This Conference brought to you by

Size: px
Start display at page:

Download "This Conference brought to you by www.ttcus.com"

Transcription

1 This Conference brought to you by Linkedin/Group: Technology Training Technology Training Corporation

2 U.S. Army Intelligence and Security Command Army Intelligence and Big Data 29 Sept 2015 INSCOM the Army s Force for Dominant Intelligence

3 Why? Big Data All Sensors need Processing, Exploitation and Dissemination (PED) 3

4 Why? New Army Operating Concept 4

5 Unified Cloud Data (UCD) Unified Cloud Data (UCD): A Joint, Interagency Effort Aimed at Defining the Service Technical Approach to the ICITE Framework and Data While Solving the Global Processing, Exploitation & Dissemination (PED) Migration Challenges UCD: Our Big Data Reference Implementation of a Unified Data Layer All Data Work, Regardless of Type of Intelligence and Security Level All Analytics + Enrichment Processes Run against UCD: Write Once, Use Often All Indexes Make UCD Data Discoverable to Analysts Security Is Baked In Security Markings Are Integrated at the Source Level, Event / Document / Entity level, Down to Individual Attributes for an Entity UCD Pilot Army s Instantiation, Led by INSCOM, Assessed by Soldiers in Live Environment To Inform Army Programs of Record Army Mission Command and Army Cyber Pilots show Benefit of Unified Data for Operations-Intel Convergence for the Army Operational Concept (AOC) 5

6 Extending Cloud Advanced Analytics 6

7 Open Source Information Alerts Analysts Use Open Information Pilot New Analytics Train Analysts on Sources and Capabilities Sources Change; Terms Evolve Stay Engaged: Frequent Changes Share Information, including Concepts of Operation Put into Context t of What s Known Mature Techniques to Verify and Understand: Who, What, Why?? Certify for Policy Compliance Reinforce Mission and Legal Authorities Do the Right Analysis, the Right Way Leverage the Enterprise: Analytic Capabilities Data Approach: Pay for Data Once, Use Many Ways Enterprise Impact: Data Retention, Storage, Correlation, Cyber Security Big Data: Useful for Tipping i + Cueing, But Has Risks 7

8 The Enterprise is the Foundation Foundation Layer Backbone 8

9 Unified Cloud Data (UCD) Partners & Pilots 9

10 Unified Cloud Data (UCD) Partners & Pilots Demonstrated Value: + Soldiers used UCD + Live Data + Saved Mission Command 7+ months to pilot Ops/Intel Convergence, DTRA to pilot Constellation on UCD baseline + Remote Mgt + Puppet deployment lets 1 SysAdmin manage multipleucd sites + Piloted AWS GovCloud for Integration: Saved $ 10

11 Implementing Unified Cloud Data (UCD) 11

12 Good Feedback from Functional Assessment Assessed UCD + Value of Big Data Analytics to Inform Future Requirements Good Initial Feedback: Users Want More Access + More Data Improved Analyst Usability: Ease of Use: Easy Multi-INT exploitation of Unified Data with Widgets + Workflows Rapid Mastery: After 3 days training, Soldiers could use UCD for mission threads Speed of Analysis: Soldiers used UCD to do Country Study in 30 min (1/3 time) Fast Data Access: Facial Recognition in seconds against 100Ks of records Operations-Intelligence Convergence: Improved Situational Awareness: Blue Force + Red Data in Common Operating Picture Pre-Deployment Checks: Soldiers easily checked New Area: Know What s Known Enterprise Efficiencies and Security: Built-In Support: Self-Configurable Dashboards + Workflows Soldiers can share Info Sharing: Built-in Reports/Report Creation (no support needed), Coalition Info Sharing Enterprise Operations: Remote Admin by Fewer System Admins support multiple sites Improved Security: Cell-level Security, Thin Client/PKI, Separation of Roles 12

13 UCD Support of Intel Functions UCD handles many kinds of data Sensors Data from Many Sources/Types Images Audio Video Messages Public Info Mission Command Etc. Separate Data from Analytics Security: Provenance Security Labels Metadata Tagging Extract Entities + Geo/Temporal Attributes Metrics more Velocity + Data Ingestion Content Real-Time Cell-Level Security Analytics Update Indexes Data Access: Match User Roles/Authorizations against Data Security Analyst s Conclusions Enrich Data User Authorizations Community Partners Correlate All Data Context-Based Data Navigation + Beneficial to All Domains: + Operations-Intel Convergence + Medical Support + Logistics Support Map Reduce Analytics Enable Data Sharing Analysts Enrich Correlated Data: + Know What s Known Now + Helps Analysts Connect the Dots Supports Big Data Analytics and Multi-Discipline Fusion for AOC environments: A2AD, Megacities, Ad Hoc Response 13

