SlideShare uma empresa Scribd logo
1 de 49
Baixar para ler offline
Larry Ryan
The implications of six key technology trends in financial service
institutions


© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The implications of six
key technology
trends in financial
service institutions
    i i tit ti

Larry Ryan
June 7, 2012
     7
© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Increasing pressure on financial firms
              Customer experience:
    agility to retain and grow market share

             Shareholder Demand:
      cost control & operational efficiency

            Increasing regulatory scrutiny:
            I      i         l t       ti
             greater levels of transparency

            Sop st c te cyber tt c s
            Sophisticated cybe attacks:
         secure infrastructure, data & apps

            Financial System Soundness:
           Capital, quality, liquidity, & risk

3   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Increasing pressure on financial firms
                                                                                                                                       Top Bank Efficiency Raio and ROE
              Customer experience:                                                                   100


    agility to retain and grow market share
                                                                                                      80



             Shareholder Demand:
      cost control & operational efficiency                                                           60




            Increasing regulatory scrutiny:
            I      i         l t       ti                                                             40




             greater levels of transparency
                                                                                                      20




            Sop st c te cyber tt c s
            Sophisticated cybe attacks:
                                                                                                       0

         secure infrastructure, data & apps
                                                                                                     ‐20

            Financial System Soundness:
           Capital, quality, liquidity, & risk                                                                                                   Efficiency Ratio   ROE   Source: www.bankregdata.com (2011Q4 Data)




4   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Technologies impacting financial services
    Focus on customer experience and agility
        to retain and grow market share             Cloud                                     • Market place for Shared agile services


         Shareholder Demand for cost and      S    it
                                              Security                                        • Pervasive end-to-end
              operational efficiency

                               g
                           Big Data
      Increasing regulatory scrutiny requires
                                                                                              • Derive meaning from the digital world

              greater levels of transparency
                                      Social Media                                            • The digital culture
         Sophisticated cyber attacks require
           stronger secure infrastructure
                                               Mobility                                       • Anywhere computing: markets, apps, payments

     Improve soundness by increasing capital
             and improving liquidity
               di      i li idit                    BYOD                                      • Consumerization of IT

5   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The digital life
2020 4B people online, 31B connected d i
2020:       l    li              t d devices, 25M apps




                                       Consumer                                                                                            CHANNEL SERVICES
                                                                                                                                                  CHANNELS

                                                                                                                       USER SECURITY SERVICES (SSO, Authorization and Access Control)
                                                                                                                                            CHANNEL INTEGRATION
                                                                                                                                                                                                                Professional
                                                                                                                        SERVICE SECURITY (Authentication, Authorization and Access Control)

                                                                                                                                           BUSINESS SERVICES
                                                                                                                                                                           CORE BANKING OPERATIONS
                                                                                                                                                                                                 WEALTH
                                                                                                                                                                            CORPORATE
                                                                                                                                                                                               MANAGEMENT
                                                                                                                                                 INFORMATION
                                                                                                           EXTERNAL       ENTERPRISE
                                                                                                                                                MANAGEMENT &
                                                                                                          INTERFACES       SYSTEMS                                             RETAIL            TRADING
                                                                                                                                                DATA SERVICES
                                                                                                                                                                         RISK MANAGEMENT      TREASURY & CASH
                                                                                                                                                                           & COMPLIANCE        MANAGEMENT




                                                                                                                       PLATFORM SECURITY (Authentication, Authorization and Access Control)


                                                                                                                                                 PLATFORMS

                                                                                                                                           INFRASTUCTURE SECURITY

                                                                                                                        SERVICE SECURITY (Authentication, Authorisation and Access Control)
                                                                                                                                            IT INFRASTRUCURE


                                                                                                                                  HYBRID DELIVERY CLOUD




                                             Mobile                                                                                                                                                             Datacenter


6   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

    Source: IDC, ICT Outlook: Recovering Into a New World, #DR2010 GS2 JG, March 2010
The digital life: data
2020 4B people online, 31B connected d i
2020:       l    li              t d devices, 25M apps

                                              Transactions
                                                Payments                                                           i l         i
                                                                                                               Social Interactions
                                                 Photos                                                              Personal
                                             Movies/Videos                                                        Exhaust Data
                                                  Music                                                                Maps
                                                                                                                       M
                                                  Books                                                          Scientific Data
                                                                                                                 Life Footprint
                                       Consumer Magazines                                                                                                                                                       Professional
                                                                                                                    Biological
                                                                                                                                           CHANNEL SERVICES
                                                                                                                                                  CHANNELS




                                              Newspapers
                                                                                                                       USER SECURITY SERVICES (SSO, Authorization and Access Control)
                                                                                                                                            CHANNEL INTEGRATION

                                                                                                                        SERVICE SECURITY (Authentication, Authorization and Access Control)

                                                                                                                                           BUSINESS SERVICES
                                                                                                                                                                           CORE BANKING OPERATIONS
                                                                                                                                                                                                 WEALTH
                                                                                                                                                                            CORPORATE
                                                                                                                                                                                               MANAGEMENT




                                                                                                                 Environmental
                                                                                                                                                 INFORMATION
                                                                                                           EXTERNAL       ENTERPRISE
                                                                                                                                                MANAGEMENT &
                                                                                                          INTERFACES       SYSTEMS                                             RETAIL            TRADING
                                                                                                                                                DATA SERVICES




                                                   Art
                                                                                                                                                                         RISK MANAGEMENT      TREASURY & CASH
                                                                                                                                                                           & COMPLIANCE        MANAGEMENT




                                                                                                                       PLATFORM SECURITY (Authentication, Authorization and Access Control)


                                                                                                                                                 PLATFORMS

                                                                                                                                           INFRASTUCTURE SECURITY

                                                                                                                        SERVICE SECURITY (Authentication, Authorisation and Access Control)
                                                                                                                                            IT INFRASTRUCURE


                                                                                                                                  HYBRID DELIVERY CLOUD




                                             Public Records
                                             Mobile                                                                                                                                                             Datacenter


