SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Company Presentation
Introduction by Jan, CEO
i



Information Integration
What does it mean
  in today’s world?
Globalisation        Security Threats

       Environment             Credit Crunch




                                  Recession
What does it mean
to you as a CEO, COO or CTO?
Cost control
Freedom                        Availability

                Productivity
                                 Sustainability
 Future
Information Integration
 BA’s infrastructure for:

  Mobility                  Security
  Data Access               Data Protection
  and Portability           and Integrity



  Virtualisation            Digitisation
  Data Infrastructure       Digital Preservation
  Solutions & Scalability   and Archiving
Products
Information Integration and
Mobility
Freedom
Mobility Solutions
 What BA does for you?
  Mobile Workforce Solutions
  Company mobile communications solutions based on
  open source messaging and collaboration software
Mobility Solutions
 What BA does for you?
  Mobile Workforce Solutions
  Company mobile communications solutions based on
  open source messaging and collaboration software


  Business Mobile Strategies
  Discovery, proof of concept, readiness assessment,
  end-to-end implementation of mobile services
Mobility Solutions
 What BA does for you?
  Mobile Workforce Solutions
  Company mobile communications solutions based on
  open source messaging and collaboration software


  Business Mobile Strategies
  Discovery, proof of concept, readiness assessment,
  end-to-end implementation of mobile services



  Open BlackBerry Integration
  BA is Research in Motions’ (RIM) exclusive partner for
  wireless enterprise information integration projects
Information Integration and
Security
No Threats
Security Solutions
 What BA does for you?
  Managed Security Services
  Security consulting: audits, policies & forensics. Network
  security: managed firewall and VPN. Messaging security.
Security Solutions
 What BA does for you?
  Managed Security Services
  Security consulting: audits, policies & forensics. Network
  security: managed firewall and VPN. Messaging security.


  Disaster Recovery
  DR consulting and IT contingency planning, business
  information availability backed by service level agreements
Security Solutions
 What BA does for you?
  Managed Security Services
  Security consulting: audits, policies & forensics. Network
  security: managed firewall and VPN. Messaging security.


  Disaster Recovery
  DR consulting and IT contingency planning, business
  information availability backed by service level agreements



  Data Protection
  Data replication and intrusion detection solutions,
  data theft prevention, consulting and recommendations
Security Solutions
 What BA does for you?
  Managed Security Services
  = Information Confidentiality

  Disaster Recovery
  = Information Availability

  Data Protection
  = Information Integrity
Information Integration and
Virtualisation
Cloud Infrastructure
Why Virtualisation
 Infrastructure Services
  Dynamic scalability
  Fully optimized, 24/7 available, 100% integrated business
  information infrastructure for all your IT requirements
Why Virtualisation
 Infrastructure Services
  Dynamic scalability
  Fully optimized, 24/7 available, 100% integrated business
  information infrastructure for all your IT requirements


  Pay as you go
  OpEx driven pricing model designed to suit your rolling
  IT budget and future technology requirements
Why Virtualisation
 Infrastructure Services
  Dynamic scalability
   Fully optimized, 24/7 available, 100% integrated business
   information infrastructure for all your IT requirements


  Pay as you go
  OpEx driven pricing model designed to suit your rolling
  IT budget and future technology requirements



  Environment
  Low electricity consumption, fewer servers, better
  performance, cost friendly hosting environment
Information Integration and
Digital Preservation
Looking into
The Future
Digital Preservation
 What BA does for you?
  Protecting Digital Assets
  BA offers national digital information infrastructure
  based on government standards and guidelines
Digital Preservation
 What BA does for you?
  Protecting Digital Assets
  BA offers national digital information infrastructure
  based on government standards and guidelines


  Digital Preservation Planning
  BA helps with convergence planning and preservation
  modeling to ensure long-term existence of information
Digital Preservation
 What BA does for you?
  Protecting Digital Assets
  BA offers national digital information infrastructure
  based on government standards and guidelines


