SlideShare uma empresa Scribd logo
1 de 66
© 2013 IBM Corporation
Welcome and introduction
to the conference
Peter Ellegaard
Country Manager Cloud & Smart Infrastructure Denmark (Tivoli)
May 28th 2013
Lokomotivværkstedet Copenhagen
1
The Venue
Lokomotivværkstedet
 +100 years old listed building
 Danish railway history
 Lokomotiv maintenance
 9.000 m2
One of few possible places
 Nordic event
 More than 500 attendees
 5 tracks
 Exhibition hall
 Dinner / Lasse Rimmer
 1:1 meetings
 4 User Group meetings
New experience
 Virtual space division
 Headphones needed
 Leave headphones on chair
2
Cloud & Smarter Infrastructure (Tivoli)
Tivoli®
3
Visibility
Control
Automation
to see and understand
your business in real time
to transform and adapt
while limiting risk & cost
to achieve greater
efficiency and agility
Turning Opportunities Into Outcomes
Business
IT
4
What Is Driving new Opportunities and IT Demand
Explosion of Mobile Devices
Infrastructure Optimization
Cloud Computing
Growth of Social Media
Advanced Predictive Analytics
Real-time Sensor Data
Cyber Security
Business
Optimization
+
Big Data
5
The 5 main tracks
6
Agenda Morning
© 2013 IBM Corporation
© 2013 IBM Corporation
Turning Opportunities into Outcomes
Moe Abdula,
Vice President, IBM SmartCloud Foundation Portfolio Strategy
8
Internet of
information
Internet of
engagement
Internet of
“things”
200 BILLION
100 BILLION
50 BILLION
INTERMITTENTLY CONNECTED DEVICES AND PEOPLE
2000 20202010
The convergence of technology is transforming
the world into an Internet of things…
9
Fuels investments in
innovation
Drives need for continuous
optimization
Optimization Innovation
The ability to balance Optimization and Innovation will be
critical to success…
9
10
41%experience
development delays
34%experience
deployment delays
45%experience
production delays
Source : A commissioned study conducted by Forrester Consulting on behalf of IBM, 4Q2011
However, organizations are challenged in Optimizing
product & service delivery, and in turn, driving Innovation….
10
Business OperationsDevelopmentCustomers
11
An open, and holistic approach to managing the delivery of
products & services across smarter infrastructures is needed…
11
12
IBM provides an open, and holistic approach to managing the
delivery of products & services across smarter infrastructures…
13
Cloud Computing: A Next Generation Cloud Architecture
Built upon a
Cloud standards
architecture
Patterns of Expertise
Workload Optimization
Dynamically
Orchestrated Services
14
Cloud
Orchestration
Services • Storage • Network
Cloud Service
Management
Images • Patches • Threats
Cloud Service
Delivery
Visibility • Control • Automation
Open Service
Lifecycle
Collaboration
Intelligent Cloud Workloads
Virtualization
Computing Resources
Cloud Computing: Extending value & optimizing investments…
15
An integrated set of capabilities for enabling private/hybrid clouds and
the virtualization, automation and management of service delivery
Cloud Computing: IBM SmartCloud Foundation
Virtualized Standardized Automated
Infrastructure as a Service Capabilities
Infrastructure UsagePerformanceManagement Security
Platform as a Service Capabilities
Lifecycle Resources Environments Management Integration
 Resilient to the velocity of
changing business needs
 Enables choice & flexibility
in hybrid environments
 Provides enterprise-class,
workload-aware services
 Built-in analytics for
improved insight and decision
making
15
16
Cloud Computing:
Flexibility in consuming & integrating hybrid clouds…
Evolve existing
infrastructure
to Cloud
Accelerate adoption
with expert
integrated systems
Immediate access
to a managed
platform
Enterprise
Hosted private cloud
16
17
Cloud Computing: Client Case Studies
Technical University of Munich
Cloud Platform, Orchestration & Monitoring
• Reduced manual workload by about 40% and provisioning time for
SAP systems from 3 days to less than ½ day.
• Replaced 150 servers with just four IBM systems, cutting 13 full
racks to only four half-full racks.
• Reduced energy consumption by 80% for the SAP application
landscape. Data storage reduction by 40%.
Aetna
Cloud DevOps and Orchestration
• DevOps enables better, faster product development via self-service
automation
• Anytime, anywhere access to healthcare services for clients using
mobile & cloud
• Removed siloes by creating single role of cloud engineer that spans
domains.
17
18
IBM provides an open, and holistic approach to managing the
delivery of products & service across smarter infrastructures….
19
Enterprise Mobility: Why take an integrated approach?
Speed time to deployment of enterprise mobile apps and
updates, while improving quality
Improve WiFi network management for greater reliability,
employee productivity, and minimize business interruptions
Enhance end-to-end security to help prevent loss of
intellectual property and regulated data
Less total infrastructure for lower hardware, admin costs
Reduce help desk calls, device replacement costs
19
20
Enterprise Mobility: Manage and secure all your devices
Endpoint Management
Systems
Management
Security
Management
Common agent
Unified console
Single
management
server
Managed = Secure
Desktops, Laptops,
& Servers
Smartphones
& Tablets
Purpose-specific
Endpoints
Implement BYOD with
confidence
Secure sensitive data,
regardless of device
Handle multi-platform
complexities with ease
20
21
Enterprise Mobility:
The Industry’s Most Comprehensive Mobile Portfolio
The Broadest
Portfolio of
Mobile Solutions
The Deepest Set
of Services
Expertise
New Industry
Partnerships and
Resources for
Developers
21
22
22
Enterprise Mobility: Client Case Studies
CenterBeam
Unified Mobile, Desktop, and Server Management
• Can now support PCs, Macs, servers, and virtually every flavor of
mobile device, increasing compliance over 20% to 98%
• Now manage 20,000 endpoints across 49 countries and six
continents, a 10x increase, with just one engineer
• Mitigating client risk with strengthened endpoint security
North American Public Utility
Mobile device and Endpoint Management
• Support 20,000 mobile devices - corporate and employee owned -
with mixed platform and OS versions
• Add mobile devices in just days, while adhering to internal security
policies and external regulations.
• Solution is scalable to 250,000 endpoints without adding
infrastructure
23
IBM provides an open, and holistic approach to managing the
delivery of products & service across smarter infrastructures….
24
Smarter Physical Infrastructure:
Instrumented, Interconnected, Intelligent
A comprehensive set of integrated enterprise capabilities that help organizations to keep
plants, facilities, data centers, or cities operating effectively.
• Dashboard views of service health
• Predictive analytics & reporting
• Mobile workforce support
• Asset, work and inventory management
• Complex & embedded systems
• IT & Enterprise assets
• Facilities & real estate