14 UCD Support of Intel Functions UCD handles many kinds of data Separating Data from Apps lets Analytics Use Same Data: Read Once, See Data Many Ways

15 UCD Support of Intel Functions UCD handles many kinds of data Separating Data from Apps lets Analytics Use Same Data: Read Once, See Data Many Ways Counter-Insider Threat Security checks

16 UCD Support of Intel Functions UCD handles many kinds of data Separating Data from Apps lets Analytics Use Same Data: Read Once, See Data Many Ways Counter-Insider Threat Security checks UCD implements full CRUD functionality: Analysts can Create, Read, Update, Delete

17 UCD Support of Intel Functions UCD handles many kinds of data Separating Data from Apps lets Analytics Use Same Data: Read Once, See Data Many Ways Counter-Insider Threat Security checks UCD Unifies Data UCD implements full CRUD functionality: Analysts can Create, Read, Update, Delete

18 UCD Support of Intel Functions Separating Data from UCD handles many kinds of data Apps lets Analytics Use Same D Data: U S t Read Once, See Data Many Ways UCD Unifies Data Fine-Grained Data Security Markings are stored in Accumulo Counter-Insider Threat Security checks UCD implements full CRUD functionality: Analysts can Create, Read, Update, Delete

19 UCD Support of Intel Functions Separating Data from UCD handles many kinds of data Apps lets Analytics Use Same D Data: U S t Read Once, See Data Many Ways UCD Unifies Data Fine-Grained Fi G i d Data D t Security Markings are stored in Accumulo Fast GPU-based Geospatial and Temporal indexing Counter-Insider Threat Security checks UCD implements full CRUD functionality: Analysts can Create, Read, Update, Delete

20 UCD Support of Intel Functions Separating Data from UCD handles many kinds of data Apps lets Analytics Use Same D Data: U S t Read Once, See Data Many Ways Counter-Insider Threat Security checks UCD implements full CRUD functionality: Analysts can Create, Read, Update, Delete UCD Unifies Data Integrated g Capabilities p such as Facial Recognition Fine-Grained Fi G i d Data D Security Markings are stored in Accumulo Fast GPU-based Geospatial and Temporal indexing

21 UCD Support of Intel Functions Separating Data from UCD handles many kinds of data Apps lets Analytics Use Same D Data: U S t Read Once, See Data Many Ways Counter-Insider Threat Security checks UCD implements full CRUD functionality: Analysts can Create, Read, Update, Delete UCD Unifies Data Integrated g Capabilities p such as Facial Recognition Fine-Grained Data Security Markings are stored in Accumulo Can Make Workflows for Analyst Tasks + for MapReduce Jobs Fast GPU-based Geospatial and Temporal indexing

22 Constraints We Must Handle Conform to the Enterprise Expect Change New Kinds of Data: OSINT/Social Media New User Needs: Heat Map New Capabilities from Partners: WAMI Track Extraction from NGA New Technology Components: GPU Processors for Geospatial Data Reduce Costs Software Licenses Physical Footprint IT Support Leverage Open Source / Other Software Increase Security Provenance: Track Every Interaction PKI and Thin Client Bastion Node Construct Remote Administration: Separate System Administration from the Data Exploit Exponential Increase in Data 22