  Digital Preservation Planning
  BA helps with convergence planning and preservation
  modeling to ensure long-term existence of information



  Digitisation & Managed Archiving
  Capture, preserve and distribute digital research material.
  BA has the know how, tools, technology and processes
ABout BA
Our Commitment
 Ask our clients
  Government
  Politiezone Leuven



  SMB Market
  Duval Guillaume




 Enterprise
  Sodexho
Why BA?
 C3 Principle
  Creative
  Implementation of creative and cost effective
  open source solutions for more than 12 years

 Committed
  Access to local know how from a motivated team
  contributing to solving customer problems


 Custom
  Long standing reputation as security innovator
  and bespoke managed solutions provider
Thank You
Contact us


  www.ba.be

  info@ba.be


  016/29.80.45

  016/29.80.46

  Dalemhof 28
  B-3000 Leuven
Partnerships
 BA leads the way
  Technology partnerships
  Engaged with world-class open technology companies:
  Research in Motion, Sun Microsystems, Oracle, Red Hat


  Project partnerships
  BA primes every projects on behalf of its customers by
  sourcing for the most open and proven technology



  Customer partnerships
  BA as prime contractor acts as extended IT partner
  offering 24/7 support and service level agreements

Mais conteúdo relacionado

Mais procurados

Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1Tarek Mekkawy
 
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powellCapgemini
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...Andris Soroka
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insightsVU
 
Intelisys Win Case Study
Intelisys Win Case StudyIntelisys Win Case Study
Intelisys Win Case StudyQOS Networks
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CityPeter Waher
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of ThingsGiulio Coraggio
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center FabricShashi Kiran
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementBjorn Hjelm
 
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44Jisc
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 

Mais procurados (20)

Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
 
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
Gss Company Profile
Gss Company ProfileGss Company Profile
Gss Company Profile
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insights
 
Intelisys Win Case Study
Intelisys Win Case StudyIntelisys Win Case Study
Intelisys Win Case Study
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center Fabric
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 

Destaque

fe.ed a social media company for further education
fe.ed a social media company for further educationfe.ed a social media company for further education
fe.ed a social media company for further educationSteven Rick
 
Hogyan töltsd hasznosan az egyetemi éveidet?
Hogyan töltsd hasznosan az egyetemi éveidet?Hogyan töltsd hasznosan az egyetemi éveidet?
Hogyan töltsd hasznosan az egyetemi éveidet?David Gonda
 
Norma Walton, Space sharing
Norma Walton, Space sharingNorma Walton, Space sharing
Norma Walton, Space sharingNorma Walton
 
TechSaints International Pvt. Ltd. - Technology Company Presentation.
TechSaints International Pvt. Ltd. - Technology Company Presentation.TechSaints International Pvt. Ltd. - Technology Company Presentation.
TechSaints International Pvt. Ltd. - Technology Company Presentation.Rohit Gupta
 
Business Proposal PPT
Business Proposal PPTBusiness Proposal PPT
Business Proposal PPTjolorainenaeg
 
LLG corporate presentation february 2017
LLG   corporate presentation february 2017LLG   corporate presentation february 2017
LLG corporate presentation february 2017masongraphite
 
PPT From client end
PPT From client endPPT From client end
PPT From client endNeha Sharma
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationAnusorn Kansap
 
Human Resource planning
Human Resource planningHuman Resource planning
Human Resource planningAnything Group
 

Destaque (12)

fe.ed a social media company for further education
fe.ed a social media company for further educationfe.ed a social media company for further education
fe.ed a social media company for further education
 
Hogyan töltsd hasznosan az egyetemi éveidet?
Hogyan töltsd hasznosan az egyetemi éveidet?Hogyan töltsd hasznosan az egyetemi éveidet?
Hogyan töltsd hasznosan az egyetemi éveidet?
 
