Can big data transform your business?



Similar documents
can you differentiate with cloud? you can

Can you simplify the buying and managing of services for your customers?

agility made possible

how can I improve performance of my customer service level agreements while reducing cost?

CA Technologies optimizes business systems worldwide with enterprise data model

A to Z Information Services stands out from the competition with CA Recovery Management solutions

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services

Layered Tech expands to new markets and improves ROI with CA 3Tera AppLogic

Crossing the DevOps Chasm

AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions

Security in the App Economy

Sallie Mae slashes change management costs and complexity with CA SCM

PGi halves the time-to-market for new products with cloud infrastructure solutions from CA Technologies

CA Clarity PPM. Overview. Benefits. agility made possible

Sicredi improves data center monitoring with CA Data Center Infrastructure Management

agility made possible

agility made possible

SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible

can I consolidate vendors, align performance with company objectives and build trusted relationships?

CA Chorus Helps Reduce Costs, Improve Productivity and Assist With Mainframe Skills Retention

How Can I Deliver Innovative Customer Services Across Increasingly Complex, Converged Infrastructure With Less Management Effort And Lower Cost?

CA Capacity Manager. Product overview. agility made possible

Evolving the IT Service Experience to Meet New Business and User Demands

A FinCo Case Study - Using CA Business Service Insight to Manage Outsourcing Suppliers

Data Governance Tips & Advice

Technology Partner Program

1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com. CA Security SaaS Validation Program. Copyright 2015 CA. All Rights Reserved.

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

CA Business Service Insight

Achieve Your Business and IT Goals with Help from CA Services

Architecture in the API Era

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Management Experience

CA s Cloud Storage for System z

Nordea saves 3.5 million with enhanced application portfolio management

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies

Insights: Data Protection and the Cloud North America

CA NSM System Monitoring Option for OpenVMS r3.2

Radix Technologies China establishes compelling cloud services using CA AppLogic

Business Agility SURVIVAL GUIDE

Dynamic Data Center Update:

how can I comprehensively control sensitive content within Microsoft SharePoint?

An Enterprise Architect s Guide to API Integration for ESB and SOA

Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions

CA SiteMinder SSO Agents for ERP Systems

agility made possible

FEMSA manages more than 80,000 IT, finance and HR tickets with CA Service Desk Manager

SOLUTION BRIEF BIG DATA MANAGEMENT. How Can You Streamline Big Data Management?

protect your assets. control your spending

BancoEstado achieves greater data efficiency and system development agility with CA ERwin

Picis improves the delivery of client projects worth $50 million with CA Clarity PPM

5 Pillars of API Management with CA Technologies

CA Arcot RiskFort. Overview. Benefits

Employing Best Practices for Mainframe Tape Encryption

Single Sign-on to Salesforce.com with CA Federation Manager

Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM

who can achieve high-performance cloud computing?

CA Cloud Service Delivery Platform

How To Be A World Class Data Center

agility made possible

Enterprise MDM Logical Modeling

are you helping your customer maximize the business value of IT and enabling them with tools and frameworks to deliver IT as a Service?

CA Cloud Service Delivery Platform

Building a Roadmap to Robust Identity and Access Management

Web Admin Console - Release Management. Steve Parker Richard Lechner

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

The Best Kept Secrets of Cloud Service Providers

How To Use Ca Product Vision

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

CA Oblicore Guarantee for Managed Service Providers

ATU safeguards sales and service quality with CA Infrastructure Management solutions

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

Atkins safeguards availability of client s geospatial systems with a CA AppLogic private cloud environment

Designing a CA Single Sign-On Architecture for Enhanced Security

Orchestrate IT Process with an Integrated Workflow Management

CA SOLVE:Central Service Desk for z/os

BM&FBOVESPA safeguards trading platforms with CA Service Assurance solutions

Asentinel Telecom Expense Management (TEM)

The National Commission of Audit

Cultura Inglesa São Paulo automates daily backup in 18 branches with arcserve

Overcoming the Three Pitfalls of Ineffective IT Monitoring Solutions

5 Ways to Get Top Mobile App Developer Talent for Your Open APIs

how can I deliver better services to my customers and grow revenue?

Service Virtualization CA LISA introduction. Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director

Authentication Strategy: Balancing Security and Convenience

Integrating Records Management and ediscovery Processes for Greater Efficiencies

CA Explore Performance Management for z/vm

CA Encryption Key Manager r14.5

The Advantages of Converged Infrastructure Management

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk

agility made possible

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

how can you shift from managing technology to driving new and innovative business services?

Closing the Biggest Security Hole in Web Application Delivery

what if you could increase your agility and improve your pace of IT innovation?

assure the quality and availability of business services to your customers

Debunking Cloud Software s Biggest Myths

how can you stop sprawl in your IT infrastructure?

How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits?

