Safe Harbor. Henning B. Treichl. Senior Sales Engineer salesforce.com
|
|
- Jennifer Hampton
- 8 years ago
- Views:
Transcription
1 Henning B. Treichl Senior Sales Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include but are not limited to risks associated with developing and delivering new functionality for our service, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-Q for the most recent fiscal quarter ended April 30, This document and others are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
2 EU-U.S. Safe Harbor Certification Salesforce.com is a Safe Harbor certified company f7cde/f241f27e774e882a85256c08005d a5fa?opendocument&highlight=2,salesforce Prototype: Det Borgernære Hospital
3 Why Cloud Computing and why Salesforce.com? Our Mission: Cloud Computing Driver, Catalyst & Evangelist 1960 s Mainframe 1980 s Client/server Today Enterprise Cloud Computing
4 Applications Moving to the Cloud 1960 s Mainframe 1980 s Client/server Today Cloud Computing Applications Platforms Moving to the Cloud 1960 s Mainframe 1980 s Client/server Today Cloud Computing Platforms
5 Collaboration Moving to the Cloud 1980 s Work Group Computing Lotus Notes Novell GroupWise 2000s Intranet Computing SharePoint Groove File Sharing Today Collaborative Computing What about risc? You are not first mover anymore Talk to your peers (cloud computing is global) Assess the cloud vendor and understand: Infrastructure Platform Services Operation procedures Standards and certifications Audits Try it and learn it (target the right projects)
6 Global Success in Public Sector Over 6,000 Government, Education & Nonprofit Customers General Government Economic Development Transportation Political Campaigns Science & Environment Health & Human Services Culture & Education Defense & Public Safety
7 Kaiser Permanente Powers IT Success with CRM and Force.com Initial CRM deployment in less than 4 months Data ambiguities and confusion removed Efficient custom app development frees up IT resources Complete sales productivity tools in hands of reps Kaiser Permanente receives consistently high marks in quality measurement and member satisfaction surveys. Part of our strategy to maintain and exceed those ratings involves implementing strategic technological innovations, such as Salesforce, that maximize employee productivity. - Jukka Valkonen Executive Director, Managing Enterprise Architect First Cloud Company to Exceed: $1.5 Billion + Annual Revenue Run Rate Quarterly Revenue ($M) Revenue through fiscal quarter ended 4/30/10
8 Strong Growth In New Customers 77,300+ Paying Customers The Cloud Computing Model Multi-tenant Automatic Upgrades Pay-as-you-go Real-time 5 Times Faster Half the Cost IDC White Paper sponsored by Salesforce.com: Force.com Cloud Platform Drives Huge Time to Market and Cost Savings, Doc # , September, 2009
9 Annual Unit Shipments (MM) Ten-Year Computing Cycles 10X the number of users per cycle 2000s Mobile Internet Computing 1990s Desktop Internet Computing 1980s Client/server Computing 1970s Mini Computing 1960s Mainframe Computing Next Generation Devices Changing How We Access the Internet Device Shipments Smartphones Notebook PCs Desktop E 2010E 2011E 2012E 2013E Source: Morgan Stanley Internet Mobile Report, December 2009
10 The Most Rigorous Security Standards in the Industry The World s Most Trusted Security that Improves in Real-Time with Testing by Every Customer Application Security ISO SSL encryption Identity confirmation SAS 70 Type II; SysTrust certified FDA 21 CFR Part 11 & Part 820 HIPAA compliant Network Security IP restrictions Fault tolerant, multi-layered firewall Intrusion detection 3 rd party assessments Facility Security 24 x 365 security Biometric readers Silent alarms CCTV Motion detection Facilities Security 24 x 365 on-site security All doors, including cages, are secured with biometric hand geometry readers. Five levels of biometric scanning including man-traps required to reach Salesforce cages Fully anonymous exteriors Digital camera (CCTV) coverage of entire facility All exterior walls are bullet resistant Entire perimeter bounded by concrete bollards/planters A silent alarm and automatic notification of appropriate law enforcement officials protect all exterior entrances. CCTV integrated with access control and alarm system. Motion-detection for lighting and CCTV coverage.