23 UCD Lessons Learned Protect the Data: Build on a secure Cloud architecture with cell/object-level security, and extend security down to the weapon system to be able to Counter Insider Threat (with PKI, provenance etc.). "Big Data Strategy with Unified Data: Capture and triage vast, increasing amounts of data of all types, from many sources, with automated "Big Data" analytics. Analytics from different providers should leverage the same correlated data: write once, use many ways. Enterprise-Scale Remote Administration: Leverage automated build, delivery, install, configuration management, system administration, and monitoring to make operational use simple and scalable to the Enterprise level: automate routine tasks so humans focus on problems. Leverage Prior Capabilities with Enterprise Platform: Break apart legacy stovepipe capabilities from battlefield-proven Quick Reaction Capabilities (QRCs); re-host unique components on IC ITE security architecture to ensure needed capabilities endure for the future. Transform Capabilities Acquisition: To benefit from the innovation & speed of new capabilities, at long-term greatly reduced cost, incentivize organizations and individuals to use Open Source software, Agile business models of vendors & gov t organizations. Encourage and Reward Partnering: Strong INSCOM + Mission Command partnership integrated INSCOM UCD software onto MC tactical cloud servers: at NIE 15.1, 1 showed Intel/Ops Convergence, situational awareness, DIL operations, Bde TOC server consolidation Future Ready for Capabilities Integration: Future analytic capabilities that exploit Unified Data can be rapidly integrated and (done right) can inherit security. Need New Categories of Innovative Capability: Cyber Security and Info Assurance require new Enterprise analytics, to understand threats, attacks, system health but we also need Innovative Capabilities + Processes to demonstrate Info Assurance (IA) and Capabilities Security. 23

24 U.S. Army Intelligence and Security Command Questions INSCOM the Army s Force for Dominant Intelligence 24

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data

More information

Providing On-Demand Situational Awareness

Providing On-Demand Situational Awareness ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or

More information

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015 AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))

More information

Increase Agility and Reduce Costs with a Logical Data Warehouse. February 2014

Increase Agility and Reduce Costs with a Logical Data Warehouse. February 2014 Increase Agility and Reduce Costs with a Logical Data Warehouse February 2014 Table of Contents Summary... 3 Data Virtualization & the Logical Data Warehouse... 4 What is a Logical Data Warehouse?... 4

More information

Cisco Data Preparation

Cisco Data Preparation Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and

More information

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet

More information

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation

More information

This Symposium brought to you by www.ttcus.com

This Symposium brought to you by www.ttcus.com This Symposium brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Big Data Analytics as a Service (BDAaaS) Big Data

More information

Case Management and Real-time Data Analysis

Case Management and Real-time Data Analysis SOLUTION SET AcuityPlus Case Management and Real-time Data Analysis Introduction AcuityPlus enhances the Quality Assurance and Management capabilities of the Cistera Convergence Server by taking existing

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

Information and Understanding (IFU) Overview

Information and Understanding (IFU) Overview Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May

More information

BIG DATA: FROM HYPE TO REALITY. Leandro Ruiz Presales Partner for C&LA Teradata

BIG DATA: FROM HYPE TO REALITY. Leandro Ruiz Presales Partner for C&LA Teradata BIG DATA: FROM HYPE TO REALITY Leandro Ruiz Presales Partner for C&LA Teradata Evolution in The Use of Information Action s ACTIVATING MAKE it happen! Insights OPERATIONALIZING WHAT IS happening now? PREDICTING

More information

Converging Technologies: Real-Time Business Intelligence and Big Data

Converging Technologies: Real-Time Business Intelligence and Big Data Have 40 Converging Technologies: Real-Time Business Intelligence and Big Data Claudia Imhoff, Intelligent Solutions, Inc Colin White, BI Research September 2013 Sponsored by Vitria Technologies, Inc. Converging

More information

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization

More information

The Next Gen ISR Conference brought to you by: www.ttcus.com

The Next Gen ISR Conference brought to you by: www.ttcus.com The Next Gen ISR Conference brought to you by: www.ttcus.com @Techtrain Linkedin/Groups: Technology Training Corporation BOOZ ALLEN HAMILTON DCGS Enhanced ISR: PED for Actionable Intelligence WAZE is an

More information

How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as

How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as it could be? Borland Core SDP enables your IT organization

More information

Data Integration Checklist

Data Integration Checklist The need for data integration tools exists in every company, small to large. Whether it is extracting data that exists in spreadsheets, packaged applications, databases, sensor networks or social media

More information

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

IDC MaturityScape Benchmark: Big Data and Analytics in Government. Adelaide O Brien Research Director IDC Government Insights June 20, 2014

IDC MaturityScape Benchmark: Big Data and Analytics in Government. Adelaide O Brien Research Director IDC Government Insights June 20, 2014 IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director IDC Government Insights June 20, 2014 IDC MaturityScape Benchmark: Big Data and Analytics in Government