7   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

    Source: IDC, ICT Outlook: Recovering Into a New World, #DR2010 GS2 JG, March 2010
01 Cloud




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Cloud computing types for financial service firms
                                                                                                                    Core attributes
                                                                                                                        Elastic
                                                                                                                        Pay-per-
                                                                                                                        Pay-per-use                       Banker
                                                                                                                        Networked
                                                                                                                        Shared
                              Trusted external                                                                          On-
                                                                                                                        On-demand
                              service providers

                                                                                                                                       Markets/Communities
                                                                                                                                       Markets/Communities

                                                                                                                                       Software Services (SaaS)
                                                                                                                                                          SaaS)

                                                                                                                                       Platform Services (PaaS)
                                                                                                                                                         (PaaS)

                                                                                                                                       Infrastructure Services (IaaS)
                                                                                                                                                               (IaaS)



                   How is it used?                                                                                                           What is delivered?
9   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The financial service marketplace evolves
                                                                                                     NASDAQ
                                                                                                   Market Replay




                                                                        Expanding into
                                                                        cloud services


                                                                           Attacking legacy
                                                                           business models
                                                                           b i         d l




Legacy Services
10   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
                                                                                                                                        “Cloud” Services
Value of Cloud in FSI
                                                                              Top challenges faced by banks
                                  Manage recovery                                                                                               Grow customer base
                           Handle host of new & changed regulations                                                                              Absorb acquisitions



                                                                             Three key drivers for Cloud adoption
                          Cost reduction                                                           Speed to deliver                                         Agility
       Ovverall cost reduction through –                                          With technology innovation becoming more of an        Banks looking at Agility specifically with reference
       •    SaaS - Avoidance of infrastructure cost                               enabler of new banking products and channel           to IaaS
       •    PaaS - Quicker development cycles                                     innovations as well as increased regulatory           Large-tier banks &"megabanks" have extremely
                                                                                  changes expected, a bank's ability to quickly adapt   large sets of data and very high transaction
       •    IaaS - Increasing utilization of infrastructure
            components reducing total infrastructure needs
                                                                                  to the changing landscape or become a market          volumes in solution areas that are load-intensive
            overall                                                               innovator by leveraging technology is a distinct
                                                                                              y      g g           gy                   and read-intensive such as risk management,
                                                                                                                                            read intensive,              management
                                                                                  competitive advantage                                 trading algorithms, pricing, quantitative analysis
       Enable banks to increase control over IT
       infrastructure with regard to fixed vs. variable                           Cloud computing can offer faster initial              and payments processing
       costs and opex vs. capex                                                   implementations by eliminating the need for           Megabanks are adopting or considering private
                                                                                  lengthy hardware acquisition cycles or capital        cloud (internal to bank) IaaS to reduce overall
       Flexibility and control over costs to react to what is
                                                                                  investment project reviews                            infrastructure cost through consolidation of
       becoming an increasingly volatile economic
       condition
           diti                                                                                                                         servers,
                                                                                                                                        servers data centers and higher utilization of their
                                                                                                                                        server footprint
     Source: Market Insight: The Impact of Cloud Computing on Vendors in Banking – Gartner June 2010
11   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key take-aways

1. Cloud is an emerging disruptive force; a strategic transformation and
   journey
2. Cloud decreases time to market, increases agility, reduces cost, and enables
   new business models
3.
3 Assess what assets can move to cloud and start with an internal IaaS as a
   foundation towards a service ecosystem
4. HP recommends a hybrid delivery framework to integrate all sources and
   automate
      t    t




12   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
02 Security




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Top 5 global risks in terms of likelihood




                                                                                                  Global Risks 2012 Seventh Edition, World Economic Forum,
                                                                                                  http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2012.pdf
14
14   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The threat

• SWIFT: The operator of the world’s largest messaging network for financial
transactions said its communications systems are facing record levels of aggression
                                        y              g                   gg
from cyber hackers and attackers.*
• 38% of financial services respondents say they have been hit by cyber crime of one
sort or another. **
• Ponemon Institute found that >1 successful attack/week/company (44%
increase).***



                                                                                         * http://www.securitiestechnologymonitor.com/news/swift-terrorism-at-new-peak-shah-30120-1.html?zkPrintable=true
                                                                                              p //                       gy              /     /                       p
                                                                                         ** Cybercrime: protecting against the growing threat, Global Economic Crime Survey, Nov 2011, PWC.
                                                                                         *** Second Annual Cost of Cyber Crime Study, August 2011, Ponemon Institue.



15   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Example breaches

•          Global Banks
•          Community Bank
•          Bank Outsourcer
•          Exchange
•          Payment Networks



16   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP’s framework
                                                                        Information security management
             Security                                                Security
                                                                                             Compliance and                Threat & Risk       Security           Training and
             Supplier                 Policy and Risk              Performance
                                                                                                 Audit                     Management        Architecture          Awareness
           Management                                              Management


                                                                                      Security operations
                Risk                  Accreditation &               Identity and
                                                                                               Monitoring and               Universal Log      Incident         Security Change
          Assessment and                Acceptance                     Access
                                                                                                 Alerting                   Management       Management             Control
             Mitigation                   Testing                   Management


                     Data center                                         Network                                         Application                        End-point

              Data & Content Security                            Securing Data in Motion                             Securing Data in Use              Securing Data at Rest

                Business Recovery &
                                                                            IDS/IPS                                   Application Delivery                  Mobile Security
                 Continuity Services

                 Data C
                 D    Center S
                             Security
                                  i                                  Network S
                                                                     N     k Security
                                                                                  i                                   Application Security
                                                                                                                      A li i S         i              A t E d i tS         it
                                                                                                                                                      Asset, Endpoint Security



17   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key takeaways

• Security and risk management alignment
• Security and IT operations integration
• Situational awareness / rapid response
• Actively and continuously monitor and evolve




18   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
03 Big Data management




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Definition
                               Social networking
Uploading video                  In Germany               Researching in
   in the US                                                  China
                                                                                       Of the 6.9 billion people in the world,
                                               Chatting in India
                                                                                             only 2.3 billion are online.
                  Blogging in Brazil




 2020
 25 million apps                                                                                                                                               http://www.internetworldstats.com/stats.htm



 4 billion people online
 31 billion connected devices




                                                                                                                                          Speed
 450 billion online interactions, per day
 1.3 trillion tags/sensors                                                                                                                        Complexity

 50 t illi gigabytes of d t created
    trillion i b t    f data    t d
 20    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Big Data valuable to financial services




21   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
                                                                                                                “Big Data: The next frontier for innovation, competition, and Productivity, McKinsey Global
                                                                                                                Institute, Presented at SIBOS, September 20, 2011
What are banks doing?

