Connected Intelligence and the 21 st Century Digital Enterprise

Size: px
Start display at page:

Download "Connected Intelligence and the 21 st Century Digital Enterprise"

Transcription

1 Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015

2 By 2025 we will become a deeply connected, digital world Digital everything everywhere, everyday, everyone connected 1 Transforming how we live and work Generating new digital ecosystems and insights Creating new business models and lowering barriers to entry Disrupting every business, in every industry 2 Sources: 1,2: IP & Science business of Thomson Reuters The world in predictions in innovation, 2014

3 Connected devices are changing business processes and people s lives Asset tracking Security Traffic lights Roadside equipment Pumps Fire & emergency Driver behavior Air quality Noise Electricity switch Lighting Product delivery Product electronics & entertainment Digital signage Telecom infrastructure Air con Vehicle leasing Water distribution Vibration Access control 3

4 SMART DEVICES Intelligence everywhere Everyday devices are infused with intelligence that is updated in real time. security devices parking control shopping trolley SENSORS constantly connected. Everything we own is connected to the Internet. shopping displays automated factories wearable monitors house control cooking smart power TVs cars kitchen appliances fire sensors medical robots TABLETS road-side sensors SMART PHONES exercise machines poaching sensors wearable devices Enable Business to create entirely new value propositions smart phones

5 Creating new waves of opportunity New types of applications New Style of Business New approaches to IT operations New demands & uses for insight New customers and buying behaviors New consumption models New revenue streams New threats and risks 5

6 IT organizations must become value creators Lower cost of doing business Host workloads & applications Provide hardened systems & networks Manage data Generate business outcomes Rapidly create and broker new services Predict threats and manage risk Provide real-time insight and understanding Respond and react Continuously deliver 6

7 Information + Applications are the Product and IT is the vehicle that will make or break your success

8 Everyone will expect more apps, delivered more quickly your customers, your partners, your users, your boss releases per year releases per year releases per year Steady Stream of Improvement Thanks to consumerization, users now expect continuous improvements to apps rather than the traditional annual mega-updates

9 and do it simply, securely, and collaboratively.

10 It will be a journey Data Center in silos Converge & Modernize Automate Tasks Orchestrate Processes Transform Delivery Hybrid Cloud Analytics

11 But the mission is a critical one Supply from anywhere IT becomes an internal service provider Business is Enabled Off Premise Fast & easy access to IT resources On Premise Continuous IT Service Delivery Application innovation 11

12 Hybrid IT is not easy confidence 100% 80% 60% 40% 20% 0% Managing mosaics of services Year IT execs expect to manage business processes confidently across services spanning data centers and public and private clouds. And yet, less than 20% of companies have an active IT as a Service Broker policy. (Gartner 2014)

13 We must automate in order to scale. Expected automation of IT Operations By 2020 the majority will have shifted to automation Today 2020 No Automation Up to 1/4 1/4 to 1/2 1/2 to 3/4 3/4 to all 6% 45% 35% 12% 2% 1% 2% 12% 49% 35%

14 We will need to break down silos between Developers, QA and Operations. A single-model DevOps system This approach allows IT Ops to better manage application performance, compliance, security, change and backup and recovery

15 Enabling rapid delivery of amazing customer experiences across mobile, cloud & traditional apps

16 The value will come from the information that s hardest to manage Wearable Headband Glasses Ear-mounted cameras Mood sweater Gait-sensing shoes Type of data generated Brain sensing headband Augmented reality Live streaming of select content Projects my mindset in advance Controls my stride

17 Human data Volume of data Big Data shift Mobile apps System logs Data centers Compliance archives Internet of Things Sensors Technology gap Machine data Business data Social networking Data Photo sharing Wearable devices Time

18 HP Haven platform Turn 100% of your data into action. Human data Machine data Haven Business data

19 HP Haven platform HP applications Customer applications Developer applications Platform ecosystem Services Over 850 trained professionals Developers Over 6,000 developers Partners Over 200 platform partners Delivery Over 10,000 customer implementations Haven Defined programming interfaces Analytics, indexing, context and categorization Scalable data stores Data connectors Social media Video Audio Texts Mobile Transactional Documents IT/OT Search data engine Images Records Compliance archives

20 Powerful software for information management and governance Information Management & Governance Solutions Archiving & ediscovery Compliance Litigation Readiness Storage Optimization Database Archiving ediscovery Supervision Legal Hold Enterprise Content Management Records Mgmt. Legal Content Mgmt. Business Process Mgmt. Document Mgmt. Records Mgmt. Legacy Clean Up Data Protection Server Data Protection Virtual Machine Data Protection Remote & Branch Office Data Protection Endpoint Device Data Protection Cloud Data Protection

21 (IoT) devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries

22 70% used unencrypted network services 70% allow an attacker to identify valid user accounts through account enumeration 90% collected at least one piece of personal information 100% of security systems and 80% of IoT devices don t require sophisticated passwords 6 of10 had user interfaces vulnerable to issues such as persistent XSS and weak credentials