• Event filtering and correlation
• Process & workflow automation,
and rules management
• Enterprise content management
Process Automation
Facilities and
Real Estate
Enterprise
Assets
Complex and
Embedded Systems
Analytics Mobility
24
25
25
Facilities & Real Estate
Transportation & Fleet
Linear Assets
Plant & Production
IT & Network Equipment
Smarter Physical Infrastructure: End-to-end asset management
25
26
26
Smarter Physical Infrastructure: Client Case Studies
Halifax International Airport Authority
Preventative Asset Monitoring, Management & Reporting
• Corrective maintenance on assets reduced from 80 percent to only
10 percent
• Number of work orders the service department can handle increased
from 450 to 1,000, a 55 percent increase
• Airport is better prepared for weather events and track costs more
effectively; Improved regulatory reporting.
Akita City
Predictive Facilities & Energy Management
• Real-time sensors, & 3D color-coded views allow city to predict
energy use, and immediately reduce consumption to meet targets.
• Expected 6 percent reduction in energy consumption through better
visibility and control over city facilities’ energy usage
• Improve preventive maintenance, and compliance with Revised
Energy Saving Law.
INSERT
LOGO
27
IBM provides an open, and holistic approach to managing the
delivery of products & service across smarter infrastructures….
28
Security Intelligence,
Analytics and GRC
Applications
People
Data
Infrastructure
Mobile
Security
Cloud
Security
Security
Intelligence with
Big Data
Security Intelligence: Across big data, mobile & cloud
32
Security Intelligence: Client Case Studies
BlueCross BlueShield of North Carolina
Securing Big Data
• Directly supports HIPAA compliance by controlling access
to client member data
• Saves 5,000 hours of staff time by removing manual steps
and automating security processes
Flemish Government
Securing Digital services
• Authentication flexibility ensures compatibility with future
access requirements including cloud and mobile services
• Significantly reduces the time and cost to introduce new
applications across100 government sites
• Provides six million citizens with seamless access to all
Authorities’ services with context-aware digital identities
INSERT
LOGO
32
33
AUTOMATIONVISIBILITY
CONTROL
Reporting
Registry
Security
Dashboarding
Administration
Open
Interoperability
Services
Only IBM provides a holistic approach that enables Visibility,
Control & Automation across smarter infrastructures…
unnecessary
risk and cost
outcomes from
limited investments
with agility to
changing landscapes
ReduceAchieveReact
33
© 2013 IBM Corporation
Bring Your Own Disaster -
The Security Risk and Challenges
of BYOD (From a hacker’s perspective)
Martin Overton, Ethical Hacker, IBM Security Services
Lead and Senior Security Consultant, Cyber Security Intelligence and Response Team
May 28th 2013
Lokomotivværkstedet Copenhagen
35
Agenda
What is BYOD?
Growth
Threatscape
Issues and Problems
Solutions
Conslusions
36
What is BYOD an Why Should You Care?
“BYOD is a phrase that has become widely adopted to refer to
employees who bring their own computing devices – such
as smartphones, laptops and PDAs – to the workplace for use
and connectivity on the corporate network.”
- Source: http://www.webopedia.com/TERM/B/BYOD.html
Source: Intel (1. Gartner, 2. ReadWrite.com Survey)
37
2,641,350
The Average Company Faces Per Week
Security Attacks
1. Health & Social Services
2. Transportation
3. Hospitality
4. Finance & Insurance
5. Manufacturing
6. Real Estate
7. Mining, Oil & Gas
Top 7 Most ATTACKED Industries
62Security Incidents
The Average Company
Experiences Per Week
1. End user didn’t think before clicking
2. Weak password / default password in use
3. Insecure configuration
4. Use of legacy hardware or software
5. Lack of basic network security protection or
segmentation
Top 5 reasons WHY attacks were possible
Did you know...
Malicious Code
Sustained Probe or Scan
Unauthorized Access
Low-and-Slow Attack
Access/Credentials Abuse
Denial of Service
What IBM Sees
Categories of Attack
38
Number of vulnerabilities increase radically with emergence of
new business models and technologies.
Mobility
Employees,
customers,
contractors,
outsourcers
Bring your
own IT
Social business
Cloud and virtualization
1 trillion connected
objects (cars,
appliances, cameras)
30 billion RFID1
tags (products,
passports,
buildings and
animals)
1 billion
workers will
be remote or
mobile
1 billion mobile
Internet users
30 percent
growth of 3G
devices33 percent of all new business
software spending will be
Software as a Service
Source: IBM X-Force® Trend Report, 2011
Exponentially growing and interconnected
digital universe
Adopting new business models and
embracing new technologies
39
To stay ahead focus on disrupting the attackers capability,
timeline and impact
Security Risk Management is the application of control to detect and block the
threat, to detect and fix a vulnerability, or to respond to incidents (impacts) when
all else fails.
Threat
Can exploit
Vulnerability Impact
(Weakness)(Actor) (Loss)
And cause
Security risk exists when …
“The more the environment changes,
the more the opportunities exist for risk.”
40
In IBM’s recent 2012 Chief Information Security Officer Study,
security leaders shared their views on how the landscape is changing.
Source: IBM 2012 CISO Assessment http://www.ibm.com/smarterplanet/us/en/business_resilience_management/article/security_essentials.html
Nearly two-thirds say senior
executives are paying
more attention to
security issues.
Two-thirds expect
to spend more on
security over the next
two years.
External threats
are rated as a bigger
challenge than
internal threats, new
technology or compliance.
More than one-half say
mobile security
is their greatest near-
term technology
concern.
41
Motivation and Sophistication is Evolving Rapidly
 Attackers
have more
resources
 Off-the-shelf tools
are available for
sale
 They will keep
trying until
they get in
42
The new security landscape - Sophisticated attackers are a primary concern
Threat Profile Type
Share
of Incidents
Attack Type
Advanced
threat /
mercenary
National
governments
Terrorist cells
Crime Cartels
23%
 Espionage
 Intellectual property theft
 Systems disruption
 Financial Crime
Malicious
Insiders
Employees
Contractors
Outsourcers
15%
 Financial Crime
 Intellectual Property Theft
 Unauthorized Access/
Hacktivist Social Activists 7%
 Systems disruption
 Web defacement
 Information Disclosure
Opportunist
Worm and virus
writers
“Script Kiddies”
49%
 Malware propagation
 Unauthorized Access
 Web defacement
PotentialImpact
Source: Government Accountability Office, Department of Homeland Security's Role in Critical Infrastructure Protection Cybersecurity, GAO-05-434; IBM CyberSecurity Intelligence & Response Team, Sep 2012
43
Threat Convergence Replacing Threat Evolution
 Threat Evolution:
– A flat world has brought about