•Track behaviour
                                                                                                                                        "Our top business
•Adjust risk exposure
 Adjust                                                                                                                            challenges are optimizing
•Correlate with transaction                                                                                                         customer relationships,
                                                                                                                                 optimizing financial functions,
•Understand
                                                                                                                                   Reducing business risk and
•Predict and influence
 P di t d i fl                                                                                                                  ensuring regulatory compliance.
                                                                                                                                 Our prioritization is around our
                                                                                                                                       customer and then
                                                                                                                                        revenue / profits "
                                                                                                                                                  profits.
                                                                                                                                          – C Level Executive




22   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Benefits for banks

•Customer behaviour
•Multichannel Customer Interaction
 Multichannel
•Product Innovation
•Risk management and compliance
•Strategy and brand marketing
 St t       db d        k ti
•Archiving & eDiscovery
•Information management




23   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP’s view: Big Data – The new normal

     Consumer generated
                                                                                                                    Listen
     Unstructured                                                                                                   Integrate all
                                                                                                                    valuable

     Real time – created and assessed
                                                                                                                    Sources of                         Understand
                                                                                                                    customer data                      Create an integrated
                                                                                                                                                                     g
                   – From “empower the knowledge worker”                                                                                               analytic framework to
                     to “mobilize the consumer”                                                                                                        enable Analytics for the
                                                                                                                                                       Masses
                   – From “time to information” to “time
                     to activity”
                        activity                                                                                                        Engage
                                                                                                                                        Embed the analytical
                   – From “implicit understanding of consumer                                                                           insights closer the point-
                     sentiment” to “explicit understanding”                                                                             of-interaction with the
                                                                                                                                        customer




24   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key takeaways

New architecture
Creates transparency
Enables experimentation and analysis
Value creation and business models
Law f big
L of bi numbersb
Data Policy




25   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
04 Social media




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Social media




27
27   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Social networks demographics
                                                                             Population/Registered Users
                                        1,600,000,000

                                        1,400,000,000
                                        1 400 000 000

                                        1,200,000,000

                                        1,000,000,000

                                          800,000,000

                                          600,000,000

                                          400,000,000

                                          200,000,000

                                                          0




28
28   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Corporates embracing social media




29 © Copyright 2012 Hewlett-Packard Development Company, L.P.
   The information contained herein is subject to change without notice.   Source: “How social technologies are extending the organization”, McKinsey Quarterly, November, 2011,
                                                                           http://www.mckinseyquarterly.com/High_Tech/Strategy_Analysis/How_social_technologies_are_extending_the_organiz
                                                                           ation_2888
Examples in Financial Services




30 © Copyright 2012 Hewlett-Packard Development Company, L.P.
   The information contained herein is subject to change without notice.
Virtual currencies & loyalty programs




                                                                                                                         Frequent Flyer
                                                                                                                           Programs



31
31   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key takeaways
• Reach customers
• Manage brand
• Drive campaigns
• Learn from customers
• Govern usage appropriately




32
32   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
05 Mobility




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Mobility becomes part of life for everyone
... A d th scale i enormous
    And the   l is
•Instant connections, communication & collaboration is changing people’s behavior




•Access to on line services is part of daily activity – Mobility First is quickly becoming the
business top priority

34   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Online and mobile banking transactions continue to
     increase rapidly
      US Self-Service Banking Transactions by Channel (In Billions)

     100              ATM
                      (CAGR = 0.8%)
      80              Online
                      (CAGR = 20.1%)
                              20 1%)
      60              Mobile                                                                                                                         14.0
                                                                                                                        3.0                    9.4
                      (CAGR = 84.8%)                                                                     1.2                             5.6
      40
                                                                                               35.0
                                                                           23.3 26.8 30.0 33.3
      20         5.6 7.3 9.1                                11.8 15.3 18.6
                 14.0 14.2 14.3 14.4 14.5 14.6 14.6 14.7 14.8 15.0 15.1
       0
                2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
                                                                                                                  Source:     TowerGroup
 35   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.


35
US branch transactions are declining (2010–14P)

          Transactions (in billions)
      15                 14.70
                         14 70

                                                         14.11
      14                                                                                13.69
                                                                                        13 69
                                                                                                                        13.28
      13                                                                                                                                12.88



      12
                          2010                            2011                           2012                            2013           2014
                                                                                     Source: TowerGroup
36   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mobile Payments Landscape
                                     Physical Location / POS                                            Online                                                Mobile

P2P Transfers
(Domestic and
International)




Payments to
Merchants




37   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.   * Updated version of table from Edgar, Dunn & Company


     Slide
Example Mobile Applications




38   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.


