SlideShare a Scribd company logo
1 of 30
Presented June 6, 2012




      Your Journey into the Cloud:
             Optimize your
        Mission Critical Systems




In association with:     Presented by:
About AIIM


     AIIM is the Global Community of
        Information Professionals

    We provide the education, research,
            and certification that
      information professionals need
           to manage and share
      information assets in an era of
    mobile, social, cloud, and big data.


            Learn more about AIIM at
                 www.aiim.org


In association with:                       Presented by:
About AIIM


           www.aiim.org/research        Visit AIIM’s video library at
                                          www.aiim.org/videos

                                          With more than 100
          Research/Industry watch       snapshots on all things
                                       Information Management



              www.aiim.org/training     www.aiim.org/membersonly




                                      Check out your professional member
                                                     benefits



In association with:                   Presented by:
Secure Your Success
   Become a



     Demonstrate your ability to address
  and manage today’s information challenges




              www.aiim.org/certification
Follow AIIM on

           AIIM Community – @aiimcommunity
           John Mancini – @jmancini77                        #aiim

           Atle Skjekkeland – @skjekkeland            #aiimwebinar
           Laurence Hart – @piewords
                                                        #infomgmt
           Peggy Winton – @pwwinton
           Bryant Duhon – @bduhon                            #ecm
           Jesse Wilkins – @jessewilkins
           Nick Inglis – @nickinglis
           Theresa Resek – @tmresek
           Beth Mayhew – @bethmayhew
           Thedra White – @thedrawhite


In association with:                         Presented by:
AIIM Presents:


                      Your Journey into the Cloud:
                 Optimize your Mission Critical Systems


        Host: Theresa Resek – Director, AIIM Webinars

        Shadrach White – Founder, cloudPWR

        Andrea Leggett – Global Product Marketing, EMC OnDemand, IIG




In association with:                               Presented by:
Many Choices…



                        APPLICATIONS




                         PLATFORM




                       INFRASTRUCTURE




In association with:                    Presented by:
The Cloud Demystified



                                            DEPLOYMENT


                        APPLICATIONS



                         PLATFORMS      PUBLIC PRIVATE HYBRID


                       INFRASTRUCTURE




In association with:                         Presented by:
ECM in the Cloud



       Return on Investment
         DR | Reliability | Scalability | Mobility
       Management Overhead
         Patch | Security | Version
       Complexity
         UI | Dashboard | Integration



In association with:                      Presented by:
Security


 Physical Data Center 7x24x365
 System Monitoring
 Change Control
 Governance




In association with:              Presented by:
Data Privacy


 Personal Identifiable Information
    FERPA, HIPAA, PTI, FISMA, PIP
 Data Control
    Where is the Data?
    Who Has Access?
    Single Tenant v. Multi-Tenant
    Auditing & Tracking



In association with:                  Presented by:
Integration


 Legacy Applications v. Web Services
 How much data is being transmitted
 What kind of data?
 Data Encryption




In association with:             Presented by:
Traditional | Cloud

                   OLD WAY                                              NEW WAY

                          MONTHS                                             HOURS

        Weeks    Task                                   Minutes    Task
        5        Acquire hardware                         15       Log in, review, and approve work order
        2        Rack and cable hardware                  60       Monitor provisioning progress
        2        Install operating systems                15       Sanity test provisioned environment
        1        Install DBs                              30       Configure secure network to customer site
        1        Install application servers
        1        Install batch scheduler
        1        Install DEV servers
        3        Record and test desktop installation
        1        Push install desktop products to
                 locked- down desktops
        1        Install TEST servers
        2        Install PROD servers
        2        Configure backup, monitoring
        3        Test PROD fault tolerance, backup,
                 monitoring




In association with:                                              Presented by:
Capture


   CENTRALIZED                     DISTRIBUTED
    Scanning Workstation           Multi-function devices
    Image Processing               Digital Snapshots
    File Caching                   Desktop Scanning
    Scheduled Batch Processing     Print to PDF
    Full Page | Thumbnails         File Browsing
    Upload
      RealTime – High Bandwidth
      Scheduled – Low Bandwidth
      Metering with checksum



