SAS CLOUD ANALYTICS MAY 2015



Similar documents
Top 10 reasons to move to the cloud

IBM. Cloud Computing: A Transformational Force

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.


CONSULTING SERVICES Business & technology consulting and managed services

Global Real Estate Outlook

IBM Cloud Computing Case Studies Jinzy Zhu/ Executive, IBM Cloud Labs & HiPODS-Greater China

Service Organization Controls 3 Report

Running cloud through your business

T&E. Where Business Travelers Spend Money

Paul Schuman Sr Director, WW Hosting Service Providers Microsoft

Corporate Presentation

AVANTGARD Hosting and Managed Services

SAS and (the) Cloud. Dave Annis SAS Solutions ondemand

2015 Analyst and Advisor Summit

Guide. Axis Webinar User Guide

Managed Services Overview

Service Organization Controls 3 Report

AVANTGARD Private Cloud and Managed Services

The ROI of a New Learning Management System (LMS)

How To Get A Cloud Service For A Small Business

EMC Technology Trends

How To Motivate and Retain Key Employees

IE Business School s.

NCTA Cloud Architecture

Fujitsu World Tour Human Centric Innovation. The Future of the Datacenter. Ayman Abouseif VP Product Marketing. 0 Copyright 2015 FUJITSU

CAN NUCLEAR INSTALLATIONS AND RESEARCH CENTERS ADOPT CLOUD COMPUTING?

Websense Web Security Solutions

WHITEPAPER Workforce Planning Pitfalls

Web Application Vulnerability Scanner: Skipfish

Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance

Global Data Center Location Insights March 2013

2008 Disaster Recovery Research Overview and Key Findings Report

Global Data Center Location Insights March 2013

Symantec State of the Data Center Research Highlights. October 2007

Cmix solution. CMix Japan Co. Ltd. Copyright (C) 2007 CMix Japan Co. Ltd. All Rights Reserved.

Guide. Axis Webinar. User guide

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Software-as-a-service Delivery: The Build vs. Buy Decision

MANDATORY PROVIDENT FUND SCHEMES AUTHORITY

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1

THE GLOBAL LEADER FOR LIMS and ELN SOLUTIONS

SOC 3 for Security and Availability

BIG DATA DAY BAKU 2015 Qafqaz University, 16 May 2015

Data Warehouse Management Software - Global Strategic Business Report

World City Millionaire Rankings. May 2013

Accredited TOGAF 9 and ArchiMate 2 Training Course Calendar February 2016 onwards

HP Helion Hybrid Cloud Built for the Enterprise, Solutions for the New Style of Business

TECHNOLOGY SECURITY AUDIT

Security and Services

INTERNET OF THINGS Delight. Optimize. Revolutionize.

Information & network security in the new threat landscape. Sarah Greenwood

Alvarez & Marsal Global Forensic and Dispute Services Asia Pacific Regional Meeting (APRM) Tokyo, Japan April 2015

Cloud Computing. Jean-Claude DISPENSA IBM Distinguished Engineer

ASAP implementation approach for SAP ERP implementation has five major phases as shown in below picture. Fit and Gap Analysis (FGA) is very critical

HYBRID CLOUD Why is it important & how do you manage it?

2015 Techstravaganza The Microsoft Cloud

Agenda. Company Platform Customers Partners Competitive Analysis

Beyond Simple Total Cost of Ownership

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

Global Hadoop Market (Hardware, Software, Services) applications, Geography, Haas, Global Trends,Opportunities, Segmentation and Forecast

U.S. News Best Global Universities Rankings: An inside look at the latest results and methodology

Customer Relationship Management (CRM) Analytics Global Market Analysis - Forecast ( )

Customer Care Service Level Agreements

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Fraud in Your International Business

ColdFusion 10 in the Amazon AWS Cloud. Sven Ramuschkat tecracer GmbH

service supply chain business continuity risk management

Fast, scalable and CAPEX-free servers in Pacnet's advanced data centers PACNET HARDWARE-AS-A-SERVICE

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

If you are considering a cloud infrastructure, your first questions should be:

An open and flexible cloud platform. Quickly build, deploy, and manage solutions across a global network of Microsoft-managed datacenters.

Brochure More information from

Best Practices for a BYOD World

EMC ACADEMIC ALLIANCE

A Global Rating Agency >

White paper. SAS Solutions OnDemand Hosting Overview

Concur Expense IQ Report 2013

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

2015 Global Shared Services Survey Executive summary. Deloitte Consulting LLP February 2015

Our Financial Services Regulatory practice

AVANTGARD RECEIVABLES GETPAID Enterprise Edition

Global Cloud Storage Market. More Info: Contact: /500 Visit:

Thomson Video Networks Contact Center Guide

Amazon Web Services Yu Xiao

P R E S S R E L E A S E

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Telecom Business Assurance. Managed Services

IT Audit Services. Ensuring the Right Systems and Controls Are in Place to Manage Risks Created by New Technologies

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Microsoft Azure. The cloud platform built for business. Tarmo Tikerpäe DC SSP Microsoft

International Health Solutions. Worldwide Healthcare Plan

Fujitsu Legacy Modernization Integrating Legacy Applications through Cloud Services