     38
Hp Enterprise Mobility Services framework
        Mobility Apps Platform                                                                                                                  Unified Communication
•    App Virtualization                                                                                                                   •   Voice Transformation
•    Desktop Virtualization                                                                                                               •   Virtual Workplace
•    Mobile Apps – Native, Web                                                                                                            •   Unified Messaging




    Mobility Device Management                                                                                                                     Mobility Protection
                                                                                                                                          •   Network Protection
•    Infrastructure Mgt                                                                                                                   •   Cloud Protection
•    Mobile Device Mgmt                                                                                                                   •   Mobile Data Protection
                                                                                                           PROSUMER
                                                                                                                                          •   Mobile Access Protection




               Mobile Data                                                                                                                         Mobile Applications
                                                                                                                                          •   Performance Engineering
•    Storage Consulting
                                                                                                                                          •   App Transformation
•    Mobile Data Trans.
                                                                                                                                          •   Mobile App Management
•    Enterprise Data Sharing
                                                                                                                                          •   Windows 7/8 Migration
•    Analytics/BI



                 GRC - MoC                                                                                                                      Enterprise Connectivity
                                                                                                                                          •   Network Transformation
•    Education Services (UC)                                                                                                              •   Voice over Wi-Fi
•    Education Services (Mobility)                                                                                                        •   Fixed M bil C
                                                                                                                                              Fi d Mobile Convergence
•    Mobility Policies (BYOD)                                                                          Collaboration                      •   Cloud Services Integration

                                                                                          •Search/ Information
                                                                                          •Document Management
                                                                                        • Social Collaboration
       © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
39
                                                                                        • Mobile Process Enablement
Key takeaways
• Handling confidential information on the remote device if lost or stolen.
–Remove wipe
–Encryption
     yp
• When an employee leaves company
–Remove Wipe
–Document tracking
                 g
• Document leaking into wrong hands
• Anti-virus/anti-malware software
• Limiting access to corporate network
• Policy and Governance
– Clouds



40
40   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
06 BYOD




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Bring Your Own Device
Balancing choice while protecting corporate assets

                                                                                                                   Benefits
• Employees and customers use their                                                                                •Shift cost to users
own device                                                                                                         •Increasing employee satisfaction
                                                                                                                   •Accelerate technology adoption
• How to:
                                                                                                                   Concerns
• Embrace                                                                                                          •Acceptable Use Policy
                                                                                                                    Acceptable
                                                                                                                   • Minimum security policy
• Govern usage
                                                                                                                   • Company mandated security tools
• Protect assets and data                                                                                          •Compliance and data ownership
                                                                                                                   •Retrieving company data on separation
• Path towards pervasive computing                                                                                 Risks
                                                                                                                    i k
                                                                                                                   •Unencrypted information
                                                                                                                   •Consumer Applications
                                                                                                                   •Weak passwords and security



42   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key problems for IT
Management of different platforms
                                                                                                                        2007            2010   2013
• From a single client OS to multiple OS
• Different devices, different form
  factors, different update and life
  cycles
                                                                                                                                                      ?
• How to manage migration of existing
  platforms
• Wh t about current desktop /Laptop
  What b t         t d kt /L t
  strategy
Own vs BYOD

43   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key issues for IT
     Security and risk management – Is it safe?

Device Overload
    Ever-Changing Types,
     OSs and Security                                   App Threats
                                                             h
     Features                                           Insecure Access to
                                                         Corporate Apps                                Network Threats
                                                                                                          Usage of Many Secure          Data Threats
                                                        Lack of Reliability
                                                            k f l bl                                       and Unsecure Networks            Sensitive Data Leakage
                                                                                                          Lack of Mobile Network           Device Lost or Employee
                                                                                                           Visibility                        Leaves
     User Th t
     U    Threats                                                                                         Corporate Network
                      Acting in Non-                                                                      Vulnerability to Mobile
                       Compliant /                                                                         Threats
                       Wrongful Ways


44    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
BYOD considerations
• Trust Model
• Remediation options
• Tiered policy
• User experience vs. security exposure tradeoff
• Corporate data protection (in transit, on device)
• Device control
• Acceptable use policy (cloud services)
• Liability assessment
     b l ty ssess e t
• Education




45
45   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Summary




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
Key takeaways for financial institutions
• Enterprise and customers always online
• Everything digital
• Service based economy
  Service-based
• Data in motion architectures
• Marketplace growth
• Agility & Speed to Market
• GRC: Governance, Risk, and Compliance




47
47   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Download Now


                                                                                                                             Get the Mobile App


                                                                                                                         Download content from this session
                                                                                                                         with the free Mobile App
                                                                                                                                              App.


                                                                                                                         Text the word “Discover” to 474747
                                                                                                                                        Discover
                                                                                                                         or: m.hp.com/events



48   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you




© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.

Mais conteúdo relacionado

Mais procurados

Brocent Profile V3.1 English Linkedin
Brocent  Profile V3.1   English   LinkedinBrocent  Profile V3.1   English   Linkedin
Brocent Profile V3.1 English Linkedinjackzhangs
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Technology
 
Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...Global Business Events
 
Pradheep Sampath On Scorecards, Measurements, Kp Is Ahma Hardlines Technolo...
Pradheep Sampath On Scorecards, Measurements, Kp Is   Ahma Hardlines Technolo...Pradheep Sampath On Scorecards, Measurements, Kp Is   Ahma Hardlines Technolo...
Pradheep Sampath On Scorecards, Measurements, Kp Is Ahma Hardlines Technolo...GXS
 
Mmu marketing mobile_money
Mmu marketing mobile_moneyMmu marketing mobile_money
Mmu marketing mobile_moneyCamilo Tellez
 
M payments mobile_business_20120327
M payments mobile_business_20120327M payments mobile_business_20120327
M payments mobile_business_20120327EY Belgium
 
US FICAM Overview
US FICAM OverviewUS FICAM Overview
US FICAM OverviewUS FICAM
 
Webinar On-Demand: The Power of Analytics to Drive Loyalty
Webinar On-Demand: The Power of Analytics to Drive LoyaltyWebinar On-Demand: The Power of Analytics to Drive Loyalty
Webinar On-Demand: The Power of Analytics to Drive LoyaltyTIBCO Loyalty Lab
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditBob Rhubart
 
Optism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference Presentation
Optism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference PresentationOptism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference Presentation
Optism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference PresentationOptism
 
tw telecom 2008 Financial Strength
tw telecom 2008 Financial Strengthtw telecom 2008 Financial Strength
tw telecom 2008 Financial Strengthceverson
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture reviewRamesh Nagappan
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Ipscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
Ipscf2011 I K Price Infor10 Ea Mv10 1 RoadmapIpscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
Ipscf2011 I K Price Infor10 Ea Mv10 1 Roadmapricardorodalves
 

Mais procurados (20)

Brocent Profile V3.1 English Linkedin
Brocent  Profile V3.1   English   LinkedinBrocent  Profile V3.1   English   Linkedin
Brocent Profile V3.1 English Linkedin
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN Monitoring
 
Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...
 
Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012
 
Pradheep Sampath On Scorecards, Measurements, Kp Is Ahma Hardlines Technolo...
Pradheep Sampath On Scorecards, Measurements, Kp Is   Ahma Hardlines Technolo...Pradheep Sampath On Scorecards, Measurements, Kp Is   Ahma Hardlines Technolo...
Pradheep Sampath On Scorecards, Measurements, Kp Is Ahma Hardlines Technolo...
 
Mmu marketing mobile_money
Mmu marketing mobile_moneyMmu marketing mobile_money
Mmu marketing mobile_money
 
Total Network Solutions
Total Network SolutionsTotal Network Solutions
Total Network Solutions
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
M payments mobile_business_20120327
M payments mobile_business_20120327M payments mobile_business_20120327
M payments mobile_business_20120327
 
US FICAM Overview
US FICAM OverviewUS FICAM Overview
US FICAM Overview
 
Webinar On-Demand: The Power of Analytics to Drive Loyalty
Webinar On-Demand: The Power of Analytics to Drive LoyaltyWebinar On-Demand: The Power of Analytics to Drive Loyalty
Webinar On-Demand: The Power of Analytics to Drive Loyalty
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
Endeca B2B Summit 2011
Endeca B2B Summit 2011Endeca B2B Summit 2011
Endeca B2B Summit 2011
 
Optism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference Presentation
Optism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference PresentationOptism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference Presentation
Optism Alcatel-Lucent Anthony Belpaire Mobile Payments Conference Presentation
 
tw telecom 2008 Financial Strength
tw telecom 2008 Financial Strengthtw telecom 2008 Financial Strength
tw telecom 2008 Financial Strength
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture review
 
Rubik Introduction Feb2010
Rubik Introduction Feb2010Rubik Introduction Feb2010
Rubik Introduction Feb2010
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Ipscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
Ipscf2011 I K Price Infor10 Ea Mv10 1 RoadmapIpscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
Ipscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
 
Presentation of e readiness
Presentation of e readinessPresentation of e readiness
Presentation of e readiness
 

Destaque

Blockchain: How the bitcoin technology can change the public sector
Blockchain: How the bitcoin technology can change the public sectorBlockchain: How the bitcoin technology can change the public sector
Blockchain: How the bitcoin technology can change the public sectorCapgemini
 
Top Ten Trends in Banking 2017
Top Ten Trends in Banking 2017Top Ten Trends in Banking 2017
Top Ten Trends in Banking 2017Capgemini
 
State of Digital Transformation 2016. Altimeter Report
State of Digital Transformation 2016. Altimeter ReportState of Digital Transformation 2016. Altimeter Report
State of Digital Transformation 2016. Altimeter ReportDen Reymer
 
Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Nathan Pacer
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
Digital Bank, May 2014
Digital Bank, May 2014Digital Bank, May 2014
Digital Bank, May 2014Chris Skinner
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017Capgemini
 

Destaque (8)

Blockchain: How the bitcoin technology can change the public sector
Blockchain: How the bitcoin technology can change the public sectorBlockchain: How the bitcoin technology can change the public sector
Blockchain: How the bitcoin technology can change the public sector
 
Top Ten Trends in Banking 2017
Top Ten Trends in Banking 2017Top Ten Trends in Banking 2017
Top Ten Trends in Banking 2017
 
State of Digital Transformation 2016. Altimeter Report
State of Digital Transformation 2016. Altimeter ReportState of Digital Transformation 2016. Altimeter Report
State of Digital Transformation 2016. Altimeter Report
 
Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
Digital Bank, May 2014
Digital Bank, May 2014Digital Bank, May 2014
Digital Bank, May 2014
 
Key Digital Trends for 2017
Key Digital Trends for 2017Key Digital Trends for 2017
Key Digital Trends for 2017
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017
 

Semelhante a The implications of six key technology trends in financial service institutions

StrikeIron IronCloud API Web Service Publishing Platform SAAS
StrikeIron IronCloud API Web Service Publishing Platform SAASStrikeIron IronCloud API Web Service Publishing Platform SAAS
StrikeIron IronCloud API Web Service Publishing Platform SAASsibob
 
Challenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarkeChallenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarkeShane Dempsey
 
Fm Mc Presentation Ria2008
Fm Mc   Presentation Ria2008Fm Mc   Presentation Ria2008
Fm Mc Presentation Ria2008Michael Chaize
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence PlatformJohn Fotiadis ✔️
 
Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01chickana
 
Bank 2.0 -- Making It Happen
Bank 2.0 -- Making It HappenBank 2.0 -- Making It Happen
Bank 2.0 -- Making It HappenBackbase
 
080310 watson - msft in banking
080310   watson - msft in banking080310   watson - msft in banking
080310 watson - msft in bankingErick Watson
 
Increasing the ROI of SAP post-implementation
Increasing the ROI of SAP post-implementationIncreasing the ROI of SAP post-implementation
Increasing the ROI of SAP post-implementationRaul Morales
 
Asug Minnesota Using Six Sigma To Reduce Costs
Asug Minnesota   Using Six Sigma To Reduce CostsAsug Minnesota   Using Six Sigma To Reduce Costs
Asug Minnesota Using Six Sigma To Reduce CostsFabio Brancati
 
PFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow PresentationPFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow PresentationCompany Spotlight
 
Insurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsInsurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsAgile Financial Technologies
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...TFM&A
 
Da Vinci Performance Management 4 13 09
Da Vinci Performance Management 4 13 09Da Vinci Performance Management 4 13 09
Da Vinci Performance Management 4 13 09dougulrich
 