an unprecedented amount of
criminals and cons
– Attackers keep ROI in mind
as well, and constantly evolve
their wares in order to re-
purpose it for the next flood of
attacks
– High profile vulnerabilities will
still be the vehicles for new
attacks, however, the low and
slow attack vectors cannot be
ignored
– The economics of exploitation
must be taken into
consideration to better
prioritize risk
44
 Adversary compromises endpoint used by a
systems administrator with undetectable
malware.
– The malware has two components:
1) A keystroke logger to capture credentials
2) Command and control capability
Here is the anatomy of a targeted attack.
 With credentials and command and control
malware, adversary impersonates the Sys
Admin to gain privileged access to systems
and data.
 Data is stolen, and production systems are
further compromised.
1Advanced persistent threat (APT)
People
Endpoints
Applications
Infrastructure
Data
Privileged user
Employees
Contractors
Consultants
Suppliers
Customers
Web applications Mobile apps
Unstructured At rest In motionStructured
Customer environment
System applications
APT1 and hacker, or
activist
45
Source: Intel
46
BYOD Problems
 Organisation Level Issues:
– Un-trusted devices on your network.
– No idea if the device has been hacked or infected.
– Who owns the data? The device owner or you?
– How can you stop an (ex-)employee leaving with your intellectual property or
customer data?
– What happens when a security breach occurs?
– Are you going to insist on Whole Disk Encryption?
– Patches, security software, so many different vendors, Operating Systems and
versions to contend with…
 Personal Issues (Device Owner):
– Your device may get seized (confiscated) as part of an investigation.
– Privacy issues; your personal data on your personal device may be reviewed.
– What happens when the device fails or gets stolen? Who’s responsible for fixing or
replacing it?
47
IBM is well qualified to secure the enterprise.
Major employee sites
Customer fulfillment
Manufacturing
Employee Service Centers
IBM Research Centers
IBM Internal Data Centers
 2,000-plus major sites
 170-plus countries
 400,000-plus employees
 About 200,000-plus
contractors
One of the largest and most complex internal IT infrastructures in the world
 800,000-plus traditional endpoints
 About 50 percent of employees
are mobile
48
Suggestions and Solutions
 Ensure that security best practices are followed
 Use Whole-Disk-Encryption to protect data
 Ensure staff understand their responsibilities and the risks of BYOD
 Enforce security controls as well as patching
 Enforce the use of strong passwords/passphrases
 Educate staff about social engineering (phishing, scams, etc.)
 Partner with a vendor that can ensure end to end security of your
infrastructure as a whole, not just BYOD
 Use the IBM 10 point guide (next slide) to assist you
 Remember that security is, and always will be, a journey and not a
destination…..Their is NO silver bullet and no 100% security
49
Manage incidents
with intelligence2
IBM uses a ten essential practice approach to better
manage IT Risk and protect client reputations
Risk-aware culture
and management1
Defend mobile and
social space3
Security-rich
services, by design4
Automatic security
“hygiene”5
Control network
access 6
Address cloud
and complexity 7
Manage third-party
compliance 8
Secure data,
protect privacy 9
Manage the
identity lifecycle 10
Maturity-based
approach
Proactive
Automate
d
Manua
l
Reactive
Learn more about IBM’s Ten Security Essential Practices
ibm.com/smarter/cai/security
50
Expertise: Unmatched global coverage and security awareness
 20,000+ devices under contract
 4,000+ MSS clients worldwide
 13B+ events managed per day
 3,000+ security patents
 133 monitored countries (MSS)
World Wide Managed
Security Services Coverage
Security Operations Centers
Security Research Centers
Security Solution Development Centers
Institute for Advanced Security Branches
IBM Research
51
Conclusions…
 BYOD is a double-edged sword…
– Brings great cost savings and power to organisations
– However, this quote covers the issues well “With great power comes great
responsibility”*
– That responsibility is shared between the device owner and the organisation; both
have to have security in mind at all times…
– Failure to do so will lead to loss of confidential data or intellectual property (or
both)
 BYOD is a real game changer…
– The owner of the device is more likely to treat is with more care if it is their own…
– The cost savings could be immense, just on the hardware side alone
 BYOD is here and it isn’t going away…
– So deal with it, don’t dismiss it as a passing fad…
– Secure all devices, stop unsecured devices from accessing your network until
they are secured and match your security policy and standards…
* Who is this quote attributed to?
© 2013 IBM Corporation
Introduction to the
IBM and Business Partner exhibition
Peter Ellegaard
Country Manager Cloud & Smart Infrastructure Denmark (Tivoli)
May 28th 2013
Lokomotivværkstedet Copenhagen
53
The virtual space division
Main session – Keynote
Exhibition area – Lunch - Refreshments
54
Exhibition area
55
Exhibition area
56
Exhibition area
57
May 28th 2013
Lokomotivværkstedet Copenhagen
58
Smarter Physical Infrastructure
BusinessPartners&IBM
ExhibitionStands
59
Storage Management
BusinessPartners&IBM
ExhibitionStands
60
IT Optimization and Service Management
BusinessPartners&IBM
ExhibitionStands
61
Mobility in the Enterprise
BusinessPartners&IBM
ExhibitionStands
62
Security
BusinessPartners&IBM
ExhibitionStands
63
Planed events – go to registration
Smarter Business 2013 Denmark
• Join the largest IBM event this year
• Mark your calendar Oct 8th - Bella Center Copenhagen
• SW business solutions from IBM and Business Partners
• Keynote: Bruce Dickinson, Lead singer in Iron Maiden
Entrepreneur, Author and inspiring speaker
C&SI (Tivoli) Austin & Silicon Valley Study tour
• Visit IBM Briefing centers in Austin TX & San Jose CA
• IT Managers and IT decision makers
• Mark your calendar Nov 5th - 10th
• Service Management, Storage Management and Mobility - SW solutions
• Pure Systems and Storage - HW Solutions
• Hotel and flight expected to be DKK 15.000
64
User Group meetings at Pulse Comes to You
Check the agenda for tomorrow
Tivoli
User Group meeting
Host: Hans Peder Thomsen
European IBM Security
User Group meeting
Host: Sven-Erik Vestergaard
Maximo & SmartCloud Control Desk
User Group meeting
Host: Jens Cajus Petersen
TSM
User Group meeting
Host: Marianne Husted Larsen
User Groups – May 29th
65
Evaluation
 Special Danish Licorice by Johan Bülow
for filling the evaluation form
 Networking by scanning CR code
Name
Company
Title
Phone number
e-mail
66
The virtual space division
Exhibition area – Lunch - refreshmentsExhibition area – Lunch - Refreshments
1:1 Meetings Dinner tonight
67
Agenda today
68
May 28th 2013
Lokomotivværkstedet Copenhagen

