OSS LOGISTICS: DRIVING INNOVATIVE SOFTWARE FROM DEVELOPER TO CUSTOMER Alex Bigmore Senior Architect & Open Source Governance Programme Manager SITA

Size: px
Start display at page:

Download "OSS LOGISTICS: DRIVING INNOVATIVE SOFTWARE FROM DEVELOPER TO CUSTOMER Alex Bigmore Senior Architect & Open Source Governance Programme Manager SITA"

Transcription

1 OSS LOGISTICS: DRIVING INNOVATIVE SOFTWARE FROM DEVELOPER TO CUSTOMER Alex Bigmore Senior Architect & Open Source Governance Programme Manager SITA Phil Granof EVP & Chief Marketing Officer Black Duck Software 2014 Black Duck Software, Inc. All Rights Reserved.

2 OVERVIEW Introduction Open Source Market Trends SITA Case study The OSS Logistics Framework Conclusions Black Duck Software, Inc. All Rights Reserved.

3 OSS TRENDS 3

4 OS CRITICAL ACROSS MANY NEW TECHNOLOGIES 63% 57% 53% 51% 49% 48% 46% 27% 26% 13% 12% 10% CLOUD/ VIRTUALIZATION CONTENT MGMT MOBILE SECURITY COLLABORATION NETWORK MGMT SOCIAL MEDIA 3D PRINTING ANALYTICS AND BUSINESS INTELLIGENCE DRONES GAMING ERP Black Duck Software, Inc. All Rights Reserved.

5 THE VIRTUOUS CYCLE Foundation Participation Proliferation Democratization Black Duck Software, Inc. All Rights Reserved.

6 OPEN SOURCE WINS ON QUALITY 80% Choose based on quality Black Duck Software, Inc. All Rights Reserved.

7 OPEN SOURCE WINS ON FEATURES 67% TCO 80% Choose based on features Black Duck Software, Inc. All Rights Reserved.

8 OPEN SOURCE WINS ON FEATURES Black Duck Software, Inc. All Rights Reserved.

9 ACCESS TO TECHNICAL FEATURES #8 Reason for adoption #4 Reason for adoption Black Duck Software, Inc. All Rights Reserved.

10 CHOOSING BASED ON SECURITY 72% Choose based on Security Black Duck Software, Inc. All Rights Reserved.

11 CHOOSING BASED ON SECURITY? Black Duck Software, Inc. All Rights Reserved.

12 CORPORATE REACTION Black Duck Software, Inc. All Rights Reserved.

13 OPEN SOURCE ADOPTION IS RISING XX%??? 30% 5% Source: Black Duck audit results Source: IDC Survey of G Black Duck Software, Inc. All Rights Reserved.

14 SITA Case Study Open Source Compliance Alex Bigmore Open Source Governance Programme Manager

15 15

16 First Steps to Compliance SITA developed an Intellectual Property software asset registry with the objective of better understanding the composition of its software in terms of IP ownership, applicable licensing terms and code used to generate SITA s revenue streams Together with developer surveys this revealed that software is mixed IP, using internally developed, outsource developed, third party proprietary and Open Source software Two questions emerged How much Open Source Software (OSS) was used as part of the code base? What were the licensing details of each OSS component? The need to answer these questions was the first step toward establishing an Open Source Governance (OSG) programme 16 Open Source Compliance Confidential SITA 2014

17 Creating the Governance Programme IP Asset Registry created OSS usage revealed Establish Stakeholders Pilot how much OSS is really used? Do we need OSS? Governance Programme 17 Open Source Compliance Confidential SITA 2014

18 Governance Objectives Ensure compliance with OSS licenses and distribution requirements Enable greater use of OSS across the organization to improve software development efficiency and quality 18 Open Source Compliance Confidential SITA 2014

19 Achieving Governance Objectives Strategy, policy, process License review Communication & training Approval Discovery & remediation Compliance and OSS Enablement 19 Open Source Compliance Confidential SITA 2014