In association with:                        Presented by:
Hybrid Connections


 Migration v. Bridge
 On Premise Apps
 Cloud 2 Cloud
 Security Models - SAML




In association with:          Presented by:
Sharing | Managing


    Sharing                    Managing
      Collaboration             Check in/out
      Mobility                  Version Control
      Social                    Records
                                  Management




In association with:                 Presented by:
Old School | New School


   LEGACY                  CLOUD
    M/F Accounting         SalesForce, WorkDay, Intuit
    Email Collaboration    GoogleApps, Box
    DC Infrastructure      App Driven Solutions
    CAPEX                  OPEX


    Driving Change:        Adapting Quickly:
      Mobile BYOD             Web Services – Oauth |SAML
      SaaS App Sprawl         Freemium Trials
      Social Business         Born Social



In association with:                  Presented by:
Private                                                  Public

                                                                               Network

                                                             Physical Infrastructure

                Application         Storage             Application         Storage       Application
                          Private                                 Private
                                                                                                   Database
               OS | Security    Database            OS | Security       Database

                                                                                                OS | Security

                                    Application         Storage
                                                                                                    Storage
                                              Private



                                OS | Security       Database
In association with:                                                                     Presented by:
Content Value for Cloud Offerings

                 High                                                        Governance
                                                    Regulated


           Value                  Controlled

                                                                           Full ECM Functionality


                                                                           Basic ECM Functionality
                             Casual
                                                                           Minimal ECM Functionality
                  Low


                           Individual                                           Organization
                                                  Access
             Source: “Can Google Solve Your ECM Problems?” Forrester Research, Inc., July 28, 2011


In association with:                                                   Presented by:
Enterprise Sync, Share & Collaboration
             in the Cloud

 • Business Requirements
    Seamless File and Folder Sync
    File Sharing and Collaboration
    Enterprise Mobile Access
   IT Requirements
    Administrator Control
    Enterprise Security and Reliability
    Easy Deployment and End-User Support




In association with:                        Presented by:
Full Enterprise Content Management

 • Business Requirements
    Information Governance Controls (e.g. Records Management)
    Content Lifecycle Management
    Business Process Management Critical
    Mobile Access
 • IT Requirements
    Same As Above Plus…
    Seamless Integration to ERP On-Premise System
    System Auditability
    Performance




In association with:                      Presented by:
IT                                                 USER
LIMITATIONS                                       DEMANDS



                                  ANYWHERE,
            HARDWARE COSTLY
                                  ANYTIME, ANY
            AND CUMBERSOME
                                  DEVICE


                                  ONLINE AND
            CONTROL CONTENT
                                  OFFLINE



            RISK ADVERSITY       DATA
            SLOWS PRODUCTIVITY   CONVERGENCE




In association with:              Presented by:
                                                            22
Accelerate              Achieve                    Reduce
    Application        Flexible Computing             Operational
  Deployment Time           Capacity                   Overhead


     GETTING IT RIGHT
 IN THE CLOUD
In association with:                        Presented by:
Case Study

  • Solution - Invoice processing
  • We are ‘Accountants’
  • Managing performance, not
    servers
  • Tighter SLA than we could
    put in place with our internal
    IT group
  • ‘Bought licenses?’



In association with:                 Presented by:
10 Critical Questions to Ask
            Your Cloud Provider
   1.     What is your data encryption philosophy and how, specifically, do
          you encrypt data?
   2.     How do you manage the encryption keys?
   3.     What certifications for data protection have you attained?
   4.     How much data replication is enough, and what level of data
          durability do you provide?
   5.     How much control do I retain over my data?
   6.     How do you ensure client (endpoint) security?
   7.     Can I leverage existing credentials and password policies and
          disable access immediately?
   8.     How do you isolate and safeguard my data from that of other
          clients?
   9.     How is activity in my account monitored and documented?
   10. Can you continue to provide protection as my workloads evolve?

In association with:                                Presented by:
Next Steps
                       1. Contact Us:
                          www.emc.com/ondemand
                       2. Need Help Understanding Your
                          Potential TCO?
                       3. See how Lahey Clinic leverages
                          EMC OnDemand for Patient
                          Records
                       4. Talk to a Cloud broker

In association with:                   Presented by:
Thank You




                                    Shadrach White
                               www.cloudPWR.com
                                   @shadrachwhite




In association with:           Presented by:
Questions?