23 HP Software for the Attack Life Cycle Research Research potential targets Threat Intelligence HP Security Research Infiltration Phishing attack and malware Block Adversary HP TippingPoint HP Fortify Monetization Data sold on Black Market Discovery Mapping breached environment Detect Adversary HP ArcSight Exfiltration/Damage Exfiltrate/destroy stolen data Action HP Services HP Info Governance Capture Obtain data Protect Data HP Atalla HP Voltage Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

24 Leaders across the portfolio according to Gartner and Forrester App Delivery Cloud Security Big Data - Solutions Big Data - Platform Gartner Magic Quadrant Integrated Software Quality Suites Forrester ranked HP top for private cloud Gartner Magic Quadrant Application Security Testing Gartner Magic Quadrant Enterprise Information Archiving Gartner Magic Quadrant Enterprise Search HP HP HP HP

25 HP Software: The Power to Act Now

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence

More information

IoT and Distributed Mesh Computing

IoT and Distributed Mesh Computing IoT and Distributed Mesh Computing Connected Cloud Summit Bobby Patrick CMO, HP Cloud September 18, 2014 Connected devices are changing business processes and people s lives Security Pumps Air quality

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Improving Customer Communications by Proper Personalization

Improving Customer Communications by Proper Personalization Improving Customer Communications by Proper Personalization Paweł Walczak Commercial Account Manager for CEE HP Exstream March 13, 2015 The Customer is the most important. There is just one boss. The customer.

More information

Find the intruders using correlation and context Ofer Shezaf

Find the intruders using correlation and context Ofer Shezaf Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Security Operation Centre 5th generation

Security Operation Centre 5th generation Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to

More information

HP Software, Big Data Rethinking Data Protection

HP Software, Big Data Rethinking Data Protection HP Software, Big Data Rethinking Data Protection EPIC Technology Day, November 19 th, 2014 HP Software The 6th largest software company in the world Applications Delivery Management IT Operations Management

More information

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015 Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted HP Atalla Data-Centric Security & Encryption Solutions Jean-Charles

More information

Digitization of Enterprise - New Style of IT

Digitization of Enterprise - New Style of IT Digitization of Enterprise - New Style of IT Neeraj Tolmare Oct 2014 What happens in an Internet Minute? 20 identity thefts 20 million photo views 1.3 million video views 6 million Facebook views 100,000

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Mobility Exploiting and Maintaining the New Face of Engagement Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing

More information

Assuring Application Security: Deploying Code that Keeps Data Safe

Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,

More information

Managing the Challenges of Cloud Management November 7, 2013

Managing the Challenges of Cloud Management November 7, 2013 Copyright 2013 Vivit Worldwide Managing the Challenges of Cloud Management November 7, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Mihai Grigorescu Vivit Chapter Leader South Africa

More information

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul

More information

Circuit Protection is Key in Maintaining Growth for The Internet of Things

Circuit Protection is Key in Maintaining Growth for The Internet of Things Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this

More information

Bezpečnosť dát v HP Cloude

Bezpečnosť dát v HP Cloude Bezpečnosť dát v HP Cloude Ochrana dát a súkromia v cloudových službách Február 2013 Agenda TRENDY RIEŠENIA HP PRÍKLADY 2 Security awareness at board level Security leadership is under immense pressure

More information

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies. HP CLOUD SYSTEM The most complete, integrated platform for building and managing clouds featuring Intel technologies Presenter Title 2010 2011 Hewlett-Packard Development Company, L.P. The information

More information

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Big Data Analytics: Today's Gold Rush November 20, 2013

Big Data Analytics: Today's Gold Rush November 20, 2013 Copyright 2013 Vivit Worldwide Big Data Analytics: Today's Gold Rush November 20, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Bernard Szymczak Vivit Leader Ohio Chapter TQA SIG Copyright

More information

Public, Private, Hybrid:

Public, Private, Hybrid: Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud

More information

Simple, scalable and secure unified wired and wireless networking

Simple, scalable and secure unified wired and wireless networking Simple, scalable and secure unified wired and wireless networking The only Complete BYOD solution Lars Kølendorf Head of Wireless Business HP Networking EMEA Email: [email protected] Copyright 2012 Hewlett-Packard

More information

Big Data Analytics- Innovations at the Edge

Big Data Analytics- Innovations at the Edge Big Data Analytics- Innovations at the Edge Brian Reed Chief Technologist Healthcare Four Dimensions of Big Data 2 The changing Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human

More information

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China Welcome to Services Discovery Channel Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China Connecting Analytics to Insight Are You Ready? Keynote Speakers: Mike Riegel, VP,

More information

Information Archiving

Information Archiving Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive

More information

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Copyright 2013 Vivit Worldwide Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Brought to you by Vivit Cloud Builders Special Interest Group (SIG) Jim Murphy Cloud

More information

HP IT Operations Management (ITOM)

HP IT Operations Management (ITOM) HP IT Operations Management (ITOM) Powered by Big Data and automation Ajay Singh, Senior Vice President and General Manager, IT Operations Management Software, HP Software September 18, 2013 Old Style