Managed Services
Managed ServicesManaged Services
Managed ServicesVenkat J
 

Semelhante a The implications of six key technology trends in financial service institutions (20)

Tieto Introductie
Tieto IntroductieTieto Introductie
Tieto Introductie
 
Insurance Technology Trends
Insurance Technology TrendsInsurance Technology Trends
Insurance Technology Trends
 
StrikeIron IronCloud API Web Service Publishing Platform SAAS
StrikeIron IronCloud API Web Service Publishing Platform SAASStrikeIron IronCloud API Web Service Publishing Platform SAAS
StrikeIron IronCloud API Web Service Publishing Platform SAAS
 
Challenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarkeChallenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarke
 
Fm Mc Presentation Ria2008
Fm Mc   Presentation Ria2008Fm Mc   Presentation Ria2008
Fm Mc Presentation Ria2008
 
10 Living Labs and Smart Cities Margarete Donovang-Kuhlisch
10 Living Labs and Smart Cities Margarete Donovang-Kuhlisch10 Living Labs and Smart Cities Margarete Donovang-Kuhlisch
10 Living Labs and Smart Cities Margarete Donovang-Kuhlisch
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence Platform
 
IT Transformation
IT TransformationIT Transformation
IT Transformation
 
Mi fin financial product suite
Mi fin financial product suiteMi fin financial product suite
Mi fin financial product suite
 
Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01
 
Bank 2.0 -- Making It Happen
Bank 2.0 -- Making It HappenBank 2.0 -- Making It Happen
Bank 2.0 -- Making It Happen
 
080310 watson - msft in banking
080310   watson - msft in banking080310   watson - msft in banking
080310 watson - msft in banking
 
Ca partner day - bsi - milano e roma
Ca partner day - bsi - milano e romaCa partner day - bsi - milano e roma
Ca partner day - bsi - milano e roma
 
Increasing the ROI of SAP post-implementation
Increasing the ROI of SAP post-implementationIncreasing the ROI of SAP post-implementation
Increasing the ROI of SAP post-implementation
 
Asug Minnesota Using Six Sigma To Reduce Costs
Asug Minnesota   Using Six Sigma To Reduce CostsAsug Minnesota   Using Six Sigma To Reduce Costs
Asug Minnesota Using Six Sigma To Reduce Costs
 
PFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow PresentationPFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow Presentation
 
Insurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsInsurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market Segments
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
 
Da Vinci Performance Management 4 13 09
Da Vinci Performance Management 4 13 09Da Vinci Performance Management 4 13 09
Da Vinci Performance Management 4 13 09
 
Managed Services
Managed ServicesManaged Services
Managed Services
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