Mais conteúdo relacionado

Mais procurados

Cloud migration
Cloud migrationCloud migration
Cloud migration
Mark Swick
 
Is cloud computing really ready for prime time
Is cloud computing really ready for prime timeIs cloud computing really ready for prime time
Is cloud computing really ready for prime time
Vaishnavi
 
Mr. Hesham Rasmy's presentation at QITCOM 2011
Mr. Hesham Rasmy's presentation at QITCOM 2011Mr. Hesham Rasmy's presentation at QITCOM 2011
Mr. Hesham Rasmy's presentation at QITCOM 2011
QITCOM
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Schneider Electric
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
Steve Markey
 
Ibm services 2011 brochure
Ibm services 2011 brochureIbm services 2011 brochure
Ibm services 2011 brochure
None
 
Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0
Jimmy Chu
 

Mais procurados (18)

Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Is cloud computing really ready for prime time
Is cloud computing really ready for prime timeIs cloud computing really ready for prime time
Is cloud computing really ready for prime time
 
IBM Netcool: Smarter Energy and Utilities 130910
IBM Netcool: Smarter Energy and Utilities 130910IBM Netcool: Smarter Energy and Utilities 130910
IBM Netcool: Smarter Energy and Utilities 130910
 
Mr. Hesham Rasmy's presentation at QITCOM 2011
Mr. Hesham Rasmy's presentation at QITCOM 2011Mr. Hesham Rasmy's presentation at QITCOM 2011
Mr. Hesham Rasmy's presentation at QITCOM 2011
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
eTailing India Workshop - Retail Track- IBM Presentation
eTailing India Workshop - Retail Track- IBM Presentation eTailing India Workshop - Retail Track- IBM Presentation
eTailing India Workshop - Retail Track- IBM Presentation
 
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Introducing Ironstream Support for ServiceNow Event Management
Introducing Ironstream Support for ServiceNow Event Management Introducing Ironstream Support for ServiceNow Event Management
Introducing Ironstream Support for ServiceNow Event Management
 
ERP Implementation Services UK
ERP Implementation Services UKERP Implementation Services UK
ERP Implementation Services UK
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
 
Ibm services 2011 brochure
Ibm services 2011 brochureIbm services 2011 brochure
Ibm services 2011 brochure
 
Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0
 
Jazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusJazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbus
 
Cloud computing essentials
Cloud computing essentialsCloud computing essentials
Cloud computing essentials
 
Presentation cloud computing
Presentation   cloud computingPresentation   cloud computing
Presentation cloud computing
 

Destaque (6)

Hur Johnson Controls använder Maximo - PCTY2011
Hur Johnson Controls använder Maximo - PCTY2011Hur Johnson Controls använder Maximo - PCTY2011
Hur Johnson Controls använder Maximo - PCTY2011
 
IBM Monitoring and Event Management Solutions
IBM Monitoring and Event Management SolutionsIBM Monitoring and Event Management Solutions
IBM Monitoring and Event Management Solutions
 
Jazz for Service Management
Jazz for Service ManagementJazz for Service Management
Jazz for Service Management
 
SmartCloud Monitoring and Capacity Planning
SmartCloud Monitoring and Capacity PlanningSmartCloud Monitoring and Capacity Planning
SmartCloud Monitoring and Capacity Planning
 
IBM Service Management Suite V1.3.0 Update Guide
IBM Service Management Suite V1.3.0 Update GuideIBM Service Management Suite V1.3.0 Update Guide
IBM Service Management Suite V1.3.0 Update Guide
 
IBM Netcool Operations Insight
IBM Netcool Operations InsightIBM Netcool Operations Insight
IBM Netcool Operations Insight
 

Semelhante a Pulse Comes To You Intro

Fernando sousa
Fernando sousaFernando sousa
Fernando sousa
EuroCloud
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
LA_IBM_Cloud_Event
 
Presentation-Watson_IoT_Platform-Long-08Feb2016
Presentation-Watson_IoT_Platform-Long-08Feb2016Presentation-Watson_IoT_Platform-Long-08Feb2016
Presentation-Watson_IoT_Platform-Long-08Feb2016
Nikhil Dikshit
 
F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiity
EuroCloud
 

Semelhante a Pulse Comes To You Intro (20)

Cloud
CloudCloud
Cloud
 
Fernando sousa
Fernando sousaFernando sousa
Fernando sousa
 
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
Enabling a Smarter Infrastructure for your Cloud Environment - IBM Smarter Bu...
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
Softlayer an IBM Compay . Connaissez vous le cloud de l'avenir
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Bienvenida
BienvenidaBienvenida
Bienvenida
 
Cloud Híbrida de Telefónica
Cloud Híbrida de TelefónicaCloud Híbrida de Telefónica
Cloud Híbrida de Telefónica
 
Cloudy with SaaS-Shine 18march2015
Cloudy with SaaS-Shine 18march2015Cloudy with SaaS-Shine 18march2015
Cloudy with SaaS-Shine 18march2015
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesThe Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
 
Telstra Cloud
Telstra CloudTelstra Cloud
Telstra Cloud
 
Presentation-Watson_IoT_Platform-Long-08Feb2016
Presentation-Watson_IoT_Platform-Long-08Feb2016Presentation-Watson_IoT_Platform-Long-08Feb2016
Presentation-Watson_IoT_Platform-Long-08Feb2016
 
Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud
Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud
Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud
 
F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiity
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSC
 

Mais de IBM Danmark

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
IBM Danmark
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
IBM Danmark
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
IBM Danmark
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
IBM Danmark
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
IBM Danmark
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
IBM Danmark
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
IBM Danmark
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
IBM Danmark
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
IBM Danmark
 

Mais de IBM Danmark (20)

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBM
 
Mellanox IBM
Mellanox IBMMellanox IBM
Mellanox IBM
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminar
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian Nielsen
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren Ravn
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim Mortensen
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik Rex
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim Escherich
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-Jensen
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Pulse Comes To You Intro

