SlideShare uma empresa Scribd logo
1 de 47
WELCOME TO PCM’s
Alan Lawrence
President – PCMG-G
Public Sector
Bob Bogle
Senior Vice President
Field Sales West
INVESTMENTS TO SUPPORT ACCOUNT MANAGER AND CUSTOMERS
CUSTOMER
Face to Face
Phone
Digital
Mobile
ACCOUNT
MANAGER
Business
Development
Managers
Engineers &
Pre-Sales
Support
Professional
Services
Managed Services
Microsoft &
Software
Service Delivery
Advanced & Field
STRATIFORM
(Security & Cloud)
MISSION FIRST
• Serving the needs of Public Sector
Customers Worldwide for Nearly 30 Years
• Federal Government (DoD, Civilian,
Advanced Programs)
• State and Local
• Education (K-12 and Higher Ed)
• System Integrators
• Combine Commercial Products from leading
Technology Manufacturers with Certified
Engineer and Integration Service to Tailor
Solutions for Each Customer
• Wide Range of Federal, State and Local, and
Contract Vehicles
• Dedicated, Certified Acquisition and
Program Management Team
2017 marked a major milestone for PCM
We're celebrating 30 years as a trusted IT solutions provider!
We started in garage and now a Global Fortune 1000
IT Solutions and Services Provider
PCM’s SERVICES
LEADERSHIP TEAM
Stephen Moss
SVP, Services & Solutions
Herb Hogue
President, Stratiform
David Hall
SVP, Services
MOBILE, CLOUD AND SECURITY
DIGITAL TRANSFORMATION IS NOW AN IMPERATIVE
WHO IS PCM?
MOBILE FIRST
We live in a world of mobile technology but it’s not the
technology that’s Mobile it’s the users. We assist customers with
custom solutions in multiple form factors with unique
applications, securely, with a complete managed experience.
CLOUD FIRST
An agnostic cloud approach to understanding a customers unique
business and technical requirements leveraging our assess,
implement, manage and enhance methodology to insure a
seamless journey to the clouds.
SECURITY FIRST
A complete security methodology assessing security requirements,
threat areas, business risk leveraging best of breed security
technologies with the governance and processes to implement a
comprehensive security architecture, identifying controls with the
governance to manage them, and the capacity to remediate
threats as the landscape changes.
A HOLISTIC, COMPREHENSIVE SOLUTION COMPANY
MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
Workforce
Anywhere
• Any device – Anywhere
• High, low and no touch
options to transact your
business
• Secure access to data
• Pocket to cloud
enablement
• Fleet and contingent
workforce solutions
Product
Development
• Tailored for customer
experience
• Application accessibility
• Customized solutions
• Custom packaging and
delivery
• Program management
• Data acquisition for
analytics
Support
Everywhere
• Customer experience
driven
• Multi-lingual support
• Global field services
• Warehousing
• Depot options
• Disposal solutions
• Full asset management
MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
All Rights Reserved for Customer Owned Images
Don't worry about which Cloud partner provides your business with
the best options. PCM partners with all of todays leading public
cloud providers to design a solution that fits your business best.
We also integrate with your premise private cloud solution.
Transformation
Methodology
Ongoing
Customer
Success
Solution
Focused
PCM Cloud
Strategy
FOUNDATION OF THE
PCM CLOUD STRATEGY
Platform and
Partners
FOCUSED ON HYBRID
Your Cloud
The PCM Complete for Cloud program gives every customer
access to the Transformational Services, tools and resources
needed at every step of the solution lifecycle.
Assess
• Envisioning Sessions
• Solution Assessments
• Plan & Roadmap
Implement
• Migration Services
• Deployment Services
• Adoption Services
Enhance
• Cloud Advisors
• Cloud Residents
Ongoing
Customer
Success
Solution
Focused
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Manage
• Straticare Support
• Change Management
• 24/7 Operations
FOUNDATION OF THE
PCM CLOUD STRATEGY
FOUNDATION OF THE
PCM CLOUD STRATEGY Ongoing
Customer
Success
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Solution Alignment
• Collaboration and Productivity – Modern Workplace
• Data Center Transformation, Business Continuity,
Storage, Application Migration- Modern Infrastructure
• Data Visualization, and usage -Modern Data
• Top ERP solutions available as a Service
Solution
Focused
Cloud Resident
For customer deploying cloud based solutions –
90 day Architect on-site to assist select clients with
transitioning to the cloud with multiple disciplines.
Cloud Advisor –Regular monthly engagement with client
to help drive business initiatives with cloud technology.
Cloud Advisor
New Roles | New Focus
Managed Hybrid Cloud Support
FOUNDATION OF THE
PCM CLOUD STRATEGY
Transformational
Methodology
Platforms and
Partners
Solution
Focused
PCM Cloud
Strategy
FOCUSED ON CUSTOMER SUCCESS &
AN ENHANCED EXPERIENCE
Ongoing
Customer
Success
SECURITY FIRST
FOCUSED ON HELPING COMPANIES AT EVERY STAGE
Manage Security
Environment
Determine Current &
Target Scale
Assessment Security
Requirements
Communicate & Execute
your Roadmap
Develop Improvement
Plans
RIGHT NOW
For more information please contact your Account Representative or
Stephen.Moss@pcm.com Herb.Hogue@pcm.com Robert.Hall@pcm.com
today for Your Right Now solution.
Mobile
CloudSecure
The Mindset
of a Hacker
EARLY
DAYS
1990:
FIRST COMPUTER
1993:
FIRST TIME ON
THE INTERNET
1995:
PROGRAMMING
& HACKING
1997:
RECRUITED
BY TNT
1998-
1999:
DDOS
ATTACKS
A T T A C KE R
V I C T I
M
2000:
PROJECT
RIVOLTA
2000:
MARKET CRASH
$1.7 billiondollars in economic damage
2000:
THE
MANHUNT
2000:
THE AFTERMATH
HACKING TODAY
THE INSTITUTIONALIZATION
OF HACKING
EMPLOYEES
ARE THE
WEAKEST LINK
EMPLOYEES ARE THE WEAKEST LINK
EMERGING TECHNOLOGY
CREATING INCREASED RISK
BACK DOOR
LOCKED.
RONT DOOR
LOCKED.
RS
COME
THROU
GH
THE
PIPES
HP
SureStart
TAKEAWAYS
RIGHT NOW
SVP of Security Practice
Tuesday, November 6, 2017
Gary Miglicco
WRAP UP
SVP/GM of Inside Sales
Monday, November 6, 2017
Keith Joseph
Platinum & Gold Partner
Breakout sessions
Tech Expo 2:00-5:30
Cocktail Reception &
Attendee Gift Distribution
UP NEXT
#PCMVision Customer Day Presentation Slides