In association with:     Presented by:
Survey




               This survey will open in a new window.
                            (or click here)


                  Tell us how we did today,
       and offer suggestions for topics of future events.




In association with:                     Presented by:
Upcoming Webinars


                 June 13th
                 Big Data, Big Hype: Why the Business Should Care

                 June 21st
                 Responding to and Capitalizing on the Latest Trends in Data Capture



                                   Register Today at
                        www.aiim.org/webinars
                       Or check out our Webinar Archive at
                       www.aiim.org/WebinarArchive


In association with:                                         Presented by:

More Related Content

What's hot

Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityCSAIsrael
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012Lars Neupart
 
PCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitecturePCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitectureHyTrust
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Skybox Security
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITSM Academy, Inc.
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 

What's hot (19)

Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012
 
PCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitecturePCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference Architecture
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy Webinar
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 

Similar to Your Journey into the Cloud Optimize Critical Systems

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industriesdirkbeth
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAmazon Web Services
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic SecurityDenim Group
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSAmazon Web Services
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 

Similar to Your Journey into the Cloud Optimize Critical Systems (20)

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS securityAWS Summit Stockholm 2014 – T2 – Understanding AWS security
AWS Summit Stockholm 2014 – T2 – Understanding AWS security
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWS
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 

More from Shadrach White

Washington State Government Lean Transformation Conference 2014
Washington State Government Lean Transformation Conference 2014Washington State Government Lean Transformation Conference 2014
Washington State Government Lean Transformation Conference 2014Shadrach White
 
ILINX Capture Connect Share Part One
ILINX Capture Connect Share Part OneILINX Capture Connect Share Part One
ILINX Capture Connect Share Part OneShadrach White
 
ILINX Capture Connect Share Part Two
ILINX Capture Connect Share Part TwoILINX Capture Connect Share Part Two
ILINX Capture Connect Share Part TwoShadrach White
 

More from Shadrach White (7)

Revenue Hawk
Revenue HawkRevenue Hawk
Revenue Hawk
 
Washington State Government Lean Transformation Conference 2014
Washington State Government Lean Transformation Conference 2014Washington State Government Lean Transformation Conference 2014
Washington State Government Lean Transformation Conference 2014
 
IPMA forum 2014
IPMA forum 2014IPMA forum 2014
IPMA forum 2014
 
ILINX Export Demo
ILINX Export DemoILINX Export Demo
ILINX Export Demo
 
ILINX Capture Connect Share Part One
ILINX Capture Connect Share Part OneILINX Capture Connect Share Part One
ILINX Capture Connect Share Part One
 
ILINX Capture Connect Share Part Two
ILINX Capture Connect Share Part TwoILINX Capture Connect Share Part Two
ILINX Capture Connect Share Part Two
 
ILINX Integrate
ILINX IntegrateILINX Integrate
ILINX Integrate
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Your Journey into the Cloud Optimize Critical Systems