The implications of six key technology trends in financial service institutions

  • 1. Larry Ryan The implications of six key technology trends in financial service institutions © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. The implications of six key technology trends in financial service institutions i i tit ti Larry Ryan June 7, 2012 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 3. Increasing pressure on financial firms Customer experience: agility to retain and grow market share Shareholder Demand: cost control & operational efficiency Increasing regulatory scrutiny: I i l t ti greater levels of transparency Sop st c te cyber tt c s Sophisticated cybe attacks: secure infrastructure, data & apps Financial System Soundness: Capital, quality, liquidity, & risk 3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 4. Increasing pressure on financial firms Top Bank Efficiency Raio and ROE Customer experience: 100 agility to retain and grow market share 80 Shareholder Demand: cost control & operational efficiency 60 Increasing regulatory scrutiny: I i l t ti 40 greater levels of transparency 20 Sop st c te cyber tt c s Sophisticated cybe attacks: 0 secure infrastructure, data & apps ‐20 Financial System Soundness: Capital, quality, liquidity, & risk Efficiency Ratio ROE Source: www.bankregdata.com (2011Q4 Data) 4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 5. Technologies impacting financial services Focus on customer experience and agility to retain and grow market share Cloud • Market place for Shared agile services Shareholder Demand for cost and S it Security • Pervasive end-to-end operational efficiency g Big Data Increasing regulatory scrutiny requires • Derive meaning from the digital world greater levels of transparency Social Media • The digital culture Sophisticated cyber attacks require stronger secure infrastructure Mobility • Anywhere computing: markets, apps, payments Improve soundness by increasing capital and improving liquidity di i li idit BYOD • Consumerization of IT 5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 6. The digital life 2020 4B people online, 31B connected d i 2020: l li t d devices, 25M apps Consumer CHANNEL SERVICES CHANNELS USER SECURITY SERVICES (SSO, Authorization and Access Control) CHANNEL INTEGRATION Professional SERVICE SECURITY (Authentication, Authorization and Access Control) BUSINESS SERVICES CORE BANKING OPERATIONS WEALTH CORPORATE MANAGEMENT INFORMATION EXTERNAL ENTERPRISE MANAGEMENT & INTERFACES SYSTEMS RETAIL TRADING DATA SERVICES RISK MANAGEMENT TREASURY & CASH & COMPLIANCE MANAGEMENT PLATFORM SECURITY (Authentication, Authorization and Access Control) PLATFORMS INFRASTUCTURE SECURITY SERVICE SECURITY (Authentication, Authorisation and Access Control) IT INFRASTRUCURE HYBRID DELIVERY CLOUD Mobile Datacenter 6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Source: IDC, ICT Outlook: Recovering Into a New World, #DR2010 GS2 JG, March 2010
  • 7. The digital life: data 2020 4B people online, 31B connected d i 2020: l li t d devices, 25M apps Transactions Payments i l i Social Interactions Photos Personal Movies/Videos Exhaust Data Music Maps M Books Scientific Data Life Footprint Consumer Magazines Professional Biological CHANNEL SERVICES CHANNELS Newspapers USER SECURITY SERVICES (SSO, Authorization and Access Control) CHANNEL INTEGRATION SERVICE SECURITY (Authentication, Authorization and Access Control) BUSINESS SERVICES CORE BANKING OPERATIONS WEALTH CORPORATE MANAGEMENT Environmental INFORMATION EXTERNAL ENTERPRISE MANAGEMENT & INTERFACES SYSTEMS RETAIL TRADING DATA SERVICES Art RISK MANAGEMENT TREASURY & CASH & COMPLIANCE MANAGEMENT PLATFORM SECURITY (Authentication, Authorization and Access Control) PLATFORMS INFRASTUCTURE SECURITY SERVICE SECURITY (Authentication, Authorisation and Access Control) IT INFRASTRUCURE HYBRID DELIVERY CLOUD Public Records Mobile Datacenter 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Source: IDC, ICT Outlook: Recovering Into a New World, #DR2010 GS2 JG, March 2010
  • 8. 01 Cloud © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 9. Cloud computing types for financial service firms Core attributes Elastic Pay-per- Pay-per-use Banker Networked Shared Trusted external On- On-demand service providers Markets/Communities Markets/Communities Software Services (SaaS) SaaS) Platform Services (PaaS) (PaaS) Infrastructure Services (IaaS) (IaaS) How is it used? What is delivered? 9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 10. The financial service marketplace evolves NASDAQ Market Replay Expanding into cloud services Attacking legacy business models b i d l Legacy Services 10 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. “Cloud” Services
  • 11. Value of Cloud in FSI Top challenges faced by banks Manage recovery Grow customer base Handle host of new & changed regulations Absorb acquisitions Three key drivers for Cloud adoption Cost reduction Speed to deliver Agility Ovverall cost reduction through – With technology innovation becoming more of an Banks looking at Agility specifically with reference • SaaS - Avoidance of infrastructure cost enabler of new banking products and channel to IaaS • PaaS - Quicker development cycles innovations as well as increased regulatory Large-tier banks &"megabanks" have extremely changes expected, a bank's ability to quickly adapt large sets of data and very high transaction • IaaS - Increasing utilization of infrastructure components reducing total infrastructure needs to the changing landscape or become a market volumes in solution areas that are load-intensive overall innovator by leveraging technology is a distinct y g g gy and read-intensive such as risk management, read intensive, management competitive advantage trading algorithms, pricing, quantitative analysis Enable banks to increase control over IT infrastructure with regard to fixed vs. variable Cloud computing can offer faster initial and payments processing costs and opex vs. capex implementations by eliminating the need for Megabanks are adopting or considering private lengthy hardware acquisition cycles or capital cloud (internal to bank) IaaS to reduce overall Flexibility and control over costs to react to what is investment project reviews infrastructure cost through consolidation of becoming an increasingly volatile economic condition diti servers, servers data centers and higher utilization of their server footprint Source: Market Insight: The Impact of Cloud Computing on Vendors in Banking – Gartner June 2010 11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 12. Key take-aways 1. Cloud is an emerging disruptive force; a strategic transformation and journey 2. Cloud decreases time to market, increases agility, reduces cost, and enables new business models 3. 3 Assess what assets can move to cloud and start with an internal IaaS as a foundation towards a service ecosystem 4. HP recommends a hybrid delivery framework to integrate all sources and automate t t 12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 13. 02 Security © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 14. Top 5 global risks in terms of likelihood Global Risks 2012 Seventh Edition, World Economic Forum, http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2012.pdf 14 14 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 15. The threat • SWIFT: The operator of the world’s largest messaging network for financial transactions said its communications systems are facing record levels of aggression y g gg from cyber hackers and attackers.* • 38% of financial services respondents say they have been hit by cyber crime of one sort or another. ** • Ponemon Institute found that >1 successful attack/week/company (44% increase).*** * http://www.securitiestechnologymonitor.com/news/swift-terrorism-at-new-peak-shah-30120-1.html?zkPrintable=true p // gy / / p ** Cybercrime: protecting against the growing threat, Global Economic Crime Survey, Nov 2011, PWC. *** Second Annual Cost of Cyber Crime Study, August 2011, Ponemon Institue. 15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 16. Example breaches • Global Banks • Community Bank • Bank Outsourcer • Exchange • Payment Networks 16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 17. HP’s framework Information security management Security Security Compliance and Threat & Risk Security Training and Supplier Policy and Risk Performance Audit Management Architecture Awareness Management Management Security operations Risk Accreditation & Identity and Monitoring and Universal Log Incident Security Change Assessment and Acceptance Access Alerting Management Management Control Mitigation Testing Management Data center Network Application End-point Data & Content Security Securing Data in Motion Securing Data in Use Securing Data at Rest Business Recovery & IDS/IPS Application Delivery Mobile Security Continuity Services Data C D Center S Security i Network S N k Security i Application Security A li i S i A t E d i tS it Asset, Endpoint Security 17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. Key takeaways • Security and risk management alignment • Security and IT operations integration • Situational awareness / rapid response • Actively and continuously monitor and evolve 18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 19. 03 Big Data management © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 20. Definition Social networking Uploading video In Germany Researching in in the US China Of the 6.9 billion people in the world, Chatting in India only 2.3 billion are online. Blogging in Brazil 2020 25 million apps http://www.internetworldstats.com/stats.htm 4 billion people online 31 billion connected devices Speed 450 billion online interactions, per day 1.3 trillion tags/sensors Complexity 50 t illi gigabytes of d t created trillion i b t f data t d 20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 21. Big Data valuable to financial services 21 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. “Big Data: The next frontier for innovation, competition, and Productivity, McKinsey Global Institute, Presented at SIBOS, September 20, 2011