Mais conteúdo relacionado

Mais procurados

RapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale CloudRecovery
RapidScale CloudRecovery
RapidScale
 

Mais procurados (20)

Introducing Workload XM 8.7.18
Introducing Workload XM 8.7.18Introducing Workload XM 8.7.18
Introducing Workload XM 8.7.18
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
 
RapidScale CloudApps
RapidScale CloudAppsRapidScale CloudApps
RapidScale CloudApps
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
 
MT155 Analytics and Cloud Native Apps – Your Business Game Changer
MT155 Analytics and Cloud Native Apps – Your Business Game ChangerMT155 Analytics and Cloud Native Apps – Your Business Game Changer
MT155 Analytics and Cloud Native Apps – Your Business Game Changer
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
 
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud InfrastructureRedefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
 
EZ Cloud Connect
EZ Cloud Connect EZ Cloud Connect
EZ Cloud Connect
 
Calculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicumCalculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicum
 
Keeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads ProtectedKeeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads Protected
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise Cloud
 
January 2015 Webinar - Wins and Successes from 2014
January 2015 Webinar -  Wins and Successes from 2014January 2015 Webinar -  Wins and Successes from 2014
January 2015 Webinar - Wins and Successes from 2014
 
4.30.19 HPE GreenLake and Cloud Technology Partners (CTP)
4.30.19 HPE GreenLake and Cloud Technology Partners (CTP)4.30.19 HPE GreenLake and Cloud Technology Partners (CTP)
4.30.19 HPE GreenLake and Cloud Technology Partners (CTP)
 
RapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale CloudRecovery
RapidScale CloudRecovery
 
22by7 campus presentation v1.05
22by7 campus presentation v1.0522by7 campus presentation v1.05
22by7 campus presentation v1.05
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
L'Iperconvergenza 2.0: NetApp HCI in Action
L'Iperconvergenza 2.0: NetApp HCI in ActionL'Iperconvergenza 2.0: NetApp HCI in Action
L'Iperconvergenza 2.0: NetApp HCI in Action
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud future
 