20 Compliance and OSS Enablement Approval before use Policy requires teams to request approval before OSS is used to minimise remediation Black Duck Code Center used to manage approval process Verification scanning Determines whether there is OSS present that has not been approved Reports on licence compliance Black Duck Protex used for OSS scanning Automation wherever possible Impact the development teams as little as possible Automate responses to approval requests where possible SITA licence guidance rules implemented, others addressed manually Enable teams to trigger verification scans OSG team involved as needed 20 Open Source Compliance Confidential SITA 2014

21 Summary OSG and supporting tools have enabled SITA to Ensure compliance with licences of OSS used Encourage and support greater use of open source in current and future projects Notify project teams of vulnerabilities in OSS used Automate to minimise impact Self service OSS approvals Self service OSS scanning 21 Open Source Compliance Confidential SITA 2014

22 Thank you Alex Bigmore, OSG Programme Manager 22 Open Source Compliance Confidential SITA 2014

23 OSS LOGISTICS 23

24 OSS SHOULD BE MANAGED, NOT FEARED 50% of companies will face challenges due to lack of FOSS policy and management FOSS Survey Black Duck Software, Inc. All Rights Reserved.

25 CHALLENGES OF THE ARCHITECT I want to know what open source I use. I want to know where I use open source. I want to eliminate the security risks associated with open source. I want more control over the open source my developers use. I want help choosing open source. I want to decrease the amount of code we need to maintain. I want to reuse code. I want to participate in the open source ecosystem Black Duck Software, Inc. All Rights Reserved.

26 KNOWLEDGE BASE Black Duck Software, Inc. All Rights Reserved.

27 OUR VALUE We help companies manage their use of open source code in order to see enormous gains across fundamental competitive dimensions. Speed Cost Security Innovation Black Duck Software, Inc. All Rights Reserved.

28 THINK LIKE LINUX, ACT LIKE UPS, SMILE LIKE AMAZON Black Duck Software, Inc. All Rights Reserved.

29 WHAT IS OSS LOGISTICS? Choose Scan Approve Inventory Secure Deliver Black Duck Software, Inc. All Rights Reserved.

30 CHOOSE OSS Choice begins with data. The Black Duck Knowledgebase is the world s most comprehensive database of open source project information. License Version Vulnerability Maturity Cryptography Black Duck KnowledgeBase Description Black Duck Software, Inc. All Rights Reserved.

31 CHOOSE OSS The Black Duck Knowledgebase is at the heart of OSS Logistics, continually gathering data throughout the open source community: Over one million projects From 6,000 sites For over 2,200 unique software licenses. Secure Black Duck Open Hub Approve Scan Inventory Black Duck Open Source KnowledgeBase Community Black Duck Software, Inc. All Rights Reserved.

32 CHOOSE OSS The Black Duck Open Hub provides a window into the world of open source. Find reports about the composition and activity of project code bases Track the changing demographics of the FOSS world Follow developers and their contributions Search for code with Code Sight Secure Black Duck Open Hub Approve Scan Inventory Black Duck Open Source KnowledgeBase Community Black Duck Software, Inc. All Rights Reserved.

33 CHOOSE OSS Black Duck Software, Inc. All Rights Reserved.

34 APPROVE OSS Empower developers with automated approval processes built on the right policies for governing the use of open source. Eliminate uncertainty and re-work Speed identification of software components Mitigate risk without slowing developers down Collaborate seamlessly Secure Black Duck Open Hub Approve Scan Inventory Black Duck KnowledgeBase Open Source Community Black Duck Software, Inc. All Rights Reserved.

35 SCAN OSS Automatically scan, discover and identify what open source code is used within specific applications. Understand code origin Identify licenses and support compliance Eliminate manual effort Increase reliability and visibility Secure Black Duck Open Hub Approve Scan Inventory Black Duck KnowledgeBase Open Source Community Black Duck Software, Inc. All Rights Reserved.

