Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015
By 2025 we will become a deeply connected, digital world Digital everything everywhere, everyday, everyone connected 1 Transforming how we live and work Generating new digital ecosystems and insights Creating new business models and lowering barriers to entry Disrupting every business, in every industry 2 Sources: 1,2: IP & Science business of Thomson Reuters The world in 2025 10 predictions in innovation, 2014
Connected devices are changing business processes and people s lives Asset tracking Security Traffic lights Roadside equipment Pumps Fire & emergency Driver behavior Air quality Noise Electricity switch Lighting Product delivery Product electronics & entertainment Digital signage Telecom infrastructure Air con Vehicle leasing Water distribution Vibration Access control 3
SMART DEVICES Intelligence everywhere Everyday devices are infused with intelligence that is updated in real time. security devices parking control shopping trolley SENSORS constantly connected. Everything we own is connected to the Internet. shopping displays automated factories wearable monitors house control cooking smart power TVs cars kitchen appliances fire sensors medical robots TABLETS road-side sensors SMART PHONES exercise machines poaching sensors wearable devices Enable Business to create entirely new value propositions smart phones
Creating new waves of opportunity New types of applications New Style of Business New approaches to IT operations New demands & uses for insight New customers and buying behaviors New consumption models New revenue streams New threats and risks 5
IT organizations must become value creators Lower cost of doing business Host workloads & applications Provide hardened systems & networks Manage data Generate business outcomes Rapidly create and broker new services Predict threats and manage risk Provide real-time insight and understanding Respond and react Continuously deliver 6
Information + Applications are the Product and IT is the vehicle that will make or break your success
Everyone will expect more apps, delivered more quickly your customers, your partners, your users, your boss 2010 4 releases per year 2015 36 releases per year 2020 120 releases per year Steady Stream of Improvement Thanks to consumerization, users now expect continuous improvements to apps rather than the traditional annual mega-updates
and do it simply, securely, and collaboratively.
It will be a journey Data Center in silos Converge & Modernize Automate Tasks Orchestrate Processes Transform Delivery Hybrid Cloud Analytics
But the mission is a critical one Supply from anywhere IT becomes an internal service provider Business is Enabled Off Premise Fast & easy access to IT resources On Premise Continuous IT Service Delivery Application innovation 11
Hybrid IT is not easy confidence 100% 80% 60% 40% 20% 0% 2012 2013 2014 2015 2016 2017 2018 2019 2020 Managing mosaics of services Year IT execs expect to manage business processes confidently across services spanning data centers and public and private clouds. And yet, less than 20% of companies have an active IT as a Service Broker policy. (Gartner 2014)
We must automate in order to scale. Expected automation of IT Operations By 2020 the majority will have shifted to automation Today 2020 No Automation Up to 1/4 1/4 to 1/2 1/2 to 3/4 3/4 to all 6% 45% 35% 12% 2% 1% 2% 12% 49% 35%
We will need to break down silos between Developers, QA and Operations. A single-model DevOps system This approach allows IT Ops to better manage application performance, compliance, security, change and backup and recovery
Enabling rapid delivery of amazing customer experiences across mobile, cloud & traditional apps
The value will come from the information that s hardest to manage Wearable Headband Glasses Ear-mounted cameras Mood sweater Gait-sensing shoes Type of data generated Brain sensing headband Augmented reality Live streaming of select content Projects my mindset in advance Controls my stride
Human data Volume of data Big Data shift Mobile apps System logs Data centers Compliance archives Internet of Things Sensors Technology gap Machine data Business data Social networking Data Photo sharing Wearable devices Time
HP Haven platform Turn 100% of your data into action. Human data Machine data Haven Business data
HP Haven platform HP applications Customer applications Developer applications Platform ecosystem Services Over 850 trained professionals Developers Over 6,000 developers Partners Over 200 platform partners Delivery Over 10,000 customer implementations Haven Defined programming interfaces Analytics, indexing, context and categorization Scalable data stores Data connectors Social media Video Audio Email Texts Mobile Transactional Documents IT/OT Search data engine Images Records Compliance archives
Powerful software for information management and governance Information Management & Governance Solutions Archiving & ediscovery Compliance Litigation Readiness Storage Optimization Database Archiving ediscovery Supervision Legal Hold Enterprise Content Management Records Mgmt. Legal Content Mgmt. Business Process Mgmt. Document Mgmt. Records Mgmt. Legacy Clean Up Data Protection Server Data Protection Virtual Machine Data Protection Remote & Branch Office Data Protection Endpoint Device Data Protection Cloud Data Protection
(IoT) devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries
70% used unencrypted network services 70% allow an attacker to identify valid user accounts through account enumeration 90% collected at least one piece of personal information 100% of security systems and 80% of IoT devices don t require sophisticated passwords 6 of10 had user interfaces vulnerable to issues such as persistent XSS and weak credentials
HP Software for the Attack Life Cycle Research Research potential targets Threat Intelligence HP Security Research Infiltration Phishing attack and malware Block Adversary HP TippingPoint HP Fortify Monetization Data sold on Black Market Discovery Mapping breached environment Detect Adversary HP ArcSight Exfiltration/Damage Exfiltrate/destroy stolen data Action HP Services HP Info Governance Capture Obtain data Protect Data HP Atalla HP Voltage Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Leaders across the portfolio according to Gartner and Forrester App Delivery Cloud Security Big Data - Solutions Big Data - Platform Gartner Magic Quadrant Integrated Software Quality Suites Forrester ranked HP top for private cloud Gartner Magic Quadrant Application Security Testing Gartner Magic Quadrant Enterprise Information Archiving Gartner Magic Quadrant Enterprise Search HP HP HP HP
HP Software: The Power to Act Now