Semelhante a #PCMVision Customer Day Presentation Slides

CNSG Overview Presentation 2015
CNSG Overview Presentation 2015CNSG Overview Presentation 2015
CNSG Overview Presentation 2015
Sanjar Khamrabaev
 
ClickLabs-Corporate-Brochure
ClickLabs-Corporate-BrochureClickLabs-Corporate-Brochure
ClickLabs-Corporate-Brochure
Cyndi Satorre
 
AS Corporate Overview 2011
AS Corporate Overview 2011AS Corporate Overview 2011
AS Corporate Overview 2011
kmakoid
 
AS Corporate Overview 2011
AS Corporate Overview 2011AS Corporate Overview 2011
AS Corporate Overview 2011
kmakoid
 
Daemon Software and Services - Introduction & Company Profile
Daemon Software and Services - Introduction & Company ProfileDaemon Software and Services - Introduction & Company Profile
Daemon Software and Services - Introduction & Company Profile
DaemonMarketing
 

Semelhante a #PCMVision Customer Day Presentation Slides (20)

Global Web Ops
Global Web OpsGlobal Web Ops
Global Web Ops
 
Customer-First Focus: The Path to Hypergrowth
Customer-First Focus: The Path to HypergrowthCustomer-First Focus: The Path to Hypergrowth
Customer-First Focus: The Path to Hypergrowth
 
InfoTrellis Consulting & Professional Services Overview
InfoTrellis Consulting & Professional Services OverviewInfoTrellis Consulting & Professional Services Overview
InfoTrellis Consulting & Professional Services Overview
 
CNSG Overview Presentation 2015
CNSG Overview Presentation 2015CNSG Overview Presentation 2015
CNSG Overview Presentation 2015
 
corporate.ppt
corporate.pptcorporate.ppt
corporate.ppt
 
corporate (1).ppt
corporate (1).pptcorporate (1).ppt
corporate (1).ppt
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
Incresol Company Profile Presentation
Incresol Company Profile Presentation Incresol Company Profile Presentation
Incresol Company Profile Presentation
 
ClickLabs-Corporate-Brochure
ClickLabs-Corporate-BrochureClickLabs-Corporate-Brochure
ClickLabs-Corporate-Brochure
 
T/DG | Corporate Brochure
T/DG | Corporate BrochureT/DG | Corporate Brochure
T/DG | Corporate Brochure
 
Biz transsystech v1.0
Biz transsystech v1.0Biz transsystech v1.0
Biz transsystech v1.0
 
BizTransSysTech_v1.0
BizTransSysTech_v1.0BizTransSysTech_v1.0
BizTransSysTech_v1.0
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
Mokxa introduction
Mokxa introductionMokxa introduction
Mokxa introduction
 
Goip Profile
Goip ProfileGoip Profile
Goip Profile
 
AS Corporate Overview 2011
AS Corporate Overview 2011AS Corporate Overview 2011
AS Corporate Overview 2011
 
AS Corporate Overview 2011
AS Corporate Overview 2011AS Corporate Overview 2011
AS Corporate Overview 2011
 
Daemon Software and Services - Introduction & Company Profile
Daemon Software and Services - Introduction & Company ProfileDaemon Software and Services - Introduction & Company Profile
Daemon Software and Services - Introduction & Company Profile
 
Short version
Short versionShort version
Short version
 
BizTransSysTech_v1.0
BizTransSysTech_v1.0BizTransSysTech_v1.0
BizTransSysTech_v1.0
 

Mais de PCM

Mais de PCM (17)

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPI
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: Dell
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: Cisco
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd Pekats
 
PCM Vision 2019 Keynote: Jeff Crume
PCM Vision 2019 Keynote: Jeff CrumePCM Vision 2019 Keynote: Jeff Crume
PCM Vision 2019 Keynote: Jeff Crume
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: Veritas
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot Baretz
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest Software
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: Samsung
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: Symantec
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite
 

Último

No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 

Último (20)