36 INVENTORY OSS Create a company-wide intelligent catalog of approved software that grows smarter over time. Track where components are used in other applications. Encourage standardization and re-use. Secure Black Duck Open Hub Approve Scan Inventory Black Duck KnowledgeBase Open Source Community Black Duck Software, Inc. All Rights Reserved.

37 SECURE OSS Continuous monitoring ensures that future security vulnerabilities associated with a specific component are quickly flagged for resolution. Receive daily alerts Alter workflows in response to severity Quickly locate and remediate Secure Black Duck Open Hub Approve Scan Inventory Black Duck KnowledgeBase Open Source Community Black Duck Software, Inc. All Rights Reserved.

38 DELIVER We provide a license obligation report and an easily consumable bill of materials (BOM) that you can deliver to your customers or internal stakeholders. Incoming Code Automated Scanning and Built-In Approval Policies Outgoing Code Black Duck Software, Inc. All Rights Reserved.

39 DELIVER Automatically discover encryption algorithms within a code base and identify applicable export rules: Cryptography export compliance Government reporting Licensing requirements Policy management challenges Outgoing Code Approve Scan Black Duck Software, Inc. All Rights Reserved.

40 CONCLUSIONS The open source debate is over. Mostly. Complexity and quality are colliding. Reaping the benefits requires management. Logistics provides the best conceptual model for see reaping the benefits of open source Black Duck Software, Inc. All Rights Reserved.

41 QUESTIONS? 41

Phil Marshall Black Duck Software. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved.

Phil Marshall Black Duck Software. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Open Source Component Governance and Management Using COBIT Phil Marshall Black Duck Software 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Welcome Type in questions using the Ask A Question

More information

Managing Open Source Code Best Practices

Managing Open Source Code Best Practices Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate

More information

XEROX TALKS BEST PRACTICES FOR OPEN SOURCE GOVERNANCE

XEROX TALKS BEST PRACTICES FOR OPEN SOURCE GOVERNANCE XEROX TALKS BEST PRACTICES FOR OPEN SOURCE GOVERNANCE November 2014 2014 Black Duck Software, Inc. All Rights Reserved. SPEAKERS Phil Odence Vice President and General Manager Black Duck Software Robert

More information

BOM based on what they input into fossology.

BOM based on what they input into fossology. SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org

More information

Open Source Software and the impact on Mergers & Acquisitions

Open Source Software and the impact on Mergers & Acquisitions Open Source Software and the impact on Mergers & Acquisitions Black Duck 2013 Speakers Russell Hartz VP of Corporate Development SAP Oliver Vivell Senior Director of Corporate Development SAP Matthew Jacobs

More information

The Corporate Counsel s Guide to Open Source Software Policy Implementation

The Corporate Counsel s Guide to Open Source Software Policy Implementation The Corporate Counsel s Guide to Open Source Software Policy Implementation How to Protect the Enterprise from Risk while Helping Your Company More Efficiently Develop and Maintain Applications Black Duck

More information

How To Improve Your Software

How To Improve Your Software Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing

More information

What Developers, Cars & Banks Have in Common: Best Practices for Open Source Governance

What Developers, Cars & Banks Have in Common: Best Practices for Open Source Governance What Developers, Cars & Banks Have in Common: Best Practices for Open Source Governance Shoken Kim Black Duck Software June 7, 2012 Linux Con Japan Compliance Mini-Track Overview Trends Strategic use of

More information

How To Manage An Open Source Software

How To Manage An Open Source Software Executive Briefing: Four Steps to Creating an Effective Open Source Policy Greg Olson Sr. Director OSS Management Olliance Group Speaker Greg Olson Sr. Director, Open Source Management Over 30 years of

More information

HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS. 2015 Black Duck Software, Inc. All Rights Reserved.

HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS. 2015 Black Duck Software, Inc. All Rights Reserved. HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS 2015 Black Duck Software, Inc. All Rights Reserved. TODAY S PRESENTERS Baruch Sadogursky JFrog Dave Gruber Black Duck 2 2015 Black Duck Software,

More information

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Risk & Asset Management Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and Compliance

More information

SecureGRC TM - Cloud based SaaS

SecureGRC TM - Cloud based SaaS - Cloud based SaaS Single repository for regulations and standards Centralized repository for compliance related organizational data Electronic workflow to speed up communications between various entries

More information

How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck

How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck How to Ensure IT Compliance Without Compromising Innovation Nik Teshima, IBM Phil Odence, Black Duck Black Duck 2013 Speakers Phil Odence VP of Business Development Black Duck Software Nik Teshima Senior

More information

Leveraging Open Source for a Winning Enterprise Mobile Strategy

Leveraging Open Source for a Winning Enterprise Mobile Strategy Leveraging Open Source for a Winning Enterprise Mobile Strategy Speakers Peter Vescuso EVP of Marketing & Business Development Black Duck Software @black_duck_sw Bryan House VP of Marketing Acquia @bryanhouse

More information

How to Avoid 5 Common Pitfalls in Open Source Utilization. July 2013

How to Avoid 5 Common Pitfalls in Open Source Utilization. July 2013 How to Avoid 5 Common Pitfalls in Open Source Utilization July 2013 Today s Presenters Phil Odence Black Duck Baruch Sadogursky JFrog 2 Agenda Open Source Trends Avoiding 5 Common Pitfalls JFrog Artifactory

More information

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE Martin Callinan Martin.callinan@sourcecodecontrol.co Wednesday, June 15, 2016 Table of Contents Introduction... 2 Source Code Control... 2 What we do... 2 Service

More information

Adapting IT Governance Frameworks to Ensure Control and Visibility of Open Source

Adapting IT Governance Frameworks to Ensure Control and Visibility of Open Source Adapting IT Governance Frameworks to Ensure Control and Visibility of Open Source Dave Lounsbury, CTO & Vice President, The Open Group Peter Vescuso, EVP of Marketing & Business Development, Black Duck

More information

SAP IT Infrastructure Management. Dirk Smit ALM Engagement Manager SAP Africa dirk.smit@sap.com

SAP IT Infrastructure Management. Dirk Smit ALM Engagement Manager SAP Africa dirk.smit@sap.com SAP IT Infrastructure Management Dirk Smit ALM Engagement Manager SAP Africa dirk.smit@sap.com Challenges in managing heterogeneous IT environments Determine the value that IT contributes to the business

More information

Scanning Open Source Software and Managing License Obligations on IBM SmartCloud. Because code travels

Scanning Open Source Software and Managing License Obligations on IBM SmartCloud. Because code travels Scanning Open Source Software and Managing License Obligations on IBM SmartCloud Because code travels 1 Webinar Agenda Protecode & IBM SmartCloud Company IBM Partnership Solutions Managing Code Obligations

More information

SAP IT Infrastructure Management

SAP IT Infrastructure Management SAP IT Infrastructure Management Legal Disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined

More information

Copyright 11/1/2010 BMC Software, Inc 1

Copyright 11/1/2010 BMC Software, Inc 1 Copyright 11/1/2010 BMC Software, Inc 1 Copyright 11/1/2010 BMC Software, Inc 2 Copyright 11/1/2010 BMC Software, Inc 3 The current state of IT Service How we work today! INCIDENT SERVICE LEVEL DATA SERVICE

More information

5 Steps for a Winning Open Source Compliance Program

5 Steps for a Winning Open Source Compliance Program 5 Steps for a Winning Open Source Compliance Program Kellan Ponikiewicz Peter Vescuso @black_duck_sw Black Duck 2013 Speakers Peter Vescuso EVP of Marketing Black Duck Software Kellan Ponikiewicz IP Counsel

More information

SpaceCode RFID for Diamond Sales Offices

SpaceCode RFID for Diamond Sales Offices SpaceCode RFID for Diamond Sales Offices Contents 1)Introduction... 2 What is RFID ( Radio Frequency Identification)?... 2 Why RFID?... 3 SpaceCode Who we are and what do we do?... 3 Plexus SmartDevices...