More information

Trusted Experience on Major Data Center Initiatives

Trusted Experience on Major Data Center Initiatives Trusted Experience on Major Data Center Initiatives Modernizing and Building A New Generation of Data Centers Experience is the first thing you want in a data center provider. General Dynamics Information

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Ecom Infotech. Page 1 of 6

Ecom Infotech. Page 1 of 6 Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance

More information

Situational Awareness Through Network Visualization

Situational Awareness Through Network Visualization CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction

More information

MarkLogic Enterprise Data Layer

MarkLogic Enterprise Data Layer MarkLogic Enterprise Data Layer MarkLogic Enterprise Data Layer MarkLogic Enterprise Data Layer September 2011 September 2011 September 2011 Table of Contents Executive Summary... 3 An Enterprise Data

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

IBM System x reference architecture solutions for big data

IBM System x reference architecture solutions for big data IBM System x reference architecture solutions for big data Easy-to-implement hardware, software and services for analyzing data at rest and data in motion Highlights Accelerates time-to-value with scalable,

More information

Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform

Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform PRODUCT DATASHEET Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform IT MANAGEMENT BENEFITS Get successful on time and budget Start with a tactical solution, build for tomorrow

More information

agility made possible

agility made possible SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible

More information

Cloud Computing and Enterprise Services

Cloud Computing and Enterprise Services Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau

More information

Mission-Critical Database with Real-Time Search for Big Data

Mission-Critical Database with Real-Time Search for Big Data Mission-Critical Database with Real-Time Search for Big Data February 17, 2012 Slide 1 Overview About MarkLogic Why MarkLogic Case Studies Technology and Features Slide 2 About MarkLogic 10 years in business

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

IDC MaturityScape Benchmark: Big Data and Analytics in Government

IDC MaturityScape Benchmark: Big Data and Analytics in Government IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director, IDC aobrien@idc.com Presentation to ACT-IAC Emerging Technology SIG July, 2014 IDC MaturityScape Benchmark:

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Discover & Investigate Advanced Threats. OVERVIEW

Discover & Investigate Advanced Threats. OVERVIEW Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics

More information

Virtualization Essentials

Virtualization Essentials Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically

More information

Technology Enablement

Technology Enablement SOLUTION OVERVIEW 1 ABOUT TECHMILEAGE Founded in 2008 / Tempe, Arizona Over 100 engagements Full range of business & technology services Software Development, Big Data, Cloud/AWS, BI, Advanced Analytics

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Information Technology Strategic Plan

Information Technology Strategic Plan Information Technology Strategic Plan Delivers solutions that are planned, anticipate the future and valued by customers Introduction Our Information Technology Strategy supports the Corporate Plan by

More information

Cisco Data Center Optimization Services

Cisco Data Center Optimization Services Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization

More information

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED Army Data Governance COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 Agenda Current Environment Data Governance Army Data Strategy Standards and Compliance

More information

Expanding Uniformance. Driving Digital Intelligence through Unified Data, Analytics, and Visualization

Expanding Uniformance. Driving Digital Intelligence through Unified Data, Analytics, and Visualization Expanding Uniformance Driving Digital Intelligence through Unified Data, Analytics, and Visualization The Information Challenge 2 What is the current state today? Lack of availability of business level

More information

Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission

Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission Enabling the University CIO Strategic Plan 2013-2018 NDU will create exceptional and innovative solutions and services that enable advanced joint education, leadership and scholarship (NDU Strategic Plan

More information

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

can you effectively plan for the migration and management of systems and applications on Vblock Platforms? SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible

More information

Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration

Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

<Insert Picture Here> Master Data Management

<Insert Picture Here> Master Data Management Master Data Management 김대준, 상무 Master Data Management Team MDM Issues Lack of Enterprise-level data code standard Region / Business Function Lack of data integrity/accuracy Difficulty

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

Physical Security Information Management: A Technical Perspective

Physical Security Information Management: A Technical Perspective P R O X I M E X C O R P O R A T I O N W H ITE PAPER Physical Security Information Management: A Technical Perspective By Ken Cheng 1 Physical Security Information Management: A Technical Perspective Physical

More information

Cloud Computing. Key Initiative Overview

Cloud Computing. Key Initiative Overview David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they