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 

#PCMVision Customer Day Presentation Slides

  • 1. WELCOME TO PCM’s Alan Lawrence President – PCMG-G Public Sector Bob Bogle Senior Vice President Field Sales West
  • 2. INVESTMENTS TO SUPPORT ACCOUNT MANAGER AND CUSTOMERS CUSTOMER Face to Face Phone Digital Mobile ACCOUNT MANAGER Business Development Managers Engineers & Pre-Sales Support Professional Services Managed Services Microsoft & Software Service Delivery Advanced & Field STRATIFORM (Security & Cloud)
  • 3. MISSION FIRST • Serving the needs of Public Sector Customers Worldwide for Nearly 30 Years • Federal Government (DoD, Civilian, Advanced Programs) • State and Local • Education (K-12 and Higher Ed) • System Integrators • Combine Commercial Products from leading Technology Manufacturers with Certified Engineer and Integration Service to Tailor Solutions for Each Customer • Wide Range of Federal, State and Local, and Contract Vehicles • Dedicated, Certified Acquisition and Program Management Team
  • 4. 2017 marked a major milestone for PCM We're celebrating 30 years as a trusted IT solutions provider! We started in garage and now a Global Fortune 1000 IT Solutions and Services Provider
  • 5. PCM’s SERVICES LEADERSHIP TEAM Stephen Moss SVP, Services & Solutions Herb Hogue President, Stratiform David Hall SVP, Services
  • 6. MOBILE, CLOUD AND SECURITY DIGITAL TRANSFORMATION IS NOW AN IMPERATIVE
  • 7. WHO IS PCM? MOBILE FIRST We live in a world of mobile technology but it’s not the technology that’s Mobile it’s the users. We assist customers with custom solutions in multiple form factors with unique applications, securely, with a complete managed experience. CLOUD FIRST An agnostic cloud approach to understanding a customers unique business and technical requirements leveraging our assess, implement, manage and enhance methodology to insure a seamless journey to the clouds. SECURITY FIRST A complete security methodology assessing security requirements, threat areas, business risk leveraging best of breed security technologies with the governance and processes to implement a comprehensive security architecture, identifying controls with the governance to manage them, and the capacity to remediate threats as the landscape changes. A HOLISTIC, COMPREHENSIVE SOLUTION COMPANY
  • 8. MOBILE FIRST FOCUSED ON ALWAYS AVAILABLE ACCESS Workforce Anywhere • Any device – Anywhere • High, low and no touch options to transact your business • Secure access to data • Pocket to cloud enablement • Fleet and contingent workforce solutions Product Development • Tailored for customer experience • Application accessibility • Customized solutions • Custom packaging and delivery • Program management • Data acquisition for analytics Support Everywhere • Customer experience driven • Multi-lingual support • Global field services • Warehousing • Depot options • Disposal solutions • Full asset management
  • 9. MOBILE FIRST FOCUSED ON ALWAYS AVAILABLE ACCESS All Rights Reserved for Customer Owned Images
  • 10. Don't worry about which Cloud partner provides your business with the best options. PCM partners with all of todays leading public cloud providers to design a solution that fits your business best. We also integrate with your premise private cloud solution. Transformation Methodology Ongoing Customer Success Solution Focused PCM Cloud Strategy FOUNDATION OF THE PCM CLOUD STRATEGY Platform and Partners FOCUSED ON HYBRID Your Cloud
  • 11. The PCM Complete for Cloud program gives every customer access to the Transformational Services, tools and resources needed at every step of the solution lifecycle. Assess • Envisioning Sessions • Solution Assessments • Plan & Roadmap Implement • Migration Services • Deployment Services • Adoption Services Enhance • Cloud Advisors • Cloud Residents Ongoing Customer Success Solution Focused Platform and Partners PCM Cloud Strategy Transformation Methodology Manage • Straticare Support • Change Management • 24/7 Operations FOUNDATION OF THE PCM CLOUD STRATEGY
  • 12. FOUNDATION OF THE PCM CLOUD STRATEGY Ongoing Customer Success Platform and Partners PCM Cloud Strategy Transformation Methodology Solution Alignment • Collaboration and Productivity – Modern Workplace • Data Center Transformation, Business Continuity, Storage, Application Migration- Modern Infrastructure • Data Visualization, and usage -Modern Data • Top ERP solutions available as a Service Solution Focused
  • 13. Cloud Resident For customer deploying cloud based solutions – 90 day Architect on-site to assist select clients with transitioning to the cloud with multiple disciplines. Cloud Advisor –Regular monthly engagement with client to help drive business initiatives with cloud technology. Cloud Advisor New Roles | New Focus Managed Hybrid Cloud Support FOUNDATION OF THE PCM CLOUD STRATEGY Transformational Methodology Platforms and Partners Solution Focused PCM Cloud Strategy FOCUSED ON CUSTOMER SUCCESS & AN ENHANCED EXPERIENCE Ongoing Customer Success
  • 14. SECURITY FIRST FOCUSED ON HELPING COMPANIES AT EVERY STAGE Manage Security Environment Determine Current & Target Scale Assessment Security Requirements Communicate & Execute your Roadmap Develop Improvement Plans
  • 15. RIGHT NOW For more information please contact your Account Representative or Stephen.Moss@pcm.com Herb.Hogue@pcm.com Robert.Hall@pcm.com today for Your Right Now solution. Mobile CloudSecure
  • 22. 1998- 1999: DDOS ATTACKS A T T A C KE R V I C T I M
  • 25. $1.7 billiondollars in economic damage
  • 30.
  • 32. EMPLOYEES ARE THE WEAKEST LINK
  • 36.
  • 37.
  • 38.
  • 39.
  • 41.
  • 43. RIGHT NOW SVP of Security Practice Tuesday, November 6, 2017 Gary Miglicco
  • 44.
  • 45. WRAP UP SVP/GM of Inside Sales Monday, November 6, 2017 Keith Joseph
  • 46. Platinum & Gold Partner Breakout sessions Tech Expo 2:00-5:30 Cocktail Reception & Attendee Gift Distribution UP NEXT