More information

7 Steps to Windows 7 Migration Best Practices. Anthony Wainman - Presales Technical Consultant Jay Lakhani Sales Director Codework Inc.

7 Steps to Windows 7 Migration Best Practices. Anthony Wainman - Presales Technical Consultant Jay Lakhani Sales Director Codework Inc. 7 Steps to Windows 7 Migration Best Practices Anthony Wainman - Presales Technical Consultant Jay Lakhani Sales Director Codework Inc. 613-368-4300 Agenda Why Use Symantec for Migration? Ease of Use Other

More information

Open Source Governance in Highly Regulated Companies

Open Source Governance in Highly Regulated Companies Open Source Governance in Highly Regulated Companies 2013 Black Duck, Know Your Code, Ohloh, SpikeSource, Spike and the Black Duck logo are registered trademarks of Black Duck Software, Inc. in the United

More information

IT Legacy Migration from Proprietary to Open Source Software. Bill Weinberg, Black Duck Software Jay Lyman, 451 Research

IT Legacy Migration from Proprietary to Open Source Software. Bill Weinberg, Black Duck Software Jay Lyman, 451 Research IT Legacy Migration from Proprietary to Open Source Software Bill Weinberg, Black Duck Software Jay Lyman, 451 Research Black Duck 2013 Speakers Jay Lyman Senior Analyst 451 Research Bill Weinberg Senior

More information

Realizing the Breakthrough Economics of Linux and Open Source through Hybrid Development. Tim Yeaton, President and CEO Black Duck Software

Realizing the Breakthrough Economics of Linux and Open Source through Hybrid Development. Tim Yeaton, President and CEO Black Duck Software Realizing the Breakthrough Economics of Linux and Open Source through Hybrid Development Tim Yeaton, President and CEO Black Duck Software Linux Collaboration Summit April 9, 2009 Agenda Current Market

More information

A 10-Minute Guide to Increasing Supply Chain Visibility

A 10-Minute Guide to Increasing Supply Chain Visibility A 10-Minute Guide to Increasing Supply Chain Visibility 1 CONTENT MAKE THE CASE LEVEL 1 - VIEW THE INVENTORY LEVEL 2 - COLLABORATE SMARTER LEVEL 3 - TRACK & TRACE CONCLUSION 2 MAKE THE CASE It s imperative

More information

Security Compliance and Data Governance: Dual problems, single solution CON8015

Security Compliance and Data Governance: Dual problems, single solution CON8015 Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology

More information

Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.

Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc. Open Source and the New Software Supply Chain Mark Tolliver, CEO Palamida Inc. Could You Sign This? Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Archives 178

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Oracle Cloud: Enterprise Resource Planning

Oracle Cloud: Enterprise Resource Planning Oracle Cloud: Enterprise Resource Planning Rondy Ng Senior Vice President Applications Development Safe Harbor Statement "Safe Harbor" Statement: Statements in this presentation relating to Oracle's future

More information

Business Process Services: A Value-Based Approach to Process Improvement and Delivery

Business Process Services: A Value-Based Approach to Process Improvement and Delivery WHITE PAPER Business Process Services: A Value-Based Approach to Process Improvement and Delivery In this white paper, we examine how your business can be improved through business process services. Business

More information

Key Adoption Triggers Upgrades, Cost Reduction, Innovation

Key Adoption Triggers Upgrades, Cost Reduction, Innovation Key Adoption Triggers Upgrades, Cost Reduction, Innovation Realized Cloud Benefits 44% FASTER TIME TO MARKET 53% COST SAVINGS 35% BUSINESS FLEXIBILITY Source: http://bit.ly/1enhknr Modernizing Operations

More information

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 7.6 powered by Altiris technology Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

How to manage IT Risks and IT Compliance as a Service

How to manage IT Risks and IT Compliance as a Service How to manage IT Risks and IT Compliance as a Service in complex IS environment The Road Ahead in the Cloud Marek Skalický, CISM, CRISC Regional Account Manager for CAEE For SECURE 2012 Warsaw Agenda IT/Security

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Welcome to online seminar on. Oracle Agile PLM. Design to Release & Change Management. Presented by: Rapidflow Apps Inc.