  • 1. Presented June 6, 2012 Your Journey into the Cloud: Optimize your Mission Critical Systems In association with: Presented by:
  • 2. About AIIM AIIM is the Global Community of Information Professionals We provide the education, research, and certification that information professionals need to manage and share information assets in an era of mobile, social, cloud, and big data. Learn more about AIIM at www.aiim.org In association with: Presented by:
  • 3. About AIIM www.aiim.org/research Visit AIIM’s video library at www.aiim.org/videos With more than 100 Research/Industry watch snapshots on all things Information Management www.aiim.org/training www.aiim.org/membersonly Check out your professional member benefits In association with: Presented by:
  • 4. Secure Your Success Become a Demonstrate your ability to address and manage today’s information challenges www.aiim.org/certification
  • 5. Follow AIIM on AIIM Community – @aiimcommunity John Mancini – @jmancini77 #aiim Atle Skjekkeland – @skjekkeland #aiimwebinar Laurence Hart – @piewords #infomgmt Peggy Winton – @pwwinton Bryant Duhon – @bduhon #ecm Jesse Wilkins – @jessewilkins Nick Inglis – @nickinglis Theresa Resek – @tmresek Beth Mayhew – @bethmayhew Thedra White – @thedrawhite In association with: Presented by:
  • 6. AIIM Presents: Your Journey into the Cloud: Optimize your Mission Critical Systems Host: Theresa Resek – Director, AIIM Webinars Shadrach White – Founder, cloudPWR Andrea Leggett – Global Product Marketing, EMC OnDemand, IIG In association with: Presented by:
  • 7. Many Choices… APPLICATIONS PLATFORM INFRASTRUCTURE In association with: Presented by:
  • 8. The Cloud Demystified DEPLOYMENT APPLICATIONS PLATFORMS PUBLIC PRIVATE HYBRID INFRASTRUCTURE In association with: Presented by:
  • 9. ECM in the Cloud Return on Investment DR | Reliability | Scalability | Mobility Management Overhead Patch | Security | Version Complexity UI | Dashboard | Integration In association with: Presented by:
  • 10. Security Physical Data Center 7x24x365 System Monitoring Change Control Governance In association with: Presented by:
  • 11. Data Privacy Personal Identifiable Information FERPA, HIPAA, PTI, FISMA, PIP Data Control Where is the Data? Who Has Access? Single Tenant v. Multi-Tenant Auditing & Tracking In association with: Presented by:
  • 12. Integration Legacy Applications v. Web Services How much data is being transmitted What kind of data? Data Encryption In association with: Presented by:
  • 13. Traditional | Cloud OLD WAY NEW WAY MONTHS HOURS Weeks Task Minutes Task 5 Acquire hardware 15 Log in, review, and approve work order 2 Rack and cable hardware 60 Monitor provisioning progress 2 Install operating systems 15 Sanity test provisioned environment 1 Install DBs 30 Configure secure network to customer site 1 Install application servers 1 Install batch scheduler 1 Install DEV servers 3 Record and test desktop installation 1 Push install desktop products to locked- down desktops 1 Install TEST servers 2 Install PROD servers 2 Configure backup, monitoring 3 Test PROD fault tolerance, backup, monitoring In association with: Presented by:
  • 14. Capture CENTRALIZED DISTRIBUTED  Scanning Workstation  Multi-function devices  Image Processing  Digital Snapshots  File Caching  Desktop Scanning  Scheduled Batch Processing  Print to PDF  Full Page | Thumbnails  File Browsing  Upload  RealTime – High Bandwidth  Scheduled – Low Bandwidth  Metering with checksum In association with: Presented by:
  • 15. Hybrid Connections Migration v. Bridge On Premise Apps Cloud 2 Cloud Security Models - SAML In association with: Presented by:
  • 16. Sharing | Managing  Sharing  Managing  Collaboration  Check in/out  Mobility  Version Control  Social  Records Management In association with: Presented by:
  • 17. Old School | New School LEGACY CLOUD  M/F Accounting  SalesForce, WorkDay, Intuit  Email Collaboration  GoogleApps, Box  DC Infrastructure  App Driven Solutions  CAPEX  OPEX  Driving Change:  Adapting Quickly:  Mobile BYOD  Web Services – Oauth |SAML  SaaS App Sprawl  Freemium Trials  Social Business  Born Social In association with: Presented by:
  • 18. Private Public Network Physical Infrastructure Application Storage Application Storage Application Private Private Database OS | Security Database OS | Security Database OS | Security Application Storage Storage Private OS | Security Database In association with: Presented by:
  • 19. Content Value for Cloud Offerings High Governance Regulated Value Controlled Full ECM Functionality Basic ECM Functionality Casual Minimal ECM Functionality Low Individual Organization Access Source: “Can Google Solve Your ECM Problems?” Forrester Research, Inc., July 28, 2011 In association with: Presented by:
  • 20. Enterprise Sync, Share & Collaboration in the Cloud • Business Requirements  Seamless File and Folder Sync  File Sharing and Collaboration  Enterprise Mobile Access IT Requirements  Administrator Control  Enterprise Security and Reliability  Easy Deployment and End-User Support In association with: Presented by:
  • 21. Full Enterprise Content Management • Business Requirements  Information Governance Controls (e.g. Records Management)  Content Lifecycle Management  Business Process Management Critical  Mobile Access • IT Requirements  Same As Above Plus…  Seamless Integration to ERP On-Premise System  System Auditability  Performance In association with: Presented by:
  • 22. IT USER LIMITATIONS DEMANDS ANYWHERE, HARDWARE COSTLY ANYTIME, ANY AND CUMBERSOME DEVICE ONLINE AND CONTROL CONTENT OFFLINE RISK ADVERSITY DATA SLOWS PRODUCTIVITY CONVERGENCE In association with: Presented by: 22
  • 23. Accelerate Achieve Reduce Application Flexible Computing Operational Deployment Time Capacity Overhead GETTING IT RIGHT IN THE CLOUD In association with: Presented by:
  • 24. Case Study • Solution - Invoice processing • We are ‘Accountants’ • Managing performance, not servers • Tighter SLA than we could put in place with our internal IT group • ‘Bought licenses?’ In association with: Presented by:
  • 25. 10 Critical Questions to Ask Your Cloud Provider 1. What is your data encryption philosophy and how, specifically, do you encrypt data? 2. How do you manage the encryption keys? 3. What certifications for data protection have you attained? 4. How much data replication is enough, and what level of data durability do you provide? 5. How much control do I retain over my data? 6. How do you ensure client (endpoint) security? 7. Can I leverage existing credentials and password policies and disable access immediately? 8. How do you isolate and safeguard my data from that of other clients? 9. How is activity in my account monitored and documented? 10. Can you continue to provide protection as my workloads evolve? In association with: Presented by:
  • 26. Next Steps 1. Contact Us: www.emc.com/ondemand 2. Need Help Understanding Your Potential TCO? 3. See how Lahey Clinic leverages EMC OnDemand for Patient Records 4. Talk to a Cloud broker In association with: Presented by:
  • 27. Thank You Shadrach White www.cloudPWR.com @shadrachwhite In association with: Presented by:
  • 29. Survey This survey will open in a new window. (or click here) Tell us how we did today, and offer suggestions for topics of future events. In association with: Presented by:
  • 30. Upcoming Webinars June 13th Big Data, Big Hype: Why the Business Should Care June 21st Responding to and Capitalizing on the Latest Trends in Data Capture Register Today at www.aiim.org/webinars Or check out our Webinar Archive at www.aiim.org/WebinarArchive In association with: Presented by:

Editor's Notes

  1. With so many choices its hard to know where to begin, fortunately there is a place for everyone to start whether its just getting started with file sharing, mitigating dev/test expenses by leveraging the limitless compute resources available for pennies on the dollar or deploying a full fledge suite of enterprise class customer relationship management and sales automation, Human Capital Mgt. and even complete ERP solutions. The cloud has you covered with many options for any size organization.For many the challenge is how to absorb all these options and fear of choosing the wrong provider or solution. Today we will examine what the cloud has to offer in the realm of content management and how far you can go. You might be surprised at just how capable Cloud Content Management has become and how far it will go in the next few years.
  2. Today you can operate all your compute and application resources at all levels.IaaS - You can spin up core infrastructure in the cloud in minutes and augment your traditional OnPremise compute needs.PaaS – You can build complete web applications using software tools and resources to build out whatever your Web2.0 dream team can think up in the environment of your choice – opensource, java, .NET – You can create rich internet applications and use the latest HTML5, JavaScript, WPF & Silverlight development tools. Take it one step further and leverage Google AppEngine or SalesForce and you can take advantage of core platform AppStores and community development resources to build out enterprise capable business apps without worrying about scale, security or the hardware costs of multiple environments for test/dev/prodSaaS – If you have a limited IT staff and want to start using the cloud right now to make your business more Mobile, Social or leverage Localization there are thousands of options that take minutes to deploy at no upfront cost. In fact if you wanted to start a new business today you could have email, file storage, office documents, billing, time tracking, CRM a new website and social feeds all enabled before the end of the day. Well maybe a couple of days but trust me it can be done.Check out Syncplicity, Concur, GoogleApps, Freshbooks, MavenLink, Box, QBO. You could even spin up a full fledged content management and collaboration platform like SharePoint Server Farm using CloudShare in under 15min and be testing your latest custom webparts at scale.Today we are going to focus on content management and how the cloud is ECM ready.
  3. Key ROI considerations include the ability to leverage common facility and DC Operations for improved and more predictable DR and ReliabilityThe ability to scale your Mission Critical Content Management applications on the flyGive your users the ability to securely access content on mobile devices that support two factor authentication for apps and encryption for data security at RestReduce the complexity of the User Interface and the management of the applications with common DashboardsLeverage integration options using current technologies for Web Services integration like REST / SOAP / WSDL and content management integration standards like CMIS
  4. When evaluating a public or even a private cloud infrastructure that is hosted by a third party you need to clearly understand and incorporate your requirements into a service level agreement and contract that includes an understanding of how the facility is secured.Does the provider monitor the physical structure internally and externally 7x24x365 with security surveillance. How long are the recording archived and when and how are customers alerted if a there is a breach.How is change control managed for the facility. To often we forget to ask how non-server related tasks like environment control upgrades, testing or other basic utility upgrades or maintenance are handled. This should happen in a uniform manner and incorporate communication protocols for notifying customers of a potential or planned outage.Governance – what is the chain of command and who is responsible when things go bad, what is the escalation protocol and who is responsible for key performance monitoring and delivery.
  5. Data Privacy rules and regulations vary depending on the country you are located in and specific industry laws and regulations that govern your organization.Considerations need to be made for who has access to the data.Does the service provider perform regular background checks and limit the number of support personal that have access to data in a public or hosted private cloud environment. How is access to the data audited and where is the data stored. Consider all your virtualized systems, including production, test, backup and any cached data.Are you running a single or multi-tenant architecture and at what level are resources shared, eg. File Services, Database, Caching, etc.
  6. Integration options can vary widely depending on the platforms and applications that need to share or leverage information.Options for integrating from the cloud back to legacy applications or hardware may be limited to older technologies like ActiveX, VBScript, HLLAPI or direct ODBC connections to secondary databases. On the other hand Integrating from legacy applications to a cloud based repository can be as simple as a URL string with authentication and search parameters embedded in the link.Integration in a Web2.0 world provides much more flexibility and single line of code integration options like URL + parameters can provide secure accessing to a content repository for sharing or collaborating on content in a single click. By using HTTPS, SOAP and REST architectures you can leverage a common web services integration model that can speed integration and provide a loosely coupled yet secure connection that doesn’t require months of programming and compiled integration code.Key considerations when integrating your traditional applications with a cloud solution are what kind of data are your integrating or sharing, do you need to consider data encryption in transit and/or at rest. You also have to assume that when you share content it will be accessed on a mobile device. In an enterprise it is smart to consider a mobile device management solutions and there are several options for MDM including AirWatch, FiberLink, MobileIron, Zenprise and Notify Technologies to name a few of the visionaries in the space.