Notas do Editor

  1. VIDEO NEXT SLIDE
  2. Describe how your childhood influenced you and set you out on this journey Often alone due to parents being busy Obsession with puzzles, games and video games that were challenged. At the end of the day, you just like solving problems and creating solutions to challenges
  3. Anecdote about his father giving him his first computer Go into detail about How many hours you spent on the computer Talk about your fathers office and entertaining yourself with the computer What it felt like Why you liked it so much What were the first things you did on the computer
  4. Describe your first time on the internet Who introduced you, where you were, why you went on there in the first place Your initial thoughts And how your activities on the internet evolved
  5. Describe your humble beginnings, Your first exploits, the inspiration the results Your evolution in skill and the escalation of the severity of the hacking
  6. I was recruited my Russia’s top hacking group… a world reowned group called TNT Described how you were recruited What those first conversations were like Was there an initiation process, what was it? what happened next
  7. I was recruited my Russia’s top hacking group… a world renound group called TNT Described how you were recruited What those first conversations were like Was there an initiation process, what was it? what happened next
  8. Here’s the actual code that MafiaBoy used in his attack. Can we put this on an old school computer with some like weird ass coder looking font/treatment? Tools Used: Trinoo IMP.C TF2k Stacheldraht Describe what people are looking at and then in great detail explain the attack The idea/inspiration How you picked the targets How you did it Who the targets were (name 4-5) Did anyone in your personal life know you were going to do it Where you were How it felt
  9. You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered. Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety. People began to sell and my targets scrambled to regain credibility but it was too late. It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected. CLICK
  10. You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered. Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety. People began to sell and my targets scrambled to regain credibility but it was too late. It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected. CLICK
  11. Things to touch on: Family/friend reaction Juvenile detention Being released from Juvenile detention at reintegrating into society
  12. Reference the trailer – As I mentioned in the video a hacker’s arsenal is much more sophisticated today and so are their motivations.
  13. The first is the institutionalization of hacking. When I was hacking, it was about Exploration, pushing the status quo circumventing preset parameters – those motivations are still there but there is a completely different set of threats impacting organizations like yours.
  14. Today, it’s about Financial Gain, Ideology, Politics and Entertainment and these groups are much different from ones like I was a part of like TNT Today, they are often state sponsored, numbered businesses, organizations whose reputation is build on their ability to get results. These grandiose motivations, highly evolved collectives of talent hackers, you gets grandiose and complex attacks.
  15. Although everyone in this room is very cognizant of the threats that exist online – that every email, every link, every attachment is a potential threat – the truth of the matter is, we are the minority. Everyone organization that is represented in this room is made up almost entirely of employees who don’t think in terms of risk, who don’t see themselves as the target and act first and think later. 65% of all breaches happen from internal – people can’t resist. I know for a fact that this is what keeps you up at night.
  16. Those are the obvious examples but let me tell you about one of the more sophisticated social engineering tactics I’ve employed as a pen tester: Tell Car/Train story Thankfully for that client, this was only a test. But let me tell you about one of the most devastating attacks that came as the result of a simple phishing scam that shook the foundation of a multi-billion dollar company
  17. The internet of things revolution has made devices smarter, it’s made our lives easier but it’s also made us more susceptible than ever before to cyber attacks. And as more and more devices are added to our networks the time, energy and resources you’re able to dedicate to securing them is drawn thinner and thinner.
  18. For the last several years, we’ve been focused on securing the truly mobile devices that scale across our organizations: smart phones, tablets and laptops. I like to think of the analogy of focusing 90% of your efforts on those devices is like locking the front and back doors. The problem for organizations though is…. CLICK