  • 22. What are banks doing? •Track behaviour "Our top business •Adjust risk exposure Adjust challenges are optimizing •Correlate with transaction customer relationships, optimizing financial functions, •Understand Reducing business risk and •Predict and influence P di t d i fl ensuring regulatory compliance. Our prioritization is around our customer and then revenue / profits " profits. – C Level Executive 22 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 23. Benefits for banks •Customer behaviour •Multichannel Customer Interaction Multichannel •Product Innovation •Risk management and compliance •Strategy and brand marketing St t db d k ti •Archiving & eDiscovery •Information management 23 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 24. HP’s view: Big Data – The new normal Consumer generated Listen Unstructured Integrate all valuable Real time – created and assessed Sources of Understand customer data Create an integrated g – From “empower the knowledge worker” analytic framework to to “mobilize the consumer” enable Analytics for the Masses – From “time to information” to “time to activity” activity Engage Embed the analytical – From “implicit understanding of consumer insights closer the point- sentiment” to “explicit understanding” of-interaction with the customer 24 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 25. Key takeaways New architecture Creates transparency Enables experimentation and analysis Value creation and business models Law f big L of bi numbersb Data Policy 25 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 26. 04 Social media © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 27. Social media 27 27 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 28. Social networks demographics Population/Registered Users 1,600,000,000 1,400,000,000 1 400 000 000 1,200,000,000 1,000,000,000 800,000,000 600,000,000 400,000,000 200,000,000 0 28 28 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 29. Corporates embracing social media 29 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Source: “How social technologies are extending the organization”, McKinsey Quarterly, November, 2011, http://www.mckinseyquarterly.com/High_Tech/Strategy_Analysis/How_social_technologies_are_extending_the_organiz ation_2888
  • 30. Examples in Financial Services 30 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 31. Virtual currencies & loyalty programs Frequent Flyer Programs 31 31 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 32. Key takeaways • Reach customers • Manage brand • Drive campaigns • Learn from customers • Govern usage appropriately 32 32 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 33. 05 Mobility © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 34. Mobility becomes part of life for everyone ... A d th scale i enormous And the l is •Instant connections, communication & collaboration is changing people’s behavior •Access to on line services is part of daily activity – Mobility First is quickly becoming the business top priority 34 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 35. Online and mobile banking transactions continue to increase rapidly US Self-Service Banking Transactions by Channel (In Billions) 100 ATM (CAGR = 0.8%) 80 Online (CAGR = 20.1%) 20 1%) 60 Mobile 14.0 3.0 9.4 (CAGR = 84.8%) 1.2 5.6 40 35.0 23.3 26.8 30.0 33.3 20 5.6 7.3 9.1 11.8 15.3 18.6 14.0 14.2 14.3 14.4 14.5 14.6 14.6 14.7 14.8 15.0 15.1 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Source: TowerGroup 35 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 35
  • 36. US branch transactions are declining (2010–14P) Transactions (in billions) 15 14.70 14 70 14.11 14 13.69 13 69 13.28 13 12.88 12 2010 2011 2012 2013 2014 Source: TowerGroup 36 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 37. Mobile Payments Landscape Physical Location / POS Online Mobile P2P Transfers (Domestic and International) Payments to Merchants 37 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. * Updated version of table from Edgar, Dunn & Company Slide
  • 38. Example Mobile Applications 38 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 38
  • 39. Hp Enterprise Mobility Services framework Mobility Apps Platform Unified Communication • App Virtualization • Voice Transformation • Desktop Virtualization • Virtual Workplace • Mobile Apps – Native, Web • Unified Messaging Mobility Device Management Mobility Protection • Network Protection • Infrastructure Mgt • Cloud Protection • Mobile Device Mgmt • Mobile Data Protection PROSUMER • Mobile Access Protection Mobile Data Mobile Applications • Performance Engineering • Storage Consulting • App Transformation • Mobile Data Trans. • Mobile App Management • Enterprise Data Sharing • Windows 7/8 Migration • Analytics/BI GRC - MoC Enterprise Connectivity • Network Transformation • Education Services (UC) • Voice over Wi-Fi • Education Services (Mobility) • Fixed M bil C Fi d Mobile Convergence • Mobility Policies (BYOD) Collaboration • Cloud Services Integration •Search/ Information •Document Management • Social Collaboration © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 39 • Mobile Process Enablement
  • 40. Key takeaways • Handling confidential information on the remote device if lost or stolen. –Remove wipe –Encryption yp • When an employee leaves company –Remove Wipe –Document tracking g • Document leaking into wrong hands • Anti-virus/anti-malware software • Limiting access to corporate network • Policy and Governance – Clouds 40 40 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 41. 06 BYOD © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 42. Bring Your Own Device Balancing choice while protecting corporate assets Benefits • Employees and customers use their •Shift cost to users own device •Increasing employee satisfaction •Accelerate technology adoption • How to: Concerns • Embrace •Acceptable Use Policy Acceptable • Minimum security policy • Govern usage • Company mandated security tools • Protect assets and data •Compliance and data ownership •Retrieving company data on separation • Path towards pervasive computing Risks i k •Unencrypted information •Consumer Applications •Weak passwords and security 42 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 43. Key problems for IT Management of different platforms 2007 2010 2013 • From a single client OS to multiple OS • Different devices, different form factors, different update and life cycles ? • How to manage migration of existing platforms • Wh t about current desktop /Laptop What b t t d kt /L t strategy Own vs BYOD 43 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 44. Key issues for IT Security and risk management – Is it safe? Device Overload  Ever-Changing Types, OSs and Security App Threats h Features  Insecure Access to Corporate Apps Network Threats  Usage of Many Secure Data Threats  Lack of Reliability k f l bl and Unsecure Networks  Sensitive Data Leakage  Lack of Mobile Network  Device Lost or Employee Visibility Leaves User Th t U Threats  Corporate Network  Acting in Non- Vulnerability to Mobile Compliant / Threats Wrongful Ways 44 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 45. BYOD considerations • Trust Model • Remediation options • Tiered policy • User experience vs. security exposure tradeoff • Corporate data protection (in transit, on device) • Device control • Acceptable use policy (cloud services) • Liability assessment b l ty ssess e t • Education 45 45 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 46. Summary © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 47. Key takeaways for financial institutions • Enterprise and customers always online • Everything digital • Service based economy Service-based • Data in motion architectures • Marketplace growth • Agility & Speed to Market • GRC: Governance, Risk, and Compliance 47 47 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 48. Download Now Get the Mobile App Download content from this session with the free Mobile App App. Text the word “Discover” to 474747 Discover or: m.hp.com/events 48 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 49. Thank you © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.