Bibzbrain Corporate Deck
Bibzbrain Corporate DeckBibzbrain Corporate Deck
Bibzbrain Corporate Deck
 
Norma Walton, Space sharing
Norma Walton, Space sharingNorma Walton, Space sharing
Norma Walton, Space sharing
 
TechSaints International Pvt. Ltd. - Technology Company Presentation.
TechSaints International Pvt. Ltd. - Technology Company Presentation.TechSaints International Pvt. Ltd. - Technology Company Presentation.
TechSaints International Pvt. Ltd. - Technology Company Presentation.
 
Presentation
PresentationPresentation
Presentation
 
Business Proposal PPT
Business Proposal PPTBusiness Proposal PPT
Business Proposal PPT
 
LLG corporate presentation february 2017
LLG   corporate presentation february 2017LLG   corporate presentation february 2017
LLG corporate presentation february 2017
 
Killer tips for your business ppt
Killer tips for your business pptKiller tips for your business ppt
Killer tips for your business ppt
 
PPT From client end
PPT From client endPPT From client end
PPT From client end
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Human Resource planning
Human Resource planningHuman Resource planning
Human Resource planning
 

Semelhante a BA Company Presentation

Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentationcygnet-infotech
 
We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...dvcom2
 
We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...dvcom2
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Rakesh Kumar
 
InventureIS Profile
InventureIS ProfileInventureIS Profile
InventureIS ProfileS K Jha
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Bringing Artificial Intelligence Alive
Bringing Artificial Intelligence AliveBringing Artificial Intelligence Alive
Bringing Artificial Intelligence AliveDes O'Connor
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2sabrodiesel2000
 

Semelhante a BA Company Presentation (20)

Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentation
 
DVCOM
DVCOMDVCOM
DVCOM
 
We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...
 
DVCOM
DVCOMDVCOM
DVCOM
 
We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...We are among the first people who started deploying Open source Telephony sol...
We are among the first people who started deploying Open source Telephony sol...
 
IT consultancy presentation
IT consultancy presentationIT consultancy presentation
IT consultancy presentation
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
 
InventureIS Profile
InventureIS ProfileInventureIS Profile
InventureIS Profile
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Bb capabilities
Bb capabilitiesBb capabilities
Bb capabilities
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
Bringing Artificial Intelligence Alive
Bringing Artificial Intelligence AliveBringing Artificial Intelligence Alive
Bringing Artificial Intelligence Alive
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2
 

Mais de 247 Invest

Startup Resiliency During #COVID19
Startup Resiliency During #COVID19Startup Resiliency During #COVID19
Startup Resiliency During #COVID19247 Invest
 
2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman247 Invest
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute247 Invest
 
Zeeschildpadden Jolijn Vekeman
Zeeschildpadden Jolijn VekemanZeeschildpadden Jolijn Vekeman
Zeeschildpadden Jolijn Vekeman247 Invest
 
Zeeschildpadden jolijn vekeman
Zeeschildpadden   jolijn vekemanZeeschildpadden   jolijn vekeman
Zeeschildpadden jolijn vekeman247 Invest
 
Scense Express Jumpstart
Scense Express JumpstartScense Express Jumpstart
Scense Express Jumpstart247 Invest
 
Investor presentation scense aug2014 - linked in
Investor presentation scense   aug2014 - linked inInvestor presentation scense   aug2014 - linked in
Investor presentation scense aug2014 - linked in247 Invest
 
Show me-the-money Intro
Show me-the-money IntroShow me-the-money Intro
Show me-the-money Intro247 Invest
 
247 INVEST Company Presentation
247 INVEST Company Presentation247 INVEST Company Presentation
247 INVEST Company Presentation247 Invest
 
PPA Conference 2013 | Mobiya Classifieds
PPA Conference 2013 | Mobiya ClassifiedsPPA Conference 2013 | Mobiya Classifieds
PPA Conference 2013 | Mobiya Classifieds247 Invest
 
Pitch Class: Get a No and make it Go
Pitch Class: Get a No and make it GoPitch Class: Get a No and make it Go
Pitch Class: Get a No and make it Go247 Invest
 
Partnership Proposition Core DataCloud
Partnership Proposition Core DataCloudPartnership Proposition Core DataCloud
Partnership Proposition Core DataCloud247 Invest
 