Welcome to online seminar on. Oracle Agile PLM. Design to Release & Change Management. Presented by: Rapidflow Apps Inc. Welcome to online seminar on Oracle Agile PLM Design to Release & Change Management Presented by: Rapidflow Apps Inc. September 2010 Agenda Agile PLM Overview Agile Product Lifecycle Management (PLM) Overview

More information

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY............................................... 1 BUSINESS CHALLENGE: MANAGING CHANGE.................................

More information

- Cameron Haight, Gartner

- Cameron Haight, Gartner 1 Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network and other infrastructure components still take the same ole effort - Cameron

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System Solution Briefing Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System Tim Larson August 2009 Introduction Nokia Siemens Network s environment Company: Leading provider of mobile

More information

BeyondInsight Version 5.6 New and Updated Features

BeyondInsight Version 5.6 New and Updated Features BeyondInsight Version 5.6 New and Updated Features BeyondInsight 5.6 Expands Risk Visibility Across New Endpoint, Cloud and Firewall Environments; Adds Proactive Threat Alerts The BeyondInsight IT Risk

More information

Open Source Drives Innovation in Financial Services

Open Source Drives Innovation in Financial Services Open Source Drives Innovation in Financial Services 2013 Black Duck, Know Your Code, Ohloh, SpikeSource, Spike and the Black Duck logo are registered trademarks of Black Duck Software, Inc. in the United

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced

More information

Fight fire with fire when protecting sensitive data

Fight fire with fire when protecting sensitive data Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule

More information

Driving Business Agility with the Use of Open Source Software

Driving Business Agility with the Use of Open Source Software Driving Business Agility with the Use of Open Source Software Speakers Peter Vescuso EVP of Marketing & Business Development Black Duck Software Melinda Ballou Program Director, Application Life-Cycle

More information

Asset Management. Page 1 of 5. Data Sheet

Asset Management. Page 1 of 5. Data Sheet Rivo gives you to intelligently gather information relating to any assets such as vehicles, machinery, IT equipment, sensors or PPE organizing configurable data values such as location, usage, part numbers,

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Issue in Focus: Integrating Cloud PLM. Considerations for Systems Integration in the Cloud

Issue in Focus: Integrating Cloud PLM. Considerations for Systems Integration in the Cloud Issue in Focus: Integrating Cloud PLM Considerations for Systems Integration in the Cloud 1 Tech-Clarity, Inc. 2012 Table of Contents Introducing the Issue... 3 Start with the Business in Mind... 4 Choose

More information

The business owner s guide for replacing accounting software

The business owner s guide for replacing accounting software The business owner s guide for replacing accounting software Replacing your accounting software is easier and more affordable than you may think. Use this guide to learn about the benefits of a modern

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

How To Standardize Itil V3.3.5

How To Standardize Itil V3.3.5 Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

PIVOTAL FOR GRANT MANAGEMENT

PIVOTAL FOR GRANT MANAGEMENT PIVOTAL FOR GRANT MANAGEMENT DATA SHEET Granting requires you to have robust processes to manage and assess eligibility of applicants and their applications, and balancing this off against demands for

More information

Empowering Your Business in the Cloud Without Compromising Security

Empowering Your Business in the Cloud Without Compromising Security Empowering Your Business in the Cloud Without Compromising Security Cloud Security Fabric CloudLock offers the cloud security fabric for the enterprise that helps organizations protect their sensitive

More information

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Moving beyond Virtualization as you make your Cloud journey. David Angradi Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Oracle Process Cloud Service Rapidly Automate & Manage Process Applications

Oracle Process Cloud Service Rapidly Automate & Manage Process Applications Oracle Process Cloud Service Rapidly Automate & Manage Process Applications Linus Chow Master BPM Champion Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENT IS FOR INFORMATIONAL SHARING PURPOSES ONLY,