More information

IBM PureFlex System. The infrastructure system with integrated expertise

IBM PureFlex System. The infrastructure system with integrated expertise IBM PureFlex System The infrastructure system with integrated expertise 2 IBM PureFlex System IT is moving to the strategic center of business Over the last 100 years information technology has moved from

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

T a c k l i ng Big Data w i th High-Performance

T a c k l i ng Big Data w i th High-Performance Worldwide Headquarters: 211 North Union Street, Suite 105, Alexandria, VA 22314, USA P.571.296.8060 F.508.988.7881 www.idc-gi.com T a c k l i ng Big Data w i th High-Performance Computing W H I T E P A

More information

Oracle Big Data Building A Big Data Management System

Oracle Big Data Building A Big Data Management System Oracle Big Building A Big Management System Copyright 2015, Oracle and/or its affiliates. All rights reserved. Effi Psychogiou ECEMEA Big Product Director May, 2015 Safe Harbor Statement The following

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

SQL Server Master Data Services A Point of View

SQL Server Master Data Services A Point of View SQL Server Master Data Services A Point of View SUBRAHMANYA V SENIOR CONSULTANT SUBRAHMANYA.VENKATAGIRI@WIPRO.COM Abstract Is Microsoft s Master Data Services an answer for low cost MDM solution? Will

More information

Analytics In the Cloud

Analytics In the Cloud Analytics In the Cloud 9 th September Presented by: Simon Porter Vice President MidMarket Sales Europe Disruptors are reinventing business processes and leading their industries with digital transformations

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

A new era of PaaS. ericsson White paper Uen 284 23-3263 February 2015

A new era of PaaS. ericsson White paper Uen 284 23-3263 February 2015 ericsson White paper Uen 284 23-3263 February 2015 A new era of PaaS speed and safety for the hybrid cloud This white paper presents the benefits for operators and large enterprises of adopting a policydriven

More information

Government Technology Trends to Watch in 2014: Big Data

Government Technology Trends to Watch in 2014: Big Data Government Technology Trends to Watch in 2014: Big Data OVERVIEW The federal government manages a wide variety of civilian, defense and intelligence programs and services, which both produce and require

More information

Next Generation Business Performance Management Solution

Next Generation Business Performance Management Solution Next Generation Business Performance Management Solution Why Existing Business Intelligence (BI) Products are Inadequate Changing Business Environment In the face of increased competition, complex customer

More information

IoT is a King, Big data is a Queen and Cloud is a Palace

IoT is a King, Big data is a Queen and Cloud is a Palace IoT is a King, Big data is a Queen and Cloud is a Palace Abdur Rahim Innotec21 GmbH, Germany Create-Net, Italy Acknowledgements- ikaas Partners (KDDI and other partnes) Intelligent Knowledge-as-a-Service

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Security Business Intelligence Big Data for Faster Detection/Response

Security Business Intelligence Big Data for Faster Detection/Response Security Business Intelligence Big Data for Faster Detection/Response SESSION ID: STU-R02B Stacy Purcell Security Architect Intel/IT Legal Notices This presentation is for informational purposes only.

More information

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst

More information

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms

More information

Business Startups - Advantages of Using Automation

Business Startups - Advantages of Using Automation CLOUD AUTOMATION How Cloud Automation Can Help You Scale Your IT Services TABLE OF CONTENTS Introduction 03 Business Benefits 07 Administrator Benefits 11 Technical Considerations 14 Conclusion 17 2 INTRODUCTION

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

July 2014 Federal Cloud Computing Summit Summary

July 2014 Federal Cloud Computing Summit Summary July 2014 Federal Cloud Computing Summit Summary Karen Caraway, Don Faatz, Nancy Ross, Justin F. Brunelle The MITRE Corporation Tom Suder The Advanced Technology Academic Research Center Abstract The latest

More information

Enterprise Services to the Edge

Enterprise Services to the Edge Enterprise Services to the Edge Mr. Jeremy Hiers Project Director, PD ES 22 May 2013 UNCLASSIFIED P D E S O V E R V I E W 1 UNCLASSIFIED Agenda UNCLASSIFIED Who is PD Enterprise Services? Concept for Enterprise

More information

Interplay. Production and Interplay Media Asset Manager. How the addition of Media Asset Management transforms Interplay. www.avid.