  • 1. © 2013 IBM Corporation Welcome and introduction to the conference Peter Ellegaard Country Manager Cloud & Smart Infrastructure Denmark (Tivoli) May 28th 2013 Lokomotivværkstedet Copenhagen
  • 2. 1 The Venue Lokomotivværkstedet  +100 years old listed building  Danish railway history  Lokomotiv maintenance  9.000 m2 One of few possible places  Nordic event  More than 500 attendees  5 tracks  Exhibition hall  Dinner / Lasse Rimmer  1:1 meetings  4 User Group meetings New experience  Virtual space division  Headphones needed  Leave headphones on chair
  • 3. 2 Cloud & Smarter Infrastructure (Tivoli) Tivoli®
  • 4. 3 Visibility Control Automation to see and understand your business in real time to transform and adapt while limiting risk & cost to achieve greater efficiency and agility Turning Opportunities Into Outcomes Business IT
  • 5. 4 What Is Driving new Opportunities and IT Demand Explosion of Mobile Devices Infrastructure Optimization Cloud Computing Growth of Social Media Advanced Predictive Analytics Real-time Sensor Data Cyber Security Business Optimization + Big Data
  • 6. 5 The 5 main tracks
  • 8. © 2013 IBM Corporation © 2013 IBM Corporation Turning Opportunities into Outcomes Moe Abdula, Vice President, IBM SmartCloud Foundation Portfolio Strategy
  • 9. 8 Internet of information Internet of engagement Internet of “things” 200 BILLION 100 BILLION 50 BILLION INTERMITTENTLY CONNECTED DEVICES AND PEOPLE 2000 20202010 The convergence of technology is transforming the world into an Internet of things…
  • 10. 9 Fuels investments in innovation Drives need for continuous optimization Optimization Innovation The ability to balance Optimization and Innovation will be critical to success… 9
  • 11. 10 41%experience development delays 34%experience deployment delays 45%experience production delays Source : A commissioned study conducted by Forrester Consulting on behalf of IBM, 4Q2011 However, organizations are challenged in Optimizing product & service delivery, and in turn, driving Innovation…. 10 Business OperationsDevelopmentCustomers
  • 12. 11 An open, and holistic approach to managing the delivery of products & services across smarter infrastructures is needed… 11
  • 13. 12 IBM provides an open, and holistic approach to managing the delivery of products & services across smarter infrastructures…
  • 14. 13 Cloud Computing: A Next Generation Cloud Architecture Built upon a Cloud standards architecture Patterns of Expertise Workload Optimization Dynamically Orchestrated Services
  • 15. 14 Cloud Orchestration Services • Storage • Network Cloud Service Management Images • Patches • Threats Cloud Service Delivery Visibility • Control • Automation Open Service Lifecycle Collaboration Intelligent Cloud Workloads Virtualization Computing Resources Cloud Computing: Extending value & optimizing investments…
  • 16. 15 An integrated set of capabilities for enabling private/hybrid clouds and the virtualization, automation and management of service delivery Cloud Computing: IBM SmartCloud Foundation Virtualized Standardized Automated Infrastructure as a Service Capabilities Infrastructure UsagePerformanceManagement Security Platform as a Service Capabilities Lifecycle Resources Environments Management Integration  Resilient to the velocity of changing business needs  Enables choice & flexibility in hybrid environments  Provides enterprise-class, workload-aware services  Built-in analytics for improved insight and decision making 15
  • 17. 16 Cloud Computing: Flexibility in consuming & integrating hybrid clouds… Evolve existing infrastructure to Cloud Accelerate adoption with expert integrated systems Immediate access to a managed platform Enterprise Hosted private cloud 16
  • 18. 17 Cloud Computing: Client Case Studies Technical University of Munich Cloud Platform, Orchestration & Monitoring • Reduced manual workload by about 40% and provisioning time for SAP systems from 3 days to less than ½ day. • Replaced 150 servers with just four IBM systems, cutting 13 full racks to only four half-full racks. • Reduced energy consumption by 80% for the SAP application landscape. Data storage reduction by 40%. Aetna Cloud DevOps and Orchestration • DevOps enables better, faster product development via self-service automation • Anytime, anywhere access to healthcare services for clients using mobile & cloud • Removed siloes by creating single role of cloud engineer that spans domains. 17
  • 19. 18 IBM provides an open, and holistic approach to managing the delivery of products & service across smarter infrastructures….
  • 20. 19 Enterprise Mobility: Why take an integrated approach? Speed time to deployment of enterprise mobile apps and updates, while improving quality Improve WiFi network management for greater reliability, employee productivity, and minimize business interruptions Enhance end-to-end security to help prevent loss of intellectual property and regulated data Less total infrastructure for lower hardware, admin costs Reduce help desk calls, device replacement costs 19
  • 21. 20 Enterprise Mobility: Manage and secure all your devices Endpoint Management Systems Management Security Management Common agent Unified console Single management server Managed = Secure Desktops, Laptops, & Servers Smartphones & Tablets Purpose-specific Endpoints Implement BYOD with confidence Secure sensitive data, regardless of device Handle multi-platform complexities with ease 20
  • 22. 21 Enterprise Mobility: The Industry’s Most Comprehensive Mobile Portfolio The Broadest Portfolio of Mobile Solutions The Deepest Set of Services Expertise New Industry Partnerships and Resources for Developers 21
  • 23. 22 22 Enterprise Mobility: Client Case Studies CenterBeam Unified Mobile, Desktop, and Server Management • Can now support PCs, Macs, servers, and virtually every flavor of mobile device, increasing compliance over 20% to 98% • Now manage 20,000 endpoints across 49 countries and six continents, a 10x increase, with just one engineer • Mitigating client risk with strengthened endpoint security North American Public Utility Mobile device and Endpoint Management • Support 20,000 mobile devices - corporate and employee owned - with mixed platform and OS versions • Add mobile devices in just days, while adhering to internal security policies and external regulations. • Solution is scalable to 250,000 endpoints without adding infrastructure
  • 24. 23 IBM provides an open, and holistic approach to managing the delivery of products & service across smarter infrastructures….