11 Application Security Login Authenticate Apply Data Security Rules View Filtered Content SSL data encryption Optional strict password security policies Highly secure session key management All passwords stored in MD-5 hash Application self-monitors for security violations Rich sharing rules allow for granular data security control Database access is strictly controlled at multiple levels for maximum security Support for a wide variety of SSO integration architectures User authentication & SSO 2 Salesforce.com 1 DMZ Authentication Proxy 3 Salesforce.com User Corporate Directory Salesforce.com authentication Delegated Authentication Single Sign-On with Token Generator
12 Japan Post Saves $10M with Force.com Custom apps: Accident claims, customer profiles, operations auditing, and many more Banking, insurance, and postal services to 100M+ customers 155M records managed 100,000 users $10M savings over traditional platforms 75% Less Dev Time ½ the Cost 91% Fewer Bugs
13 Public Sector Customer Progression Platform Project Program Business Impact Initial Rollout Operations Recruiting Vendor Case Collaboration Productivity Enhancement 360 Degree View of Client Constituent Service Call Center E-Gov Portal Intranets Employee Help Desk Constituent Communities Analysis and Reporting Performance Outcome Analysis Competitor Analysis Grants Permits & Licensing Planning Financial Tracking 6 7 Part of DNA! Relationship Activity User Adoption Asset Functionality Real-time Cloud Solutions for Public Sector Executive Team Global View of Visibility into Operational Cost-Benefit Outcome Vision, Values, Performance to Trend Measurement Customer Agency Throughput Ratios Analysis Measurement Metrics Plan Analysis to Improve Satisfaction Relationship Constituent Service & Engagement Case & Incident Permitting & Licensing Grants Fee-for-Service 360º View of Clients Call Center E=Gov Portals Profiles Case Collaboration Intake & Eligibility Assessments Permits & Inspections Code Enforcement Proposals Correspondence Tracking Constituent Correspondence Social Media Integration Community Online Forms Feeds Service Plans Project Financials Task & Activity Tracking Licensing Planning Progress Reports Agreements & Contracts Accurate Knowledge Project 360 Program Payments & Impact E-Commerce Forecasting & Chat Status Updates Milestones Dashboard IG / Oversight Scheduling Receipts Measurement Budgeting Partner Marketing & Outreach Social Apps Social Content Groups Case Processing Staffing & Resource Program Financials Revenue Forecasts Field Inspections Grant Genius Reporting HR, Finance & Ops General Recruiting & Time-off Volunteer Ledger & Cash Contract Audits & On-boarding Budgeting AP/AR E-Commerce Billing Compliance Information Technology Employee Asset Project Quality Improvement Agile Vendor Operations Helpdesk & Help Desks Assurance Ideas Development Governance Ticket Tracking
14 3 Steps to Success in the Cloud 1)Talk to your peers 2)Target the right projects 3)Get started now
Welcome to the Real-Time Cloud
Welcome to the Real-Time Cloud Daniel Burton Sr. Vice President, Global Public Policy salesforce.com dburton@salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform
More information5 Steps to Building a Successful Channel Program in the Cloud. Ron Huddleston SVP, ISV Alliances
5 Steps to Building a Successful Channel Program in the Cloud Ron Huddleston SVP, ISV Alliances Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation
More informationThe Fastest Path to the Cloud Building Your SaaS Company on Force.com
The Fastest Path to the Cloud Building Your SaaS Company on Force.com Kai Mäkelä salesforce.com kmakela@salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act
More informationIncrease HR Productivity with Salesforce.com platforms
Increase HR Productivity with Salesforce.com platforms Mark Schoemaker ISV Programs EMEA North @mschoemaker Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
More informationCreating Service Relevance for M2M Data
Creating Service Relevance for M2M Data Jon Upton October 2014 M2M Summit jupton@salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation
More informationSalesforce.com and the financial services sector
Don t be clouded by the cloud: Salesforce.com and the financial services sector Martijn Simons Account Executive Financial Services @Martijn_On_Line In//martijn-simons Lien Ceulemans Corporate legal counsel
More informationDevelopers: Build Next Generation Apps. Michael Yeganeh Solution Engineering Lead myeganeh@salesforce.com
Developers: Build Next Generation Apps Michael Yeganeh Solution Engineering Lead myeganeh@salesforce.com Safe harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This
More informationInformation Security and Privacy Advisory Board Why Governments Invest in Salesforce.com
Information Security and Privacy Advisory Board Why Governments Invest in Salesforce.com John DeVoe Regional Manager, Public Sector December 5, 2008 The Cloud Computing Model Multi-tenant Pay-as-you-go
More informationThe Desktop is Dead... Let s Talk About the Living! Bruce Richardson, Chief Enterprise Strategist brichardson@salesforce.com
The Desktop is Dead... Let s Talk About the Living! Bruce Richardson, Chief Enterprise Strategist brichardson@salesforce.com The Customer Revolution Safe Harbor Safe harbor statement under the Private
More informationPLATFORM AS A SERVICE MULTI TENANCY AND OPEN STANDARDS. Peter Chittum @pchittum salesforce.com!
