Connected Intelligence and the 21 st Century Digital Enterprise



Similar documents
What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

IoT and Distributed Mesh Computing

Решения HP по информационной безопасности

Improving Customer Communications by Proper Personalization

Find the intruders using correlation and context Ofer Shezaf

Changing the Enterprise Security Landscape

Security Operation Centre 5th generation

HP Software, Big Data Rethinking Data Protection

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

Digitization of Enterprise - New Style of IT

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Assuring Application Security: Deploying Code that Keeps Data Safe

Managing the Challenges of Cloud Management November 7, 2013

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Circuit Protection is Key in Maintaining Growth for The Internet of Things

Bezpečnosť dát v HP Cloude

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Big Data Analytics: Today's Gold Rush November 20, 2013

Public, Private, Hybrid:

Simple, scalable and secure unified wired and wireless networking

Big Data Analytics- Innovations at the Edge

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China

Information Archiving

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

HP IT Operations Management (ITOM)

Investor Presentation. Second Quarter 2015

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

IBM Security IBM Corporation IBM Corporation

The Hillstone and Trend Micro Joint Solution

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

The Internet of Things (IoT) Opportunities and Risks

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Delivering Quality Service with IBM Service Management

HP Fortify Software Security Center

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

The promise of SDN. EU Future Internet Assembly March 18, Yanick Pouffary Chief Technologist HP Network Services

What s New With HP Service Manager and Universal CMDB December 18, 2014

The Amazing Future of the IoE

HP Cloud technologies

In the pursuit of becoming smart

Hybrid Cloud Architectures for Operational Performance Management

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

The Internet of Things

IBM QRadar Security Intelligence April 2013

Big Data Integration: A Buyer's Guide

Enabling Digitization with Next Generation Cloud

The Evolution of Application Monitoring

2014 DATA CENTER TRENDS

Finding the right cloud solutions for your organization

On and off premises technologies Which is best for you?

Threat-Centric Security for Service Providers

HP Microsoft. Unified Communications & Collaborations. Francisco Martinez. Alfredo Alvarez. UC Architect Microsoft. Solutions Architect HP Networking

How to Turn the Promise of the Cloud into an Operational Reality

The Future of Data Management

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault

From the Bottom to the Top: The Evolution of Application Monitoring

HP S POINT OF VIEW TO CLOUD

#ITtrends #ITTRENDS SYMANTEC VISION

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Security and the Internet of Things (IoT)

DAY 1 MONDAY, SEPT

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

How the Internet of Things Will Transform the Manufacturing Industry

RSA Identity and Access Management 2014

Transcription:

Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015

By 2025 we will become a deeply connected, digital world Digital everything everywhere, everyday, everyone connected 1 Transforming how we live and work Generating new digital ecosystems and insights Creating new business models and lowering barriers to entry Disrupting every business, in every industry 2 Sources: 1,2: IP & Science business of Thomson Reuters The world in 2025 10 predictions in innovation, 2014

Connected devices are changing business processes and people s lives Asset tracking Security Traffic lights Roadside equipment Pumps Fire & emergency Driver behavior Air quality Noise Electricity switch Lighting Product delivery Product electronics & entertainment Digital signage Telecom infrastructure Air con Vehicle leasing Water distribution Vibration Access control 3

SMART DEVICES Intelligence everywhere Everyday devices are infused with intelligence that is updated in real time. security devices parking control shopping trolley SENSORS constantly connected. Everything we own is connected to the Internet. shopping displays automated factories wearable monitors house control cooking smart power TVs cars kitchen appliances fire sensors medical robots TABLETS road-side sensors SMART PHONES exercise machines poaching sensors wearable devices Enable Business to create entirely new value propositions smart phones

Creating new waves of opportunity New types of applications New Style of Business New approaches to IT operations New demands & uses for insight New customers and buying behaviors New consumption models New revenue streams New threats and risks 5

IT organizations must become value creators Lower cost of doing business Host workloads & applications Provide hardened systems & networks Manage data Generate business outcomes Rapidly create and broker new services Predict threats and manage risk Provide real-time insight and understanding Respond and react Continuously deliver 6

Information + Applications are the Product and IT is the vehicle that will make or break your success

Everyone will expect more apps, delivered more quickly your customers, your partners, your users, your boss 2010 4 releases per year 2015 36 releases per year 2020 120 releases per year Steady Stream of Improvement Thanks to consumerization, users now expect continuous improvements to apps rather than the traditional annual mega-updates

and do it simply, securely, and collaboratively.