Transcription:

cloud accelerators Can big data transform your business? The cloud forces us to have a different kind of discipline around data security, mostly because it breaks down the assumption that we have any kind of network security at all. John thielens Chief Security Officer, Axway

There s always a risk. There are risks in doing things the old way and risks with doing things the new way the cloud way. People who just say no aren t engaging in the right discussion. About Axway Founded in 2001 Based in Phoenix, Arizona with offices in over 20 countries Specializes in managing, securing & monitoring business interactions Operating for over a decade providing solutions to leading organizations across most industries Over 1,700 employees 11,000 customers in 100 countries For more information, visit axway.com

Cloud Accelerator / JOHN thielens & alan taylor / axway Career Highlights 30 years of experience in the IT industry Formerly, VP of Product Marketing at GXS & Inovis Personal interests: attending his children s dance recitals & baseball games, playing piano, cycling & rollerblading John Thielens Chief Architect of Cloud Service & Chief Security Officer, Axway Career Highlights 30 years of experience in the IT industry Formerly, Director of Business Development at MobileAware Formerly, Business Development at IBM Tivoli Personal interests: spending time with family, golfing & entertaining guests Alan Taylor Alliances Director, Axway Can you tell us about Axway and the services that you offer? We describe ourselves as a business interaction networks company. Business interactions are about connecting businesses to other businesses and also about connecting the components of an enterprise together. Our services include business-to-business integrations, managed file transfer, business operations monitoring, process management, and email and identity security, which are offered on-premise or in the cloud. We ve been involved in the cloud since before it was called the cloud, managing services on behalf of some of our largest clients, and our data transmission solutions have been used by a number of vendors to move data in and out of the cloud. We are continuing to invest in cloud services and over the last few months, we ve developed services around our heritage of B2B and around community management.

what are the advantages of big data? The cloud is an infinitely scalable place and so this means that we re dealing with more and more data. Businesses no longer have to throw data away. The prize of Big Data is of course the analytics derived from all that volume, velocity and variety of data. Data gathered from multiple sources including the cloud can be used to find new insights and that analysis is quickly becoming a new wave of competitive differentiation. Being able to manage Big Data and deliver powerful data governance as a strategy leads all companies towards greater efficiencies, lower risk and increased revenues. Stored data that once was deemed worthless can now allow businesses to discover new nuggets of value out of that data they already have. We can create new marketing programs to drive new business that s quantifiable, because they can discover buying patterns and correlate information to provide data points for multiple initiatives. Our services in combination with CA Technologies products results in a powerful story for our customers. There are also defensive value points to big data. If you think about big data analysis in regards to security, it can help businesses find gaps and risks, and close them off to prevent loss of value by enhancing the security. Today it is critical that within the enterprise and the cloud we understand how to protect the customer brand by ensuring control, compliance, information security and data protection in everything they do, including big data. what are some of the challenges associated with big data? Today, we can take a photograph on a device and press a button to upload the photograph on Facebook in seconds. It s that kind of mobility and velocity with which data s coming at us. It s not only the amount of data that s being uploaded; it s the variety of data as well. Creating effective systems and processes for data standardization, information sharing, and collaboration, auditability and security across the entire business ecosystem will soon become an essential task for CIOs and their IT organizations. As big data makes its way back to these data warehouses for analytics, there are different varieties of data making their way across the network. Our job at Axway is to transform that through our gateway technology into a common denominator that then can go into and leave the data warehouse securely. So, volume, velocity and variety is really the challenge that we are now constantly responding to when we talk to customers about big data. to learn more about Axway, visit axway.com Are some companies using data security as an excuse not to adopt cloud? The great thing about security is that it can play the role of an excuse very easily. That can always be kind of a just because reason, but that s really an unfair game to play. I think even the word is wrong we should be talking about risk. There s always a risk. There are risks in doing things the old way and there are new risks with doing things the new way, the cloud way. People who just say no aren t engaging in the right discussion. Additionally, I think that the cloud forces us to have a different kind of discipline around data security, mostly because it breaks down the assumption that we have any kind of network security at all.

But when we think about securing data in the cloud, we know we re going through public networks, and so we have to think about defending all of the points of entry. Where does the data flow? That has to be secured. Who has access? That has to be secured. Who s taking back-up tapes? That has to be secured. We think about all the touch points for the data, because we assume that the environment is hostile. Now, in an on-premise world, we often will think about other types of defenses, like network-based defenses, but I think we may find that the vigilance that cloud computing forces us to have, in which we assume the data lives in a hostile environment, is actually a good discipline to bring back on-premise. As we look at some other trends around consumerization of IT and bring your own device, hostile devices entering the network and hostile people touching the network, our secure network and firewalls really are connected to a hostile environment, just like the cloud. Why is identity and access management so critical to data security? In a lot of ways, identity and access management is the backbone of the security infrastructure for the enterprise. If we think that the major threat points in the system are, in fact, the human element, then identity and access management is really where the system and the humans connect to each other. If our security value is to mean anything in the hands of people who aren t managed properly, then our technology is for naught. To learn more from cloud service providers working with CA Technologies, visit ca.com/cloudaccelerators Why did Axway choose to partner with CA Technologies? We began working with CA Technologies because of a mutual customer, and our relationship has really blossomed over the past few years. We also chose CA Technologies because they are a market leader and it s important to us that we align ourselves with the best partners in the industry. If you look at CA Single Sign-On and CA SiteMinder, CA Technologies is the market leader bar-none. Our solutions in combination with CA Technologies products results in a powerful story for our customers. The encryption, the data security, and the workflow process is provided by Axway software, and the authorization, identity management, credential life cycle, and the two factor mechanisms are all under the control of CA Technologies software. Not only are we a reseller of CA Technologies products, but we actually use the technology ourselves to run some of our large projects. More recently, we ve found ourselves drawn to the CA Technologies vision of what cloud means. Marketing people love the word, but enterprises are still trying to figure out what it means to them. I think CA Technologies and Axway have a well-aligned vision for the cloud, for the cloud, and CA Technologies can help us realize that vision through our partnership. Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. The information and results illustrated here are based upon the customer s experiences with the referenced software product in a variety of environments, which may include production and nonproduction environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.