PLATFORM AS A SERVICE MULTI TENANCY AND OPEN STANDARDS Peter Chittum @pchittum salesforce.com! Platform as a Service Multi Tenancy and Open Standards Peter Chittum Developer Evangelist @pchittum Safe Harbor
More informationBuilding the Global Cloud
Building the Global Cloud Beyond IT Migration to the Enterprise Peter Coffee Head of Platform Research salesforce.com inc. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform
More informationWELCOME! Webinar on roundcorner's donor engagement platform roundcause. with Childfund International, IRC, Salesforce Foundation and roundcorner
WELCOME! Webinar on roundcorner's donor engagement platform roundcause with Childfund International, IRC, Salesforce Foundation and roundcorner Please stand by, we will get started soon. NOTE: Audio should
More informationWebhooks. Near-real time event processing with guaranteed delivery of HTTP callbacks. HBaseCon 2015
Webhooks Near-real time event processing with guaranteed delivery of HTTP callbacks HBaseCon 2015 Alan Steckley Principal Software Engineer, Salesforce 2 Poorna Chandra Software Engineer, Cask 3 Safe Harbor
More informationSuccessfully Scaling an Agile Innovation Culture with Perforce
Successfully Scaling an Agile Innovation Culture with Perforce Steve Greene VP, Program Management Salesforce.com Mike Saha Sr. Manager, Release Engineering Salesforce.com Safe Harbor Safe harbor statement
More informationWelcome to the Force.com Developer Day
Welcome to the Force.com Developer Day Sign up for a Developer Edition account at: http://developer.force.com/join Nicola Lalla nlalla@saleforce.com n_lalla nlalla26 Safe Harbor Safe harbor statement under
More informationCloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan
Cloud to Cloud Integrations with Force.com Sandeep Bhanot Developer Evangelist @cloudysan Safe Harbor Salesforce.com Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This
More informationSocial Enterprise Java Apps
Social Enterprise Java Apps Safe Harbor Statement Safe harbor statement under the Private Securities Litigation Reform Act of 1995. This presentation may contain forward-looking statements that involve
More informationVerticalResponse for AppExchange: Past, Present and Future
VerticalResponse for AppExchange: Past, Present and Future Presented By: Joshua Feinberg: VP, Product Management Alex Scalisi: Sales Executive Special Guest Speaker: Judy Loehr: Senior Sales & Marketing
More informationSPRING 14 RELEASE NOTES
SPRING 14 RELEASE NOTES At Salesforce ExactTarget Marketing Cloud your success is our top priority and we re working hard to continuously improve the Marketing Cloud solutions you use. We recently reached
More informationSecure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com
Secure Coding SSL, SOAP and REST Astha Singhal Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may
More informationThe SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution
BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................
More informationSecure, private, and trustworthy: enterprise cloud computing with Force.com
Secure, private, and trustworthy: enterprise cloud computing with Force.com WHITE PAPER Contents Abstract... 1 Introduction to security, privacy, and trust... 1 Cloud computing and information security
More informationEmbracing the Cloud 5 Key Benefits From Salesforce.com. Mark Easley Sr. Director Sales Engineering Service Cloud measley@salesforce.
Embracing the Cloud 5 Key Benefits From Salesforce.com. Mark Easley Sr. Director Sales Engineering Service Cloud measley@salesforce.com Two Market Leaders Come Together Gartner Magic Quadrants Customer
More informationOur Mission: Cloud Computing Driver, Catalyst & Evangelist
Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions.
