to Mainframe making development accessible in the Cloud Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology [email protected] @RosalindRad Insert Custom
Hybrid Cloud Customer Engagements
Hybrid Cloud Customer Engagements Juergen Schneider, IBM Distinguished Engineer, IBM Cloud Unit IBM Corporation 1 Agenda Why is Hybrid Cloud so important? Why are Enterprises approaching Hybrid Cloud solutions?
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
IBM Cloud: Platform-as-a-Service
IBM Cloud: Platform-as-a-Service September 17 th, 2014 www.ibm.com/investor Forward Looking Statements and Non-GAAP Information Certain comments made in this presentation may be characterized as forward
Practical Development with a Platform as a Service (PaaS) Beyond the Basics
IBM Cloud: Think it. Build it. Tap into it. Carl Osipov, Developer Evangelist, IBM Bluemix [email protected] @CloudsWithCarl September 25, 2014 Practical Development with a Platform as a Service (PaaS)
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
IBM MobileFirst Launch David Lee Heyman
IBM MobileFirst Launch David Lee Heyman WW Mobile Business Agility Tiger Team IBM's Mobile Enterprise - A personal journey Watch now: http://youtu.be/0sealyljfag Announcing: IBM MobileFirst 5 2013 IBM
and Security in the Era of Cloud
Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer
The Current State of Cyber Security
The Current State of Cyber Security Bob Kalka, Vice President, IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2 Cyber criminals use BUSINESS INTELLIGENCE 3 NOBODY IS IMMUNE 2012
IBM s Cloud Platform : IBM Bluemix
IBM s Cloud Platform : IBM Bluemix IBM Ecosystem Development Instructor : IBM Bluemix Registration Go to bluemix.net and sign up Use your laptop, mobile device or classroom system
Build and Secure Mobile Apps in the Enterprise. Ed Brill Ian Robinson Josh Lambert
Build and Secure Mobile Apps in the Enterprise Ed Brill Ian Robinson Josh Lambert Introductions Ed Brill Director, Mobile Enterprise Marketing IBM Ian Robinson Program Director, MobileFirst Platform and
API MORNING. IBM Bluemix. The Digital Innovation Platform. [email protected]. 2015 IBM Corporation
API MORNING IBM Bluemix The Digital Innovation Platform [email protected] Timing is critical Today s apps must keep up with the speed of the app revolution. Customer Managed Code Data Runtime Middleware
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Decoding CAMS: Cloud, Analytics, Mobile, & Social Technologies: A Discussion of the Implications for Enterprises and their Providers
Decoding CAMS: Cloud, Analytics, Mobile, & Social Technologies: A Discussion of the Implications for Enterprises and their Providers Steve Sheahan Client Solutions Executive IBM Global Business Services
Developing Cloud Applications using IBM Bluemix. Brian DePradine (Development lead Liberty buildpack)
Developing Cloud Applications using IBM Bluemix Brian DePradine (Development lead Liberty buildpack) What Customers Tell Us Their IT Needs Quick development time Low Cost Low barriers to ramp up & maintain
Developing in the Cloud Environment. Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology [email protected].
Developing in the Cloud Environment Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology [email protected] @RosalindRad Organizations are combining on-premise, off-premise and public
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options Marnix Gillis IBM Distinguished Engineer 32 nd Regional Conference 2013 International Business
«How to make it happen» How IBM is fueling the evolution of retail innovation, store transformation & FMCG consumer engagement
«How to make it happen» How IBM is fueling the evolution of retail innovation, store transformation & FMCG consumer engagement Leaders will take a systematic and integrated approach to drive enterprise
The Internet of Things
The Internet of Things Vijay Sethia Senior Product Manager, IBM Software Group 2014 IBM Corporation Agenda The Internet of Things The IBM IoT On-Prem Cloud Sample IoT Application 1 The Internet of Things
The Future of Data Management
The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class
Hybrid Cloud - Your Path to Business Agility
IBM BusinessConnect 2015 Seize the Moment 21 st October 2015 Hybrid Cloud - Your Path to Business Agility Peter Eeles Executive IT Architect IBM Cloud Worldwide Tiger Team [email protected] Agenda
IBM & Security Gov. Point Of Views
IBM & Security Gov. Point Of Views Santiago Cavanna [email protected] @scavanna Point of View: Info Security situation How Government can Protect Itself from Cyber Attacks According to a GovLoop survey,
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!