It will be a journey Data Center in silos Converge & Modernize Automate Tasks Orchestrate Processes Transform Delivery Hybrid Cloud Analytics

But the mission is a critical one Supply from anywhere IT becomes an internal service provider Business is Enabled Off Premise Fast & easy access to IT resources On Premise Continuous IT Service Delivery Application innovation 11

Hybrid IT is not easy confidence 100% 80% 60% 40% 20% 0% 2012 2013 2014 2015 2016 2017 2018 2019 2020 Managing mosaics of services Year IT execs expect to manage business processes confidently across services spanning data centers and public and private clouds. And yet, less than 20% of companies have an active IT as a Service Broker policy. (Gartner 2014)

We must automate in order to scale. Expected automation of IT Operations By 2020 the majority will have shifted to automation Today 2020 No Automation Up to 1/4 1/4 to 1/2 1/2 to 3/4 3/4 to all 6% 45% 35% 12% 2% 1% 2% 12% 49% 35%

We will need to break down silos between Developers, QA and Operations. A single-model DevOps system This approach allows IT Ops to better manage application performance, compliance, security, change and backup and recovery

Enabling rapid delivery of amazing customer experiences across mobile, cloud & traditional apps

The value will come from the information that s hardest to manage Wearable Headband Glasses Ear-mounted cameras Mood sweater Gait-sensing shoes Type of data generated Brain sensing headband Augmented reality Live streaming of select content Projects my mindset in advance Controls my stride

Human data Volume of data Big Data shift Mobile apps System logs Data centers Compliance archives Internet of Things Sensors Technology gap Machine data Business data Social networking Data Photo sharing Wearable devices Time

HP Haven platform Turn 100% of your data into action. Human data Machine data Haven Business data

HP Haven platform HP applications Customer applications Developer applications Platform ecosystem Services Over 850 trained professionals Developers Over 6,000 developers Partners Over 200 platform partners Delivery Over 10,000 customer implementations Haven Defined programming interfaces Analytics, indexing, context and categorization Scalable data stores Data connectors Social media Video Audio Email Texts Mobile Transactional Documents IT/OT Search data engine Images Records Compliance archives

Powerful software for information management and governance Information Management & Governance Solutions Archiving & ediscovery Compliance Litigation Readiness Storage Optimization Database Archiving ediscovery Supervision Legal Hold Enterprise Content Management Records Mgmt. Legal Content Mgmt. Business Process Mgmt. Document Mgmt. Records Mgmt. Legacy Clean Up Data Protection Server Data Protection Virtual Machine Data Protection Remote & Branch Office Data Protection Endpoint Device Data Protection Cloud Data Protection

(IoT) devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries

70% used unencrypted network services 70% allow an attacker to identify valid user accounts through account enumeration 90% collected at least one piece of personal information 100% of security systems and 80% of IoT devices don t require sophisticated passwords 6 of10 had user interfaces vulnerable to issues such as persistent XSS and weak credentials

HP Software for the Attack Life Cycle Research Research potential targets Threat Intelligence HP Security Research Infiltration Phishing attack and malware Block Adversary HP TippingPoint HP Fortify Monetization Data sold on Black Market Discovery Mapping breached environment Detect Adversary HP ArcSight Exfiltration/Damage Exfiltrate/destroy stolen data Action HP Services HP Info Governance Capture Obtain data Protect Data HP Atalla HP Voltage Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Leaders across the portfolio according to Gartner and Forrester App Delivery Cloud Security Big Data - Solutions Big Data - Platform Gartner Magic Quadrant Integrated Software Quality Suites Forrester ranked HP top for private cloud Gartner Magic Quadrant Application Security Testing Gartner Magic Quadrant Enterprise Information Archiving Gartner Magic Quadrant Enterprise Search HP HP HP HP

HP Software: The Power to Act Now