More informationTransforming Collaboration: Social networks inside and outside the enterprise
The Social Cloud Transforming Collaboration: Social networks inside and outside the enterprise Share Kaveh Vessali VP, Public Sector Solutions The Enterprise Cloud Computing Company Recognized Leadership
More informationSecrets of the Force.com Platform
Salesforce Secrets of the Force.com Platform Peter Coffee Director, Platform Research salesforce.com Ed Lenta General Manager VMware Safe Harbor Safe harbor statement under the Private Securities Litigation
More informationForce.com: Secure Cloud Development. Varun Badhwar Force.com Security Manager
Force.com: Secure Cloud Development Varun Badhwar Force.com Security Manager Safe Harbor Statement Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may
More informationContact Center Security: Moving to the Cloud
white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationstate of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative
Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed
More informationPROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
More informationLevel I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
More informationPortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
More informationContact Center Security: Moving to the True Cloud
White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.
More informationBMC Remedy OnDemand. Product Overview
Alf Abuhajleh January 2012 Table of Contents BMC Remedy OnDemand 2 What you get with your subscription 2 Applications... 2 Purchase Requirements... 2 Internationalization... 2 Infrastructure and Service-level
More informationExtranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
More informationSalesforce & HIPAA Compliance
An ecfirst Case Study: Salesforce & HIPAA Compliance Salesforce Provides the Tool, You Are Responsible for Compliance 2014 All Rights Reserved ecfirst TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 WHAT IS SALESFORCE?...
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More informationCITIGROUP GLOBAL TECHNOLOGY CONFERENCE. September 2, 2014
CITIGROUP GLOBAL TECHNOLOGY CONFERENCE September 2, 2014 SAFE HARBOR This presentation contains forward-looking statements, including, among other things, statements regarding our growth prospects; our
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
More informationPortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
More informationAll your apps & data in the cloud, all in one place.
The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access
More informationEXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
More informationA Decade in SaaS. Stories from the front line. Dean Stockwell Professional Services Director (APAC) NetSuite Inc.
A Decade in SaaS Stories from the front line Dean Stockwell Professional Services Director (APAC) NetSuite Inc. Agenda Benefits of SaaS The Real-World of SaaS Customer Expectations Enterprise SaaS - Case
More informationPROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationF5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France
F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from
More informationBENEFITS OF A CLOUD ERP SYSTEM April 12, 2016
BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016 Ricardo de Rojas Senior Managing Consultant rderojas@bkd.com Colleen Gutirrez Senior Consultant II cgutirrez@bkd.com 1 TO RECEIVE CPE CREDIT Participate in
More informationISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
More informationThe Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.
More informationUnderstanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
More informationITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
More informationTONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network
More informationAlice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: info@ekartha.com Web:
More informationHow to Select the Right Remote Support Tool:
How to Select the Right Remote Support Tool: A practical guide for the support desk owner LogMeInRescue.com 1 Executive Summary Today s customer support and IT service organizations are charged with supporting
More informationDLP Vendors 8/8/2011. Data Loss Prevention: What We ve Learned from WikiLeaks TECH 15. A Few Good Questions
Data Loss Prevention: What We ve Learned from WikiLeaks TECH 15 Aubrey Turner Fishnet Security Pat Archbold - IntApp A Few Good Questions Do you know where your sensitive data resides and its current controls?
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationExtending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
More informationVendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
More informationEnterprise Cloud. Kerry Bailey President, Terremark
Enterprise Cloud Kerry Bailey President, Terremark November 29, 2011 Safe Harbor Statement NOTE: This presentation contains statements about expected future events and financial results that are forward-looking
More informationCamille Alberico, Sr Manager Eclipse Support Chris Orr, VP Customer Support Strategy
Camille Alberico, Sr Manager Eclipse Support Chris Orr, VP Customer Support Strategy 1 Monday, September 14 Tuesday, September 15 4:40 5:30 pm 2:10 3:00 pm FORWARD-LOOKING STATEMENTS: This Presentation
More informationLaserfiche for Federal Government MEET YOUR AGENCY S MISSION
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas
More informationHealthy Harbor Project - Work From Home
Enterprise Roles for Cloud Computing Applications, Platforms and Extrastructures Peter Coffee Director, Platform Research salesforce.com Platform as a Service CIO Mandates Productive Reliable Secure Affordable
More informationBenefits of an ITIL Help Desk in the Cloud
SOLUTION WHITE PAPER Benefits of an ITIL Help Desk in the Cloud A New ITIL Solution for Small-to-Medium Businesses Contents Introduction 1 Help Desk Needs in Smaller Environments 1 Power in the Cloud 3
More informationW H IT E P A P E R. Salesforce CRM Security Audit Guide
W HITEPAPER Salesforce CRM Security Audit Guide Contents Introduction...1 Background...1 Security and Compliance Related Settings...1 Password Settings... 2 Audit and Recommendation... 2 Session Settings...