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance

Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice

More information

The Danwood Group Professional Services Offering DANWOOD

The Danwood Group Professional Services Offering DANWOOD The Danwood Group Professional Services Offering DANWOOD Our Professional Services Our Professional Services department can provide you with a variety of services from Audit and Assessment to Technical

More information

Risk & Hazard Management

Risk & Hazard Management Rivo Software Solution Layer provides a rapidly deployable complete set of hazard and risk management functionality from any device, accessible from anywhere through our highly secure cloud platform. Identify,

More information

Streamlining Open Source License Compliance with SPDX

Streamlining Open Source License Compliance with SPDX Streamlining Open Source License Compliance with SPDX Kirsten Newcomer Black Duck Software June 7, 2012 Linux Con Japan Compliance Mini Track Overview Software is everywhere How SPDX helps the supply chain

More information

Build Your Managed Services Business with ScienceLogic

Build Your Managed Services Business with ScienceLogic White Paper Build Your Managed Services Business with ScienceLogic Sharpen Your Competitive Edge with Revenue-Driving Services 1 As a managed service provider (MSP), you realize that both the opportunities

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Introduction to QualysGuard IT Risk SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Qualys at a Glance Software-as-a-Service (SaaS) Founded in 1999

More information

Creating A World-Class IT Integration Strategy

Creating A World-Class IT Integration Strategy Creating A World-Class IT Integration Strategy 2014 PARALLON BUSINESS SOLUTIONS, LLC What Does Integration Really Mean? Integration encompasses more than the clinical integration of medical devices. Full

More information

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust marko.pust@rsa.com 1 Agenda DLP in general What to expect from

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

DOES OPEN MEAN VULNERABLE?

DOES OPEN MEAN VULNERABLE? DOES OPEN MEAN VULNERABLE? GENIVI All Members Meeting, Seoul Korea - October 2015 Bill Weinberg, Senior Director, Open Source Strategy Black Duck Software 2015 Black Duck Software, Inc. All Rights Reserved.

More information

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives Greytip Online Cloud based HR & Payroll software Cloud Technology Platform Enables Leading 16 Snapshot Client Profile A global HR & Payroll outsourcing company. The company is in the business of delivering

More information

Welcome to the Audit, Control & Security Stream. Sponsored by:

Welcome to the Audit, Control & Security Stream. Sponsored by: Welcome to the Audit, Control & Security Stream Sponsored by: Realizing the Value of your Controls Platform Gerald West Manager, Security and Controls Assurance Serco Agenda Introduction Strategies (the

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Symantec DLP Overview. Jonathan Jesse ITS Partners

Symantec DLP Overview. Jonathan Jesse ITS Partners Symantec DLP Overview Jonathan Jesse ITS Partners Today s Agenda What are the challenges? What is Data Loss Prevention (DLP)? How does DLP address key challenges? Why Symantec DLP and how does it work?

More information

BEA BPM an integrated solution for business processes modelling. Frederik Frederiksen Principal PreSales Consultant BEA Systems

BEA BPM an integrated solution for business processes modelling. Frederik Frederiksen Principal PreSales Consultant BEA Systems BEA BPM an integrated solution for business processes modelling Frederik Frederiksen Principal PreSales Consultant BEA Systems Agenda What is BPM? BEA AquaLogic BPM Suite Industry View Customers BPM and

More information

Client Technology Solutions Suresh Kumar Chief Information Officer

Client Technology Solutions Suresh Kumar Chief Information Officer Client Technology Solutions Suresh Kumar Chief Information Officer Leading financial services technology company 75 Accelerating technology development to enable client solutions Priorities Simplifying

More information

Oracle Fusion Cloud Service Global Price List October 9, 2014

Oracle Fusion Cloud Service Global Price List October 9, 2014 Oracle Fusion Cloud Global Price List October 9, 2014 without notice. 1 of 9 Oracle Fusion CRM Base Cloud Fusion CRM Base Premium Offering Cloud Fusion CRM Base Enterprise Offering Cloud Fusion CRM Base

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

Business Process Management and Cloud Computing

Business Process Management and Cloud Computing Business Process Management and Cloud Computing Michael Connaughton, Director, BPM The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Microsoft Private Cloud

Microsoft Private Cloud Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.