  • 25. 24 Smarter Physical Infrastructure: Instrumented, Interconnected, Intelligent A comprehensive set of integrated enterprise capabilities that help organizations to keep plants, facilities, data centers, or cities operating effectively. • Dashboard views of service health • Predictive analytics & reporting • Mobile workforce support • Asset, work and inventory management • Complex & embedded systems • IT & Enterprise assets • Facilities & real estate • Event filtering and correlation • Process & workflow automation, and rules management • Enterprise content management Process Automation Facilities and Real Estate Enterprise Assets Complex and Embedded Systems Analytics Mobility 24
  • 26. 25 25 Facilities & Real Estate Transportation & Fleet Linear Assets Plant & Production IT & Network Equipment Smarter Physical Infrastructure: End-to-end asset management 25
  • 27. 26 26 Smarter Physical Infrastructure: Client Case Studies Halifax International Airport Authority Preventative Asset Monitoring, Management & Reporting • Corrective maintenance on assets reduced from 80 percent to only 10 percent • Number of work orders the service department can handle increased from 450 to 1,000, a 55 percent increase • Airport is better prepared for weather events and track costs more effectively; Improved regulatory reporting. Akita City Predictive Facilities & Energy Management • Real-time sensors, & 3D color-coded views allow city to predict energy use, and immediately reduce consumption to meet targets. • Expected 6 percent reduction in energy consumption through better visibility and control over city facilities’ energy usage • Improve preventive maintenance, and compliance with Revised Energy Saving Law. INSERT LOGO
  • 28. 27 IBM provides an open, and holistic approach to managing the delivery of products & service across smarter infrastructures….
  • 29. 28 Security Intelligence, Analytics and GRC Applications People Data Infrastructure Mobile Security Cloud Security Security Intelligence with Big Data Security Intelligence: Across big data, mobile & cloud
  • 30. 32 Security Intelligence: Client Case Studies BlueCross BlueShield of North Carolina Securing Big Data • Directly supports HIPAA compliance by controlling access to client member data • Saves 5,000 hours of staff time by removing manual steps and automating security processes Flemish Government Securing Digital services • Authentication flexibility ensures compatibility with future access requirements including cloud and mobile services • Significantly reduces the time and cost to introduce new applications across100 government sites • Provides six million citizens with seamless access to all Authorities’ services with context-aware digital identities INSERT LOGO 32
  • 31. 33 AUTOMATIONVISIBILITY CONTROL Reporting Registry Security Dashboarding Administration Open Interoperability Services Only IBM provides a holistic approach that enables Visibility, Control & Automation across smarter infrastructures… unnecessary risk and cost outcomes from limited investments with agility to changing landscapes ReduceAchieveReact 33
  • 32. © 2013 IBM Corporation Bring Your Own Disaster - The Security Risk and Challenges of BYOD (From a hacker’s perspective) Martin Overton, Ethical Hacker, IBM Security Services Lead and Senior Security Consultant, Cyber Security Intelligence and Response Team May 28th 2013 Lokomotivværkstedet Copenhagen
  • 33. 35 Agenda What is BYOD? Growth Threatscape Issues and Problems Solutions Conslusions
  • 34. 36 What is BYOD an Why Should You Care? “BYOD is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and PDAs – to the workplace for use and connectivity on the corporate network.” - Source: http://www.webopedia.com/TERM/B/BYOD.html Source: Intel (1. Gartner, 2. ReadWrite.com Survey)
  • 35. 37 2,641,350 The Average Company Faces Per Week Security Attacks 1. Health & Social Services 2. Transportation 3. Hospitality 4. Finance & Insurance 5. Manufacturing 6. Real Estate 7. Mining, Oil & Gas Top 7 Most ATTACKED Industries 62Security Incidents The Average Company Experiences Per Week 1. End user didn’t think before clicking 2. Weak password / default password in use 3. Insecure configuration 4. Use of legacy hardware or software 5. Lack of basic network security protection or segmentation Top 5 reasons WHY attacks were possible Did you know... Malicious Code Sustained Probe or Scan Unauthorized Access Low-and-Slow Attack Access/Credentials Abuse Denial of Service What IBM Sees Categories of Attack
  • 36. 38 Number of vulnerabilities increase radically with emergence of new business models and technologies. Mobility Employees, customers, contractors, outsourcers Bring your own IT Social business Cloud and virtualization 1 trillion connected objects (cars, appliances, cameras) 30 billion RFID1 tags (products, passports, buildings and animals) 1 billion workers will be remote or mobile 1 billion mobile Internet users 30 percent growth of 3G devices33 percent of all new business software spending will be Software as a Service Source: IBM X-Force® Trend Report, 2011 Exponentially growing and interconnected digital universe Adopting new business models and embracing new technologies
  • 37. 39 To stay ahead focus on disrupting the attackers capability, timeline and impact Security Risk Management is the application of control to detect and block the threat, to detect and fix a vulnerability, or to respond to incidents (impacts) when all else fails. Threat Can exploit Vulnerability Impact (Weakness)(Actor) (Loss) And cause Security risk exists when … “The more the environment changes, the more the opportunities exist for risk.”
  • 38. 40 In IBM’s recent 2012 Chief Information Security Officer Study, security leaders shared their views on how the landscape is changing. Source: IBM 2012 CISO Assessment http://www.ibm.com/smarterplanet/us/en/business_resilience_management/article/security_essentials.html Nearly two-thirds say senior executives are paying more attention to security issues. Two-thirds expect to spend more on security over the next two years. External threats are rated as a bigger challenge than internal threats, new technology or compliance. More than one-half say mobile security is their greatest near- term technology concern.
  • 39. 41 Motivation and Sophistication is Evolving Rapidly  Attackers have more resources  Off-the-shelf tools are available for sale  They will keep trying until they get in
  • 40. 42 The new security landscape - Sophisticated attackers are a primary concern Threat Profile Type Share of Incidents Attack Type Advanced threat / mercenary National governments Terrorist cells Crime Cartels 23%  Espionage  Intellectual property theft  Systems disruption  Financial Crime Malicious Insiders Employees Contractors Outsourcers 15%  Financial Crime  Intellectual Property Theft  Unauthorized Access/ Hacktivist Social Activists 7%  Systems disruption  Web defacement  Information Disclosure Opportunist Worm and virus writers “Script Kiddies” 49%  Malware propagation  Unauthorized Access  Web defacement PotentialImpact Source: Government Accountability Office, Department of Homeland Security's Role in Critical Infrastructure Protection Cybersecurity, GAO-05-434; IBM CyberSecurity Intelligence & Response Team, Sep 2012