Camargus International Customer Presentation
Camargus International Customer PresentationCamargus International Customer Presentation
Camargus International Customer Presentation247 Invest
 
1Cloud Partnership Model
1Cloud Partnership Model1Cloud Partnership Model
1Cloud Partnership Model247 Invest
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...247 Invest
 
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...247 Invest
 
Web startup run 2010 london marathon
Web startup run   2010 london marathonWeb startup run   2010 london marathon
Web startup run 2010 london marathon247 Invest
 
Post Innovation Dilemma. What first: sales or marketing?
Post Innovation Dilemma. What first: sales or marketing?Post Innovation Dilemma. What first: sales or marketing?
Post Innovation Dilemma. What first: sales or marketing?247 Invest
 
SmartStyle Office Introduction
SmartStyle Office IntroductionSmartStyle Office Introduction
SmartStyle Office Introduction247 Invest
 

Mais de 247 Invest (20)

Startup Resiliency During #COVID19
Startup Resiliency During #COVID19Startup Resiliency During #COVID19
Startup Resiliency During #COVID19
 
2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
 
Zeeschildpadden Jolijn Vekeman
Zeeschildpadden Jolijn VekemanZeeschildpadden Jolijn Vekeman
Zeeschildpadden Jolijn Vekeman
 
Zeeschildpadden jolijn vekeman
Zeeschildpadden   jolijn vekemanZeeschildpadden   jolijn vekeman
Zeeschildpadden jolijn vekeman
 
Scense Express Jumpstart
Scense Express JumpstartScense Express Jumpstart
Scense Express Jumpstart
 
Investor presentation scense aug2014 - linked in
Investor presentation scense   aug2014 - linked inInvestor presentation scense   aug2014 - linked in
Investor presentation scense aug2014 - linked in
 
Show me-the-money Intro
Show me-the-money IntroShow me-the-money Intro
Show me-the-money Intro
 
247 INVEST Company Presentation
247 INVEST Company Presentation247 INVEST Company Presentation
247 INVEST Company Presentation
 
PPA Conference 2013 | Mobiya Classifieds
PPA Conference 2013 | Mobiya ClassifiedsPPA Conference 2013 | Mobiya Classifieds
PPA Conference 2013 | Mobiya Classifieds
 
Pitch Class: Get a No and make it Go
Pitch Class: Get a No and make it GoPitch Class: Get a No and make it Go
Pitch Class: Get a No and make it Go
 
Partnership Proposition Core DataCloud
Partnership Proposition Core DataCloudPartnership Proposition Core DataCloud
Partnership Proposition Core DataCloud
 
Camargus International Customer Presentation
Camargus International Customer PresentationCamargus International Customer Presentation
Camargus International Customer Presentation
 
1Cloud Partnership Model
1Cloud Partnership Model1Cloud Partnership Model
1Cloud Partnership Model
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
 
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
 
Web startup run 2010 london marathon
Web startup run   2010 london marathonWeb startup run   2010 london marathon
Web startup run 2010 london marathon
 
Post Innovation Dilemma. What first: sales or marketing?
Post Innovation Dilemma. What first: sales or marketing?Post Innovation Dilemma. What first: sales or marketing?
Post Innovation Dilemma. What first: sales or marketing?
 
SmartStyle Office Introduction
SmartStyle Office IntroductionSmartStyle Office Introduction
SmartStyle Office Introduction
 

Último

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Último (20)