  7. Are you using a calendar or a stopwatch to plan your next rollout. While the comparison may be a little extreme it is none the less apropos when comparing the striking differences in fundamental planning and rollout.One way to look at how this impacts the consumers in the buy-sell cycle is the ability to actually test drive the solution or app before you upgrade or pay for the full license or subscription. This was unheard of just a few years ago and have upset the established software monarchy. While cloud content management is still nascent it offers a quick spin up with little revenue risk and tangible ROI when applied to the right business groups.And there in lies the tipping point, you aren’t going to have AP clerks processing invoices from their mobile devices using a cloud based workflow and repository but you certainly want to enable the Sales and Marketing departments to access, submit and share content with external third parties and internal peers. Most organizations are caught off guard when they realize that the Product Mgrs., Sales Reps, Marketing Staff and even Support staff are adopting and using apps like DropBox and EverNote w/o IT Approval or support.These companies are quickly realizing that they need to adopt a strategy and enterprise grade solutions to address this user need. Those that do are looking at products like Syncplicity, Egnyte and Box for their security, integration API’s and reporting features.
  8. The scan workstation requires that a physical PC, Scanner and OS Drivers be installedThere are web-based interfaces that support scanning in production modes, to accomplish this file caching and bandwidth considerations are considered and configuration options are provided for low and high bandwidth situations. Many of these solutions have incorporated advanced image processing technologies. Full image view is supported and generation of thumbnails for document browsing provide the performance users need when accessing larger document sets.Many transactional capture models have been successful adopted that are eliminating the need to provide centralized capture for specific use cases like Expense reports and Trailing documents. Most of these are leveraging MFD and Mobile devices to capture documents at the point of origin in full scanning mode or digital snapshots.
  9. There are so many options when considering how to adopt or migrate to a cloud based repository. Our Webinar sponsor EMC has developed a variety of options that can support full migration or ‘bridging’ between OnPremise and Cloud based repositories. Being at the foundational layer of the cloud by leading the way with virtualization has given them a unique perspective and a running start on developing the V-Cube Architecture. It is important to understand how you will integrate your existing desktop and local network applications with cloud based content management or file sharing solutions. You may want to look at tools like AppConnector from Karora or Dell BoomiMost organizations haven’t considered what type of security model they will need when they begin adopting multiple cloud based solutions. Authentication and security keys for userID / Passwords could pose a real challenge for users. Tools like Intel’s recently announce SSO and competitor OKTA provide single sign-on solutions that leverage SAML (Security Assertion Markup Language) an XML based open standard to create a library of cloud based apps with one common sign-on credential for passing user credentials between security domains.A great example of a Hybrid content management approach is the use of a product like LibraryCard from LivingAnalytics. This can implemented to connected a SharePoint instance that sits behind the firewall to an Enterprise Box account to provide secure real-time syncing of documents and content stored in a SharePoint library. That gives you OnPremise control of your content and external Cloud file sharing using Box, the best of two worlds.
  10. There is a lot of hype around cloud content management and a lot of confusion. You need to break down the differences between ‘Sharing’ & ‘Managing’Many of the File Sharing applications don’t offer advanced features normally found in traditional content management solutions. But they are so easy to use and are adopted pervasively by users that IT departments are having a hard time balancing users needs with corporate governance requirements. The file sharing vendors are gaining however and adding administrative features and enhancements that are helping to drive corporate adoption.There are some solutions that have been around for several years and offer more traditional Content Management features. Some that come to mind are NetDocuments, SpringCM and Ricoh Document Mall.More now than ever a whole new breed of Content Management solutions are being launched in the cloud from industry stalwarts and OpenSource vendors including OpenText Tempo, Alresco Cloud, EMC OnDemand to name a few.
  11. Single and Multi Tenant clouds can share core incoming data center network, cooling, power and some DR resources like generators and UPSThe overall costs can vary drastically depending on what specification & requirements you need.Private Clouds can virtualize all resources in a container that segments all data, security and storage. Private virtualization does not always mean that your virtual server is not sharing physical resources with other private clouds. This is a distinction that you may not have thought about but is a driving factor in the reason why cloud computing is more cost effective, due to the ability to share physical compute and storage resources to leverage cost savings and minimize under or over compute resource usage.Multi Tenant Public Cloud solutions share compute, storage and application resources and secure data using only authentication userID / Password. There are many permutations of this and its important to understand the underlying fabric that the cloud service provider is using. In my opinion companies like FaceBook and Google have led the way in terms of next generation data center security by controlling every aspect of the data center including building their own Servers from the ground up to support maximum scale redundancy and at the same time increase efficiency while reducing hackability by controlling a customized Linux OS Kernel.