More information

Service-Oriented Architecture Maturity Self-Assessment Report. by Hewlett-Packard Company. Developed for Shrinivas Yawalkar Yawalkar of CTS

Service-Oriented Architecture Maturity Self-Assessment Report. by Hewlett-Packard Company. Developed for Shrinivas Yawalkar Yawalkar of CTS Service-Oriented Architecture Maturity Self-Assessment Report by Hewlett-Packard Company Developed for Shrinivas Yawalkar Yawalkar of CTS September 18, 2007 INTRODUCTION Thank you for completing the HP

More information

Bell Techlogix looks to add business services to its BEAM-as-a-Service offering

Bell Techlogix looks to add business services to its BEAM-as-a-Service offering Bell Techlogix looks to add business services to its BEAM-as-a-Service offering Analyst: Katy Ring 17 Apr, 2015 Bell Techlogix is a midsize US managed service provider (MSP) that is ahead of the curve

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

Asset. Unicenter Management r11

Asset. Unicenter Management r11 Data Sheet Asset Unicenter Management r11 Unicenter Asset Management r11 is a comprehensive solution for proactively managing IT assets in your business environment and provides instant knowledge of what

More information

CAD. Office to enterprise Product Data Management. Product Overview

CAD. Office to enterprise Product Data Management. Product Overview CAD DDM CAD is an easy to use, multi-cad PDM solution for Solid Edge, SolidWorks, IronCAD, Creo Elements/Pro, AutoCAD and Inventor. Providing full lifecycle management and revision control of parts, models,

More information

White Paper. Enabling Sales and Distribution with the Cloud. Abstract. - Rafee Tarafdar, Subramanian Radhakrishnan (Subra)

White Paper. Enabling Sales and Distribution with the Cloud. Abstract. - Rafee Tarafdar, Subramanian Radhakrishnan (Subra) White Paper Enabling Sales and Distribution with the Cloud - Rafee Tarafdar, Subramanian Radhakrishnan (Subra) Abstract Consumer packaged goods (CPG) companies are rapidly realizing that with their large

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

Performance from the Core

Performance from the Core Enterprise Performance from the Core CONTENTS 03 04 05 06 07 08 Becoming the ultimate service provider Unlocking IT and information Building Better Business Capturing Cloud Capability Delivering Dynamic

More information

Process Harmonization to address High Cost of Compliance : Insights from Implementation. Keerthana Mainkar & Jude Fernadez

Process Harmonization to address High Cost of Compliance : Insights from Implementation. Keerthana Mainkar & Jude Fernadez Process Harmonization to address High Cost of Compliance : Insights from Implementation Keerthana Mainkar & Jude Fernadez 16 th September 2010 Topics to be covered Introduction Compliance as a driver Process

More information

CrossPoint for Managed Collaboration and Data Quality Analytics

CrossPoint for Managed Collaboration and Data Quality Analytics CrossPoint for Managed Collaboration and Data Quality Analytics Share and collaborate on healthcare files. Improve transparency with data quality and archival analytics. Ajilitee 2012 Smarter collaboration

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

3 Years of Transformation Research

3 Years of Transformation Research 3 Years of Transformation Research The collaborative work synthesizes three years of research by MIT and Capgemini Consulting on Digital Transformation One of the 30 resulting principles from the Study

More information

nexb- Software Audit for Acquisition Due Diligence

nexb- Software Audit for Acquisition Due Diligence nexb- Software Audit for Acquisition Due Diligence www.nexb.com Agenda About nexb What nexb does Our experience Software Audit: M&A License Violation Risks & Recent Audit Issues Software Audit Process

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information