More informationCase Study Cloud Computing
Case Study Cloud Computing Rotterdam Juli 2013 Robeco Ton Ligtvoet, Manager IT Contracts and Infra Projects For institutional investors 1 Facts and figures Robeco IT Servicing Asset Management, Pension
More informationMoving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director
www.pwc.com Moving your enterprise systems to the cloud? What do you need to know to manage the risks? November 2015 Jamie Levitt, Director Disclaimer Certain matters reviewed today may represent services
More informationEnterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
More informationSecurity & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
More informationSecure and control how your business shares files using Hightail
HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files
More informationAurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
More informationNAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat
NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona The Legal Cloud What is Cloud Computing? Working in the Cloud Cloud Computing is A way to work
More informationAndrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
More informationMarchex Investor Presentation. May 2013
Marchex Investor Presentation May 2013 SAFE HARBOR STATEMENT This presentation contains forward-looking statements that involve substantial risks and uncertainties. All statements, other than statements
More informationSalesforce Automation
Salesforce Automation Bill Evanow Vice President, Sales salesforce.com Alana Kaselitz Principal Founder Echo Lane Jim Thompson Founder and CEO Rogue IT 1 July 16-17, 2009 Napa Valley Marriott Salesforce.com
More informationCloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
More informationSix advantages of a cloud-based IT help desk
WHITE PAPER Contents Introduction... 1 Six advantages of putting the IT help desk in the cloud... 1 Advantage #1: More proactive IT support...1 Advantage #2: More collaboration...2 Advantage #3: More point-and-click
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationLaserfiche for Federal Government MEET YOUR AGENCY S MISSION
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationSecurity and Data Center Overview
Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)
More informationDriving revenue and competitive advantage with the cloud Fujitsu alliance with salesforce.com
Driving revenue and competitive advantage with the cloud Fujitsu alliance with salesforce.com If you are in IT management, Fujitsu is betting your key objectives include the following: Identify a cost-effective
More informationThe Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER
The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY............................................... 1 BUSINESS CHALLENGE: MANAGING CHANGE.................................
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationGMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
More informationStop Password Sprawl with SaaS Single Sign-On via Active Directory
CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional
More informationSAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
More informationSaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
More informationHow to Select the Right Remote Support Tool
How to Select the Right Remote Support Tool A practical guide for the professional help desk. Executive Summary A transformation of the workforce has altered end user expectations and business needs, driving
More informationDoes Company Size Matter? Sizing up SaaS for your IT Help Desk SOLUTION WHITE PAPER
Does Company Size Matter? Sizing up SaaS for your IT Help Desk SOLUTION WHITE PAPER Table of Contents Organization Size and Sizing up SaaS for the IT Help Desk................... 1 What SaaS can bring
More informationNavigate Securely with Check Point and FishNet Security
Navigate Securely with Check Point and FishNet Security Introductions Dan Thormodsgaard, VP of Solutions Architect for FishNet Security Dan Thormodsgaard, Director of Solutions Architecture. Dan Thormodsgaard
More informationSecure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.
Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities
More informationPowering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationHow To Understand The Business Drivers Of Software As A Service (Saas)
The Business Drivers of Software as a Service (SaaS): Key Issues for Public Sector Executives January 2011 Spencer Stern Spencer Stern is the founder of Stern Consulting, which assists public sector agencies
More informationSaaS. A Cost Reduction Strategy or a Source of Strategic Advantage? Paul Selway Solution Architect
SaaS A Cost Reduction Strategy or a Source of Strategic Advantage? Paul Selway Solution Architect The Architect The Architects Role I doubt we will ever all agree what an architect is! Sometimes we are
More informationSuccessFactors Announces First Quarter Fiscal 2010 Results
CONTACTS: CONTACT: Dominic Paschel SuccessFactors, Inc. Global Public & Investor Relations 415-262-4641 dpaschel@successfactors.com SuccessFactors Announces First Quarter Fiscal 2010 Results Q110 bookings
More informationThe C Level View of CRM
The C Level View of CRM Linus Chow Enterprise Cloud Architect linus.chow@salesforce.com In/linuschow Forward-Looking Statements Statement under the Private Securities Litigation Reform Act of 1995: This
More information