Interplay. Production and Interplay Media Asset Manager. How the addition of Media Asset Management transforms Interplay. www.avid. Interplay Production and Interplay Media Asset Manager How the addition of Media Asset Management transforms Interplay www.avid.com Summary In January 2010, Avid acquired Blue Order, known for its comprehensive

More information

VMware and Primary Data: Making the Software-Defined Datacenter a Reality

VMware and Primary Data: Making the Software-Defined Datacenter a Reality VMware and Primary Data: Making the Software-Defined Datacenter a Reality CONTENTS About This Document... 3 Freeing Data From Physical Storage Silos... 3 Dynamically Move Virtual Disks to Meet Business

More information

Microsoft Private Cloud

Microsoft Private Cloud Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.

More information

Integrating a Big Data Platform into Government:

Integrating a Big Data Platform into Government: Integrating a Big Data Platform into Government: Drive Better Decisions for Policy and Program Outcomes John Haddad, Senior Director Product Marketing, Informatica Digital Government Institute s Government

More information

Suricata IDS. What is it and how to enable it

Suricata IDS. What is it and how to enable it Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

/ WHITEPAPER / THE BIMODAL IT

/ WHITEPAPER / THE BIMODAL IT / WHITEPAPER / THE BIMODAL IT By Melbourne IT Enterprise Services IMPLEMENTING THE DYNAMIC COMPONENT FOR A DIGITAL WORLD Among the IT operational models developed over the years, the recent release of

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence Introduction to Oracle Business Intelligence Standard Edition One Mike Donohue Senior Manager, Product Management Oracle Business Intelligence The following is intended to outline our general product direction.

More information

Accelerating the path to SAP BW powered by SAP HANA

Accelerating the path to SAP BW powered by SAP HANA Ag BW on SAP HANA Unleash the power of imagination Dramatically improve your decision-making ability, reduce risk and lower your costs, Accelerating the path to SAP BW powered by SAP HANA Hardware Software

More information

Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud?

Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? White Paper Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? Sponsored by: Cisco Denise Lund April 2014 IDC OPINION The use of mobile devices across job levels and functions

More information

ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE

ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE KEY FEATURES Rich and comprehensive business metadata allows business users to interact with financial services data model to configure

More information

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION 20 Table of contents 1 Introduction...2 2 CyberReveal Overview...3 2.1 CyberReveal Platform...3 2.2 CyberReveal Analytics...5 2.3 CyberReveal Investigator...7

More information

The Informatica Platform for the United States Air Force

The Informatica Platform for the United States Air Force The Informatica Platform for the United States Air Force Reduce Costs and Increase Speed to Results WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential

More information

SERVICES DATA SHEET CLOUD

SERVICES DATA SHEET CLOUD SERVICES DATA SHEET CLOUD Ease internal infrastructure and resource demands while increasing market agility with your own private and secure OneShield-hosted cloud-based core services platform. Long before

More information

How Can I Deliver Innovative Customer Services Across Increasingly Complex, Converged Infrastructure With Less Management Effort And Lower Cost?

How Can I Deliver Innovative Customer Services Across Increasingly Complex, Converged Infrastructure With Less Management Effort And Lower Cost? solution brief September 2012 How Can I Deliver Innovative Customer Services Across Increasingly Complex, Converged Infrastructure With Less Management Effort And Lower Cost? Converged Infrastructure Management

More information

The Future of Data Management

The Future of Data Management The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class

More information

XpoLog Center Suite Data Sheet

XpoLog Center Suite Data Sheet XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such

More information

Client Technology Solutions Suresh Kumar Chief Information Officer

Client Technology Solutions Suresh Kumar Chief Information Officer Client Technology Solutions Suresh Kumar Chief Information Officer Leading financial services technology company 75 Accelerating technology development to enable client solutions Priorities Simplifying

More information

Building Lab as a Service (LaaS) Clouds with TestShell

Building Lab as a Service (LaaS) Clouds with TestShell Building Lab as a Service (LaaS) Clouds with TestShell Introduction Test labs represent a large ongoing investment and an opportunity for significant savings. Many technology organizations are seeking

More information

BIG DATA THE NEW OPPORTUNITY

BIG DATA THE NEW OPPORTUNITY Feature Biswajit Mohapatra is an IBM Certified Consultant and a global integrated delivery leader for IBM s AMS business application modernization (BAM) practice. He is IBM India s competency head for

More information

Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools

Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop

More information