  • 41. 43 Threat Convergence Replacing Threat Evolution  Threat Evolution: – A flat world has brought about an unprecedented amount of criminals and cons – Attackers keep ROI in mind as well, and constantly evolve their wares in order to re- purpose it for the next flood of attacks – High profile vulnerabilities will still be the vehicles for new attacks, however, the low and slow attack vectors cannot be ignored – The economics of exploitation must be taken into consideration to better prioritize risk
  • 42. 44  Adversary compromises endpoint used by a systems administrator with undetectable malware. – The malware has two components: 1) A keystroke logger to capture credentials 2) Command and control capability Here is the anatomy of a targeted attack.  With credentials and command and control malware, adversary impersonates the Sys Admin to gain privileged access to systems and data.  Data is stolen, and production systems are further compromised. 1Advanced persistent threat (APT) People Endpoints Applications Infrastructure Data Privileged user Employees Contractors Consultants Suppliers Customers Web applications Mobile apps Unstructured At rest In motionStructured Customer environment System applications APT1 and hacker, or activist
  • 44. 46 BYOD Problems  Organisation Level Issues: – Un-trusted devices on your network. – No idea if the device has been hacked or infected. – Who owns the data? The device owner or you? – How can you stop an (ex-)employee leaving with your intellectual property or customer data? – What happens when a security breach occurs? – Are you going to insist on Whole Disk Encryption? – Patches, security software, so many different vendors, Operating Systems and versions to contend with…  Personal Issues (Device Owner): – Your device may get seized (confiscated) as part of an investigation. – Privacy issues; your personal data on your personal device may be reviewed. – What happens when the device fails or gets stolen? Who’s responsible for fixing or replacing it?
  • 45. 47 IBM is well qualified to secure the enterprise. Major employee sites Customer fulfillment Manufacturing Employee Service Centers IBM Research Centers IBM Internal Data Centers  2,000-plus major sites  170-plus countries  400,000-plus employees  About 200,000-plus contractors One of the largest and most complex internal IT infrastructures in the world  800,000-plus traditional endpoints  About 50 percent of employees are mobile
  • 46. 48 Suggestions and Solutions  Ensure that security best practices are followed  Use Whole-Disk-Encryption to protect data  Ensure staff understand their responsibilities and the risks of BYOD  Enforce security controls as well as patching  Enforce the use of strong passwords/passphrases  Educate staff about social engineering (phishing, scams, etc.)  Partner with a vendor that can ensure end to end security of your infrastructure as a whole, not just BYOD  Use the IBM 10 point guide (next slide) to assist you  Remember that security is, and always will be, a journey and not a destination…..Their is NO silver bullet and no 100% security
  • 47. 49 Manage incidents with intelligence2 IBM uses a ten essential practice approach to better manage IT Risk and protect client reputations Risk-aware culture and management1 Defend mobile and social space3 Security-rich services, by design4 Automatic security “hygiene”5 Control network access 6 Address cloud and complexity 7 Manage third-party compliance 8 Secure data, protect privacy 9 Manage the identity lifecycle 10 Maturity-based approach Proactive Automate d Manua l Reactive Learn more about IBM’s Ten Security Essential Practices ibm.com/smarter/cai/security
  • 48. 50 Expertise: Unmatched global coverage and security awareness  20,000+ devices under contract  4,000+ MSS clients worldwide  13B+ events managed per day  3,000+ security patents  133 monitored countries (MSS) World Wide Managed Security Services Coverage Security Operations Centers Security Research Centers Security Solution Development Centers Institute for Advanced Security Branches IBM Research
  • 49. 51 Conclusions…  BYOD is a double-edged sword… – Brings great cost savings and power to organisations – However, this quote covers the issues well “With great power comes great responsibility”* – That responsibility is shared between the device owner and the organisation; both have to have security in mind at all times… – Failure to do so will lead to loss of confidential data or intellectual property (or both)  BYOD is a real game changer… – The owner of the device is more likely to treat is with more care if it is their own… – The cost savings could be immense, just on the hardware side alone  BYOD is here and it isn’t going away… – So deal with it, don’t dismiss it as a passing fad… – Secure all devices, stop unsecured devices from accessing your network until they are secured and match your security policy and standards… * Who is this quote attributed to?
  • 50. © 2013 IBM Corporation Introduction to the IBM and Business Partner exhibition Peter Ellegaard Country Manager Cloud & Smart Infrastructure Denmark (Tivoli) May 28th 2013 Lokomotivværkstedet Copenhagen
  • 51. 53 The virtual space division Main session – Keynote Exhibition area – Lunch - Refreshments
  • 58. 60 IT Optimization and Service Management BusinessPartners&IBM ExhibitionStands
  • 59. 61 Mobility in the Enterprise BusinessPartners&IBM ExhibitionStands
  • 61. 63 Planed events – go to registration Smarter Business 2013 Denmark • Join the largest IBM event this year • Mark your calendar Oct 8th - Bella Center Copenhagen • SW business solutions from IBM and Business Partners • Keynote: Bruce Dickinson, Lead singer in Iron Maiden Entrepreneur, Author and inspiring speaker C&SI (Tivoli) Austin & Silicon Valley Study tour • Visit IBM Briefing centers in Austin TX & San Jose CA • IT Managers and IT decision makers • Mark your calendar Nov 5th - 10th • Service Management, Storage Management and Mobility - SW solutions • Pure Systems and Storage - HW Solutions • Hotel and flight expected to be DKK 15.000
  • 62. 64 User Group meetings at Pulse Comes to You Check the agenda for tomorrow Tivoli User Group meeting Host: Hans Peder Thomsen European IBM Security User Group meeting Host: Sven-Erik Vestergaard Maximo & SmartCloud Control Desk User Group meeting Host: Jens Cajus Petersen TSM User Group meeting Host: Marianne Husted Larsen User Groups – May 29th
  • 63. 65 Evaluation  Special Danish Licorice by Johan Bülow for filling the evaluation form  Networking by scanning CR code Name Company Title Phone number e-mail
  • 64. 66 The virtual space division Exhibition area – Lunch - refreshmentsExhibition area – Lunch - Refreshments 1:1 Meetings Dinner tonight