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

BA Company Presentation

  • 3. What does it mean in today’s world?
  • 4. Globalisation Security Threats Environment Credit Crunch Recession
  • 5. What does it mean to you as a CEO, COO or CTO?
  • 6. Cost control Freedom Availability Productivity Sustainability Future
  • 7. Information Integration BA’s infrastructure for: Mobility Security Data Access Data Protection and Portability and Integrity Virtualisation Digitisation Data Infrastructure Digital Preservation Solutions & Scalability and Archiving
  • 10. Mobility Solutions What BA does for you? Mobile Workforce Solutions Company mobile communications solutions based on open source messaging and collaboration software
  • 11. Mobility Solutions What BA does for you? Mobile Workforce Solutions Company mobile communications solutions based on open source messaging and collaboration software Business Mobile Strategies Discovery, proof of concept, readiness assessment, end-to-end implementation of mobile services
  • 12. Mobility Solutions What BA does for you? Mobile Workforce Solutions Company mobile communications solutions based on open source messaging and collaboration software Business Mobile Strategies Discovery, proof of concept, readiness assessment, end-to-end implementation of mobile services Open BlackBerry Integration BA is Research in Motions’ (RIM) exclusive partner for wireless enterprise information integration projects
  • 14. Security Solutions What BA does for you? Managed Security Services Security consulting: audits, policies & forensics. Network security: managed firewall and VPN. Messaging security.
  • 15. Security Solutions What BA does for you? Managed Security Services Security consulting: audits, policies & forensics. Network security: managed firewall and VPN. Messaging security. Disaster Recovery DR consulting and IT contingency planning, business information availability backed by service level agreements
  • 16. Security Solutions What BA does for you? Managed Security Services Security consulting: audits, policies & forensics. Network security: managed firewall and VPN. Messaging security. Disaster Recovery DR consulting and IT contingency planning, business information availability backed by service level agreements Data Protection Data replication and intrusion detection solutions, data theft prevention, consulting and recommendations
  • 17. Security Solutions What BA does for you? Managed Security Services = Information Confidentiality Disaster Recovery = Information Availability Data Protection = Information Integrity
  • 19. Why Virtualisation Infrastructure Services Dynamic scalability Fully optimized, 24/7 available, 100% integrated business information infrastructure for all your IT requirements
  • 20. Why Virtualisation Infrastructure Services Dynamic scalability Fully optimized, 24/7 available, 100% integrated business information infrastructure for all your IT requirements Pay as you go OpEx driven pricing model designed to suit your rolling IT budget and future technology requirements
  • 21. Why Virtualisation Infrastructure Services Dynamic scalability Fully optimized, 24/7 available, 100% integrated business information infrastructure for all your IT requirements Pay as you go OpEx driven pricing model designed to suit your rolling IT budget and future technology requirements Environment Low electricity consumption, fewer servers, better performance, cost friendly hosting environment
  • 22. Information Integration and Digital Preservation Looking into The Future
  • 23. Digital Preservation What BA does for you? Protecting Digital Assets BA offers national digital information infrastructure based on government standards and guidelines
  • 24. Digital Preservation What BA does for you? Protecting Digital Assets BA offers national digital information infrastructure based on government standards and guidelines Digital Preservation Planning BA helps with convergence planning and preservation modeling to ensure long-term existence of information
  • 25. Digital Preservation What BA does for you? Protecting Digital Assets BA offers national digital information infrastructure based on government standards and guidelines Digital Preservation Planning BA helps with convergence planning and preservation modeling to ensure long-term existence of information Digitisation & Managed Archiving Capture, preserve and distribute digital research material. BA has the know how, tools, technology and processes
  • 27. Our Commitment Ask our clients Government Politiezone Leuven SMB Market Duval Guillaume Enterprise Sodexho
  • 28. Why BA? C3 Principle Creative Implementation of creative and cost effective open source solutions for more than 12 years Committed Access to local know how from a motivated team contributing to solving customer problems Custom Long standing reputation as security innovator and bespoke managed solutions provider
  • 29. Thank You Contact us www.ba.be info@ba.be 016/29.80.45 016/29.80.46 Dalemhof 28 B-3000 Leuven
  • 30. Partnerships BA leads the way Technology partnerships Engaged with world-class open technology companies: Research in Motion, Sun Microsystems, Oracle, Red Hat Project partnerships BA primes every projects on behalf of its customers by sourcing for the most open and proven technology Customer partnerships BA as prime contractor acts as extended IT partner offering 24/7 support and service level agreements