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Degree Recognition & its Impact on Student Mobility

Cargo Sales & Service Presentation

Transcription:

SAS CLOUD ANALYTICS MAY 2015

SAS SOLUTIONS ONDEMAND HISTORY Established in 2000 Formed as the Application Service Provider Group HP ES40 6/833: Tru64 Unix V5.1 TruCluster. 4 CPU s, 8 GB Memory 2

SAS CLOUD ANALYTICS - PRESENT

SAS SOLUTIONS ONDEMAND 700+ employees worldwide Multiple lines of business representing 250+ SAS solutions 450 customer sites with users from over 70 countries 4

GLOBAL ADVANCED ANALYTICS LAB Formed by Dr. Goodnight in 2007 150+ dedicated Data Scientists 97% of analysts hold advanced degrees in statistics, mathematics, and operations research, with 40% of these being PhDs 30 approved and 15 pending patents 5

SAS DATA CENTERS Multiple Global & Regional Data Centers Customer and Third-party IT options 2500+ managed servers, of which 1700+ are virtual (67%) 8 PBs managed storage Scalable infrastructure with physical and logical security Applications monitoring and support 24/7 High availability / disaster recovery 6

SAS SOLUTIONS ONDEMAND Security is Top Priority SECURITY AND CERTIFICATIONS Hosting Environment SOC 2 / SOC 3 Safe Harbor Physical and logical security Scalable infrastructure Standard SLA of 99% uptime Multiple data centers ISO 27001 international data centers 7

SAS CLOUD Live ANALYTICS 1. Cary, NC, USA 2. Charlotte, NC, USA 3. Toronto, Canada 4. Wynyard, UK 5. Dublin, Ireland 6. Johannesburg, South Africa 7. Sydney, Australia (2) In Progress 1. Frankfurt, Germany Oregon California Charlotte Toronto Virginia Cary Dublin L Isle d Abeau Barcelona London Frankfurt Cernusco Beijing Seoul Tokyo Available Dubai 1. Alphaville + Sao Paulo, Brazil 2. Barcelona, Spain 3. L Isle d Abeau, France Bangalore Singapore 4. Cernusco, Italy 5. Dubai, UAE 6. Bangalore, India 7. Seoul, Korea 8. Beijing, China 9. Tokyo, Japan 10. Singapore 11. Oregon, California, Virginia, Live In Progress Available August 2014 Sao Paulo Alphaville Johannesburg Sydney USA 8

SAS CLOUD ANALYTICS OFFERINGS DELIVERED BY SAS SOLUTIONS ONDEMAND

DEPLOYMENT OPTIONS WHAT MEETS THE BEST NEEDS OF THE CUSTOMER? Private Cloud RaaS SaaS IaaS Enterprise Hosting SAS Cloud Azure Google AWS Public Cloud Platform and Infrastructure By cloud provider *Software by SAS* Platform and Infrastructure by Customer *Software by SAS* Remote Managed Services 10

CURRENT SOLUTION OFFERINGS DELIVERED BY SAS SOLUTIONS ONDEMAND

SAS CLOUD ANALYTICS SOLUTION OFFERINGS Life Sciences Government Health Plans (Public/Private) Organizations that discover and develop new products, as well as the companies that service those firms State and federal government organizations Organizations that manage insurance and payments for consumers and employers SDD, CTDT, Key Opinion Leader Tax Fraud, Workers Compensation Fraud, Unemployment Fraud (Tax and Insurance) Child Welfare, Eligibility Fraud, Claims Fraud Fraud, Health Outcomes Analysis, Episode Analytics 12

SAS CLOUD ANALYTICS SOLUTION OFFERINGS Banking Retail and Investment banking and Financial Services Insurance Property and Casualty Insurance with Personal and/or Commercial lines Cyber Insider Threat programs for cross industry verticals Asset Performance Management and Basel 3 Compliance and Fraud Management solutions for all fraud types Fraud Detection services for Claims and organized activities around providers Subrogation Comprehensive Insider Threat monitoring solution with real time monitoring 13

SAS SECURITY INTELLIGENCE TRUSTED ACCESS A malicious insider threat to an organization is a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems. Carnegie Mellon University CERT Division of the Software Engineering Institute (SEI) 14

SAS SECURITY INTELLIGENCE DEMONSTRATION Automated Business Rules weblog/syslog security/dlp organization Levels e-comms of Detection Threat Score Anomaly Detection Link and Predictive analytics Text Analytics Insider Threat Score Combining analytical methods and domain expertise White box Ability to evolve 15

16

17

PIONEERING DATA SCIENTISTS R.A. Fisher In God we trust; all others must bring data. Edwards Deming Trevor Hastie, Robert Tibshirani, and Jerome Friedman, co-authors of The Elements of Statistical Learning in their Preface essentially, all models are wrong, but some are useful. Box, George E. P.; Norman R. Draper (1987). Empirical Model-Building and Response Surfaces, p. 424. 18

SAS SOLUTIONS ONDEMAND For additional information, contact: John.Brocklebank@sas.com, Jinwhan.Jung@sas.com www.sas.com