  19. Hackers come through the pipes. While we’re talking about end points within this context, let’s dissect one in particular that is often overlooked but a huge red herring for many organizations. CLICK
  20. A few questions for the room: how many printers does your organization have in your fleet? If you asked any of the employees in your organization – do you think they would have a sense of what kind of information flows through your company printer every day? I am willing to bet, because I’ve had these conversations – the general perception is that printers are purely an output device, and aside from rare chance of paper being stolen from the tray – they aren’t a risk. We all know that if that printer is connected to the company network, that’s not true. CLICK
  21. What security protocols are currently managing your printer fleet? If you don’t know the answer or if the answer isn’t a robust list.  Let me ask you: if you suffered a breach through one of your printers.. would you know it happened and how long would it take you to find the breach? CLICK
  22. So we know hackers are looking for entry points to your organization that function more like pipes than front and back doors. And you have a fleet of printers that may not be overly secure. Ask yourself, can your organization stand to have a blind spot that large? I can tell you as someone who has been on both sides of this battleground between IT and cyber criminals that you cannot. CLICK
  23. Today, I work as a security consultant and penetration tester and as a result, I’ve heard the security spiel from every major technology company. And, I’ve also seen how exposed many of those companies are leaving their customers. We all see daily news headlines about data breaches and hacking, so of course technology companies will tout security as a product feature, but are they really bringing it to the core of their offering and bringing it across devices? In my experience, many are not.  As more and more connected PCs, Printers and other devices flood our networks and more and more data goes in transit, IT departments are scrambling to keep up – and the truth us, they can’t do it by themselves – they need help.   And that’s really what inspired me to begin working with HP. They aren’t just talking the talk, they’re walking the walk. I’ve had the opportunity to work with the HP labs team, and peak underneath the hood and can tell you that whether it’s PC or Print – HP is delivering best in class security solutions, at the device level – the sort of security based-automation and protection that today’s businesses need to ensure they’re protected, at all times.  But what do I mean about building in security technology at the device level? CLICK
  24. Security at the Firewall level, isn’t enough – because of extremely sophisticated attacks that are now happening below the firmware. On the PC side of things, let’s look at HPSureStart for example which protects against those attacks below firmware, at the BIOS level. SureStart protects against the attacks targeting the millions of lines of code before your operating system boots up and the firewall has an opportunity to engage and protect you. SureStart ensures that you’re protected from the moment you hit that power button. I can’t tell you how many end-users are being saved on a daily basis by features like this – amazing stuff. CLICK
  25. In terms of Print, let’s examine just one example of the tremendous enhancements in print security technology HP has championed. HP Runtime Intrusion Detection which constantly analyzes for malware attacks and any other inconsistencies. Sounds standard right? Well, what truly sets Runtime Intrusion Detection apart is its ability to identify, delete, self-heal and then reboot, automatically without the need for a service call. What IT department that you know of wouldn’t benefit from this self-detection and healing technology, it’s precisely to kind of safety nets today’s employees need to ensure they aren’t making mistakes online that could cost a business millions, without even knowing it. CLICK
  26. Today, we’ve discussed my story, and how much hacking has changed. The motivation, the techniques, the perpetrators and even the targeted devices.   We talked about how IT departments are often being tasked to do more with less – a difficult mandate when you consider the huge proliferation of sophisticated devices that are joining company networks everyday. And finally, we discussed what HP is doing to help the IT department shore up the defense against cyber-attacks at the device level, to create the layers of security required to protect your devices and provide the modern IT department with the necessary safety nets and detection protocol to act with quickness and efficiency when attacks do happen. I urge all of you to re-assess what is being done at the organizational, individual employee and device level to protect yourselves, before it’s too late. Thank you.
  27. DAY 2
  28. DAY 2
  29. DAY 2