More information

Investor Presentation. Second Quarter 2015

Investor Presentation. Second Quarter 2015 Investor Presentation Second Quarter 2015 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences

More information

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Jim Wittry HP Cloud Partner Business Manager [email protected] http://www8.hp.com/us/en/cloud/helion-overview.html Copyright 2014

More information

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges

More information

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA SaaS Packaged applications Employees IT metrics/analytics Storage Public cloud Security Challenges for IT Environments are

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Delivering Quality Service with IBM Service Management

Delivering Quality Service with IBM Service Management Delivering Quality Service with IBM Service Milos Nikolic, Global Technology Services Manager Dragan Jeremic, Technical Sales Specialist for Tivoli December 10th 2008 Innovation is the Process, Success

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY? CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY? Jennifer Ellard HP Session ID: SPO-W01B Session Classification: General Interest Agenda What is hype? What we hear from you? Separating

More information

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

What s New With HP Service Manager and Universal CMDB December 18, 2014

What s New With HP Service Manager and Universal CMDB December 18, 2014 What s New With HP Service Manager and Universal CMDB December 18, 2014 Copyright 2014 Vivit Worldwide Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide Hosted by Laura Walker

More information

The Amazing Future of the IoE

The Amazing Future of the IoE The Amazing Future of the IoE Shaun Kirby CTO, Cisco Consulting Services November 2014 The Internet of Everything: People, Process, Data, and Things People Connecting people in more relevant, valuable

More information

HP Cloud technologies

HP Cloud technologies HP Cloud technologies [email protected] Cloud & Presales Manager Finland & Baltics 1 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Hybrid Cloud Architectures for Operational Performance Management

Hybrid Cloud Architectures for Operational Performance Management Hybrid Cloud Architectures for Operational Performance Management Delbert Murphy Solution Architect / Data Scientist Microsoft Corporation GPDIS_2014.ppt 1 Delbert Murphy and Microsoft s Data Insights

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

The Internet of Things

The Internet of Things The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs [email protected] More and more of the world s activity

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Big Data Integration: A Buyer's Guide

Big Data Integration: A Buyer's Guide SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology

More information

Enabling Digitization with Next Generation Cloud

Enabling Digitization with Next Generation Cloud Enabling Digitization with Next Generation Cloud Nick Earle SVP, Global Cloud and Managed Services, Cisco December 10, 2015 Live tweeting? I m @nearle Cisco Is Changing of deferred revenue is software

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

2014 DATA CENTER TRENDS

2014 DATA CENTER TRENDS 2014 DATA CENTER TRENDS CONTENTS Overview _2 Small and Medium Business Move-In 3 Cloud computing use continues to grow _ 4 the internet of things gaining speed _ 5 disaster recovery is a necessity _ 7

More information

Finding the right cloud solutions for your organization

Finding the right cloud solutions for your organization Finding the right cloud solutions for your organization Business white paper If you manage technology today, you know the story: everything is mobile, connected, interactive, immediate, and fluid. Expectations

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

HP Microsoft. Unified Communications & Collaborations. Francisco Martinez. Alfredo Alvarez. UC Architect Microsoft. Solutions Architect HP Networking

HP Microsoft. Unified Communications & Collaborations. Francisco Martinez. Alfredo Alvarez. UC Architect Microsoft. Solutions Architect HP Networking HP Microsoft Unified Communications & Collaborations Francisco Martinez UC Architect Microsoft Alfredo Alvarez Solutions Architect HP Networking 2011Hewlett-Packard Development Company, L.P. The information

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

The Future of Data Management

The Future of Data Management The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class

More information

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Modern Data Management & Intelligent Archive Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Agenda Who is CommVault? Why CommVault? Microsoft and CommVault Cloud Use Cases A Brief History

More information

From the Bottom to the Top: The Evolution of Application Monitoring

From the Bottom to the Top: The Evolution of Application Monitoring From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:

More information

HP S POINT OF VIEW TO CLOUD

HP S POINT OF VIEW TO CLOUD HP S POINT OF VIEW TO CLOUD Frank Bloch Director Technology Consulting 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice 3 GLOBAL MEGA

More information

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1 #ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million

More information

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services Solution brief An integrated and open platform to build and manage cloud services The industry s most complete cloud system for enterprises and service providers Approximately every decade, technology

More information

Security and the Internet of Things (IoT)

Security and the Internet of Things (IoT) Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description

More information

DAY 1 MONDAY, SEPT 28 2015

DAY 1 MONDAY, SEPT 28 2015 MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation

More information

How the Internet of Things Will Transform the Manufacturing Industry

How the Internet of Things Will Transform the Manufacturing Industry How the Internet of Things Will Transform the Manufacturing Industry Dinesh Malkani President, Cisco India & SAARC February 26, 2015 By 2018, Video will be 62% of India's mobile data traffic India Is Ready

More information

RSA Identity and Access Management 2014

RSA Identity and Access Management 2014 RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and

More information