  12. I would talk about the obvious fact of cloud adoption, I don’t think we need to recite statistics about businesses moving to the cloud – everyone is but what’s not so apparent is trying figure out the right cloud solution that maps to content mgmt business problems – its not a one size fits all.And this is where many organizations are finding their footing. I stated earlier that you probably wouldn’t have your AP clerks processing invoices in the cloud, however you may just outsource the whole enchilada to a company like Concur and then integrate your ERP solution using a simplified URL + parameters approach. Let them do the sorting, scanning and OCR, then you simply download a register and begin doing the matching in the ERP system. When you need to look at an invoice you click the URL integration link and pop an image in a secure browser session. Even the SMB market can do this type of processing and take it one step further by using a product like QBO. Connect your bank accounts and credit card accounts to QBO, download your latest register and reconcile your statements all in the cloud.Casual usage is usually cause and effect, there is a need a user downloads and app fills the need and the effect is IT needs to figure out a way to secure the usage or adopt a solution that provides the enterprise level features we have already talked about.As you move outward you find the need to have a more controlled, regulated and governed approach. This too can be accomplished and is more readily available than you might think. I encourage everyone to look at what companies like EMC, Alfresco, NetDocuments and SpringCM are doing in this area. If you’re a SharePointer you can consider spinning everything up in Azure and using Office365. You will probably want to add some third party software to SharePoint for any real ECM features, consider KnowledgeLake for document imaging, K2 for workflow and Collabware for records management.To Answer the Forrester Research question - As an SMB business I use Google and Box with a Canon DR C-125 as my ECM solution and it works really well. It took a while to get over the traditional field level boolean search and results process I was used to with traditional ECM solutions. But eventually I accepted that the google style search box and labels worked and I was able to find the documents I needed fast.
  13. Enterprise Marketing Organization needed to share files inside and outside of the organization.Business Requirements:Share any folder on you computer with users or groupsHaving the ability to sync with Google Docs, SharePoint, and SalesForce.Leverage existing file folder structureNative Apps for iPad, iPhone and Android devices and tabletsIT Requirements:Admin ControlSingle Sign-On with SAML (AD/LDAP) and OpenID (Google Apps)2-Factor authentication optionAll user and Admin actions authorized and validated by a single policy engineSecurity and ReliabilityEach file is encrypted with its own encryption keyAll data in transit and at rest is encrypted with AES-256Each stored in a different data center, physical separation of keys and data, never cached. Keys and encrypted data joined only when needed in an auditable and tracked mannerEasy Deployment and End User SupportSet up user accounts individually or in batches Auto-configure user sync options (including default folders to sync)First sync and sharing solution to support group permissions and sharing
  14. Major Transportation Carrier example – full ECM in the cloudBusiness case – Aircraft training and manufacturing protocolsTransition to Andrea Legget – Global Product Marketing EMC
  15. For any technology solution, IT organizations need to balance the needs of the business with the needs of users. On the business side, they want to improve productivity while reducing capital and operating expense. Ensure adherence to compliance and information governance mandates. Penalties for non-compliance can be severe. And they want to support rapid innovation that speeds the introduction of new products and services. These are all very broad strategic objectives. But for the user the devil is in the details. To make the business successful, users need to find the most up to date information on demand. No matter where it is or where they are. To be productive, they can’t be worrying about retention periods, metadata, or compliance and governance. These things are important to the organization but a nuisance to those tasked with the work of the organization. They need zero-effort compliance. They need intuitive, easy to use solutions that help them work—not make them work. And they want access from… whatever they want access from. Desktop, smart phone, tablet, laptop. Without having to think about it., This is the IT balancing act.
  16. Talk about the enterprise opportunities – What we are seeingSmall, Medium and deptsLarge enerprisesDrivers moving folks to the cloud: Agility, Elastic Computing (seasonality changes); reduce maintenance spend by just 10% would help me fund new products – but ideally we should look to reduce operational spend by at least 20% over a 5 yr period on average – in some cases it could be higher.In this slide I would like to set the stage for talking about the value for customers who have already installed ECM systems and are looking to move legacy apps to the cloud or migrate.Next talk about net new projects and the perceived benefits.Summary: Cost vs agility conversation
  17. Mandate to move to the cloud / no ROI/TCO calculations involvedDocument capture in the cloudOne less item to be concerned about, we are ‘Accountants’Managing performance, not serversTighter SLA than we could put in place with our internal IT group ‘Bought licenses?’ Yes, we bought licenses; helps mitigate some of the risks of the cloudNew ChallengesProject Timing/ScheduleEarly SLALTF had a few needs. Guaranteed uptimeDefined calculationReportingPenaltiesSAS70 Type II, SSAE 16Web Service CallsCaptiva team learning to make web service calls to Workday’s public web services.Workday, Not Your Grandfather’s ERPImplications To Overall Design, VPN, Security, & Integration/Relay Server
  18. Provide pragmatic advise – Rate your ECM functionality first – rate IT security demands with business demandsThen rate the cloud aspectsConclusionThe advent of the cloud opens up new possibilities—and new security vulnerabilities—for businesses. The object is to maximize the advantages and opportunities while minimizing the risks and the temptations of “backdoor IT.” This paper has presented a framework for considering the issues, along with specific questions for evaluating vendors.But there is one additional question that every business leader should contemplate before making the move to the cloud model, and it’s an issue about which you, as a decision maker, must formulate your own opinion. What is the best approach to protecting and securing data in today’s “connected era?”Should your business attempt to protect via restriction—in other words prohibiting everything that could present an incremental security risk? Or should it protect by empowering users, finding new ways to secure the activities you know they will engage in?There is no right answer, but your opinion will shape your perception of the promise of the cloud—and directly impact the results you expect and receive from a cloud service provider.
  19. Add a call out for Shad about leveraging a cloud broker to help you find the right ECM solution in the cloud