The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader
Big Data Use Case Deep Dive 5 Game Changing Use Cases for Big Data
Big Data Use Case Deep Dive 5 Game Changing Use Cases for Big Data Disruptive forces impact long standing business models across industries Pressure to do more with less Shift of power to the consumer
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
How to Choose the Right Security Information and Event Management (SIEM) Solution
How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence
I D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T AP M S a a S and An a l yt i c s S t e p U p t o Meet the N e e d s o f M odern Ap p l i c a t i o n s, M o b i le Users, a n d H yb r i d C l o ud Ar c h i
IBM Cloud TechTalks (Part 4 of 4):
IBM Cloud TechTalks (Part 4 of 4): Maximizing Business Agility with Cloud on a z System November 12 th 2015 IBM Corporation IBM Corporation 2 IBM Corporation 3 IBM Corporation 4 Challenging the Perception
Create apps with the efficiency of a cold blooded cyborg
IBM Bluemix TM Create apps with the efficiency of a cold blooded cyborg IBM Ecosystem Development Dan O Riordan #gotoaar goto conference AARHUS @danoriordan IBM Bluemix Registration Go to bluemix.net and
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance
Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Big Data overview. Livio Ventura. SICS Software week, Sept 23-25 Cloud and Big Data Day
Big Data overview SICS Software week, Sept 23-25 Cloud and Big Data Day Livio Ventura Big Data European Industry Leader for Telco, Energy and Utilities and Digital Media Agenda some data on Data Big Data
Splunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
IDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions. IDC Web Conference November 2015
IDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions IDC Web Conference November 2015 Logistics Today s Speakers Submit any questions to [email protected] You can download slides from
Big Data & Analytics for Semiconductor Manufacturing
Big Data & Analytics for Semiconductor Manufacturing 半 導 体 生 産 におけるビッグデータ 活 用 Ryuichiro Hattori 服 部 隆 一 郎 Intelligent SCM and MFG solution Leader Global CoC (Center of Competence) Electronics team General
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Beyond Watson: The Business Implications of Big Data
Beyond Watson: The Business Implications of Big Data Shankar Venkataraman IBM Program Director, STSM, Big Data August 10, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT
DevOps: Development Challenges and New Approaches
DevOps: Development Challenges and New Approaches Chris Sharp STSM, Chief Architect SWG Europe DevOps IBM Master Inventor, Member of IBM Academy of Technology Agenda The Problem and the Need for Change
Justin Gatlin Director- Cloud Business Growth Markets
Justin Gatlin Director- Cloud Business Growth Markets Disruptors are reinventing business processes and leading their industries with digital transformations Frontline decision making Real time insight
Software Defined Hybrid IT. Execute your 2020 plan
Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.
Connected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
Plan for Success with a Hybrid Cloud! Thanks to IBM Power Systems OpenStack SoftLayer and UrbanCode
Plan for Success with a Hybrid Cloud! Thanks to IBM Power Systems OpenStack SoftLayer and UrbanCode Please check-in to this session Guilhaume Garcia Pre-Sales Architect hybrid cloud IBM France fr.linkedin.com/in/guilhaumegarcia
IBM Executive Point of View: Transform your business with IBM Cloud Applications
IBM Executive Point of View: Transform your business with IBM Cloud Applications Businesses around the world are reinventing themselves to remain competitive in a time when disruption is the new normal.
Cloud Computing. Jean-Claude DISPENSA IBM Distinguished Engineer
Cloud Computing Jean-Claude DISPENSA IBM Distinguished Engineer Best Student Recognition Event July 6-8, 2011 EMEA IBM Innovation Center La Gaude, France Business needs are growing - IT costs are increasing
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014
Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014 What do the experts say? 3 4 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Molnet öppnar nya möjligheter för kostnadseffektiv IT
Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new
Transforming Business Processes with Agile Integrated Platforms
Transforming Business Processes with Agile Integrated Platforms SPRING 2015 Sponsored by SAP Technology Business Research, Inc. Technology changes, but the needs of business do not. Integration is essential
Enabling Digitization with Next Generation Cloud
Enabling Digitization with Next Generation Cloud Nick Earle SVP, Global Cloud and Managed Services, Cisco December 10, 2015 Live tweeting? I m @nearle Cisco Is Changing of deferred revenue is software
IBM QRadar as a Service
Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
Internet of Things. Opportunity Challenges Solutions
Internet of Things Opportunity Challenges Solutions Copyright 2014 Boeing. All rights reserved. GPDIS_2015.ppt 1 ANALYZING INTERNET OF THINGS USING BIG DATA ECOSYSTEM Internet of Things matter for... Industrial
Monitoring and Log Management in Hybrid Cloud Environments
Ingo Averdunk, Dipl.-Inform. November 11, 2015 IT Service Management Monitoring and Log Management in Hybrid Cloud Environments Agenda Overview Hybrid Service Management Monitoring Log Management Closing
BIG Data Analytics Move to Competitive Advantage
BIG Data Analytics Move to Competitive Advantage where is technology heading today Standardization Open Source Automation Scalability Cloud Computing Mobility Smartphones/ tablets Internet of Things Wireless
The Enterprise Data Hub and The Modern Information Architecture
The Enterprise Data Hub and The Modern Information Architecture Dr. Amr Awadallah CTO & Co-Founder, Cloudera Twitter: @awadallah 1 2013 Cloudera, Inc. All rights reserved. Cloudera Overview The Leader
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
BRINGING NETWORKS TO THE CLOUD ERA
BRINGING NETWORKS TO THE CLOUD ERA SDN enables new business models Aruna Ravichandran VICE PRESIDENT, MARKETING AND STRATEGY [email protected] SOFTWARE DEFINED NETWORKING (SDN), JUNIPER NETWORKS
Cloud, Beyond the Hype
Cloud, Beyond the Hype Let s think through our Journey to Cloud Christian Verstraete Chief Technologist Cloud Application Transformation Belnet Networking Conference October 23 rd, 2014 Agenda Migrating