Notas do Editor

  1. There is a phenomenon taking place in the world…a convergence of technologies is driving what people commonly refer to as the “Internet of things”.It all began with the internet of information…where information was made available any time, anywhere, to anyone with a PC and an internet connection. With the growth of mobile access and social networks over the past decade, the volume of intermittently connected devices and people grew from 50 billion to 100 billion. But increasingly, as physical assets are shipped with embedded chips, sensors, RFID and other instrumentation and wireless connections, once physical assets across manufacturing, retail, healthcare, cities and virtually all industries are becoming intelligent and interconnected, to the point where these new physical assets and devices will represent the vast majority of “things” connected to the internet. It is this “internet of things” that will drive new types of interactions and business models.
  2. The real world benefits of Visibility, Control and Automation we just saw are provided through an open and holistic approach to managing the delivery of products and service across smarter infrastructures. Unlike tradition approaches which lock clients into single vendor solutions and environments, IBM’s approach is open and interoperable, so that you can leverage a mix of multi-vendor technologies. Further, IBM’s approach is holistic, which means organizations can manage and secure entire, interconnected, service delivery infrastructures, spanning cloud, mobile, smarter physical infrastructures. And IBM’s solutions help clients leverage the explosion of big data through the application of analytics within and across those domains, and services.
  3. Let’s take a look at how IBM is helping clients address the complexities of today’s cloud infrastructures and capitalize on the time to market, cost benefits and flexibility it provides.
  4. Let’s talks about our efforts in extending this value while optimizing investments. We at IBM are continuing to build on these capabilities by enabling clients to bridge between traditional infrastructure and new workloads and applications.More and more companies will need to establish greater levels of simplification and standardization in their infrastructures ….….AND IBM is committed to enabling an open ecosystem that provides flexibility and choice.Our commitment to openness and interoperability gives our clients the foundation they need to manage convergence, optimize new workloads and bridge to these types of systems. And in doing so, we introduce standardization and interoperability that yields enormous productivity savings on an ongoing basis.
  5. Lets take a look at how IBM is addressing enterprise mobility.
  6. Bullet 1 Proof PointsCast Iron enables organizations to hook mobile apps to existing enterprise and even public cloud-based systems in just weeks. Integration between IBM Endpoint Manager and Worklight by the end of the year (2012) will ensure a smooth, automated transition of apps from the dev environment to production for faster deployment and greater confidence that the correct build is delivered. Additional integration work will provide performance data from devices back to app dev teams for troubleshooting and performance enhancements. Bullet 2 Proof PointsImproved management and security of devices, as well as employee self-service portal reduces overall calls to the help desk for locating and wiping lost devices or enrolling new devices. In addition, location mapping services will enable organizations to recover some devices that would have otherwise been lost. As an example, IBM reduced security-related help desk calls by nearly 80% by significantly improving patch management practices on desktops and laptops with IBM Endpoint Manager, saving $10M annually. While mobile devices may be a much lower call volume now, they will only continue to increase their share of the help desk team’s workload. Bullet 3 Proof PointsWith IBM Endpoint Manager, a single infrastructure requiring just one dedicated management server per 250,000 endpoints can be used to manage and secure smartphones, tablets, laptops, desktops, servers, ATMs, and kiosks. This solution is also designed to easily provide endpoint data, including detailed hardware and software inventory information on mobile devices, to service desk, asset management, CMDB, network management, and security event management systems.Bullet 4 Proof PointsAn integrated security approach ensures that not just the device is configured securely, but that security-rich apps are tested and delivered, sensitive data is protected while on that device, secure and authenticated connections are made to enterprise systems from mobile devices, and that security-related event information is correlated with security information from all other aspects of the IT environment. Bullet 5 Proof PointsData about access points, signal strength, device location, and other network access relevant properties can be fed from IBM Endpoint Manager to the Netcool / OMNIbus suite for alerting, troubleshooting, and outage prediction analysis. In many organizations, WiFi availability with sufficient signal strength for reasonable data transfer rates are used in mission-critical activities – knowing exactly which router is having problems before it fails and before employees flood IT with complaints, is vital.
  7. IBM has announced the industry’s most comprehensive mobile portfolio, consisting of the broadest portfolio of mobile solutions, the deepest set of services expertise, and new industry partnerships and resources for developers. Introducing IBM MobileFirst.IBM MobileFirst, is the most comprehensive mobile solution portfolio in the industry. Based on nearly 1,000 customer engagements, 10 mobile-related acquisitions in the last four years, a team of thousands of mobile experts and 270 patents in wireless innovations, IBM MobileFirst offers an array of solutions that helps businesses connect, secure, manage and develop mobile networks, infrastructures and applications. By bringing our mobile portfolio under this new name, we're signaling IBM's unified approach to help our clients and partners to deliver best-in-class solutions, take advantage of more commercial opportunities, and provide superior customer service. We are delivering significant capabilities across a number of areas:Mobile First Platform helps our customers to develop applications across mobile device platforms without lock-in. IBM Worklight helps companies deliver Mobile applications quickly, with high quality across a wide variety of devices. Mobile First Management is focused on helping customers that want to bring BYOD into their business and deal with all the challenges that come with an un-trusted mobile environment. We want to give them the tools they need to ensure that their data is protected, devices are managed and the enterprise feels confident that they are within compliance and supporting their users in a consistent manner. Mobile First security speaks to two classes of challenges our customers are experiencing. First customers have a need for contextual security. They want be able to understand mobile context (such as GEO location) and then apply that information in the ways to regulated and manage access to corporate networks, data, etc. Second we are also seeing an increasing set of threats emerging we support vulnerability analysis both on your code base as well as looking at run time behaviors to ensure it is complaint with your corporation requirements. Mobile First Analytics speaks to the tremendous opportunity to understand end user behavior in order to improve the quality of the mobile app. The key to delivering both high quality apps quickly is to gain visibly into the end user experience and then trace that all the way to back end systems and processes. Then when there is a usability issue, you can quickly resolve.
  8. Let’s take a look at how IBM is helping clients address smarter physical infrastructures.
  9. Lets see how IBM is helping clients with security intelligence.
  10. 1) IBM delivers unmatched breadth and depth of security capabilities through a security architecture that covers People, Data, Applications and Infrastructure, enriched with analytics integrated across these domains.2) We have innovated in 3 key areas:In the area of Security Intelligence with Big Data – we have added capabilities to analyze greater varieties of data – including emails, social media feeds and business process data – to answer questions you could never ask before.  Helps you find malicious activity hidden deep in your network and protect your organization against advanced threats, fraud, and insider threatsWe have also evolved our capabilities in Cloud Security - managing risks and providing visibility to where your data is and who can access it; to help protect your data through capabilities in the areas of identity protection, application protection and threat protection.We just explored Mobile, and our capabilities in mobile are centered around protecting devices and the data that reside on them requires a strategy around mobile device management, secure access to enterprise data and applications, secure mobile solutions/applications, and risk management from intelligence gathering providing visibility across all mobile touchpoints.
  11. Our clients repeatedly tell us that Security is the number one concern when moving to the cloud, or embracing mobile.  We just talked about physical infrastructure becoming smarter.  It also needs to become more secure, since cyber attacks against physical infrastructure and other sectors has increased dramatically.While the sophistication of threats has grown, the technology to help protect organizations has also matured. From a “basic” level targeted at compliance. To an “advanced” level where we connect the dots across the enterprise. To an “optimized” level where we perform the richest analytics on the broadest set of security data.Now big data has been a key theme so far.  What’s notable is that big data can not only help us increase our visibility, control, and automation. It can also help us get smarter about the security threats already lurking in our networks. Forward-leaning organizations are looking to bring structured security data together with new types of structured and unstructured enterprise data – such as email, business process data, and even social media feeds. IBM is helping clients achieve this – by integrating security intelligence with big data analytics.So today, Security Intelligence goes well beyond point solutions and reactive reporting. It helps you gain full visibility across your environment. So you can see the threats that matter, and understand your risks in context. It’s about becoming proactive with security – anticipating threats and stopping attacks fast.  That’s why we added Q1 Labs to our Security portfolio, and why we’re integrating QRadar with our entire portfolio and beyond.
  12. Control Mobile Access through a holistic approach to mobile management that secures Devices, Networks, and Applications:- Device Management: Security for endpoint device and data- Network, Data, and Access Security: Achieve visibility and adaptive security policies- Application Layer Security: Develop and test applications
  13. BlueCross BlueShieldhttp://www-01.ibm.com/software/success/cssdb.nsf/CS/LWIS-8PRKXL?OpenDocument&Site=default&cty=en_usFlemish Governmenthttp://www-01.ibm.com/software/success/cssdb.nsf/CS/RNAE-92RM96?OpenDocument&Site=default&cty=en_us