2024: Domino Containers - The Next Step. News from the Domino Container commu...
Digital Enterprise 2019
1.
2. Promoting growth through innovation
Jon Lyons
Board Director
Business Council of Mongolia
Since June 18, 2019
DIGITAL ENTERPRISE 2019
3. WHAT IS THE BUSINESS COUNCIL OF MONGOLIA?
DIGITAL ENTERPRISE 2019
Independent member-based, self-governing, non-profit, non-governmental organization (NGO)
– Established in 2007.
4. DIGITAL ENTERPRISE 2019
BCM PURPOSE
Vision
To deliver value for the public, the members, and the employees by
advocating economic freedom and property rights provided by the
Constitution of Mongolia and protecting and promoting the common
lawful interests of members for a fair, stable, and internationally
competitive business environment.
Mission
• To equip members with an information platform that provides up-to-date policy and
business research, training and knowledge sharing.
• To develop and promote economic and sector policy recommendations through
engagement with the BCM members, the government and the wider public.
• To provide networking and other services that support doing business in Mongolia.
5. DIGITAL ENTERPRISE 2019
Media / Printing,
9, 4%
IFIs and
Ios, 12, 5%
Tax /
Legal /
Ethics,
11, 5%Growth &
Innovation, 16, 7%
Education /
Training, 14, 6%
Food & Beverages
/ Hospitality /
Light Industry /
Rretail / Real
Estate, 20, 8%Resources /
Environment,
50, 21%Associations &
NGOs, 18, 8%
Embassies, 25, 11%
Government
Entities, 10, 4%
Energy /
Infrastructure /
Connectivity /
Logistics, 13, 5%
Banking / Finance
/ Capital Market /
Insurance, 37, 16%
BCM MEMBERS BY SECTOR
6. DIGITAL ENTERPRISE 2019
BCM ORGANIZATIONAL STRUCTURE & BENEFITS
• The highest governing
body of the Organization is
the Board of Directors
(BoD) which consists of 15
member.
• Executive Committee
(ExCo) is the main
operational and monitoring
body of the Organization
and has 9 members.
• 6 Working Groups are
functional bodies that
optimize the
implementation of BCM
objectives.
1. POLICY & ADVOCACY
2. NETWORKING & CONNECTIVITY
3. KNOWLEDGE SHARING
4. TIMELY & RELEVANT INFORMATION SHARING
5. MEMBER BUSINESS PROMOTION
6. DISCOUNTS
7. DIGITAL ENTERPRISE 2019
BCM WORKING GROUPS
2. Economic Freedom and Competitiveness
- Chair: Gund Investment/TUSS Solution
- Vice Chair: Clean Energy Asia
3. Energy, Infrastructure and Connectivity
- Chair: PwC Mongolia
- Vice Chair: Erdenes Oyu Tolgoi
1. Banking, Finance and Capital Markets
- Chair: Trade and Development Bank
- Vice Chair: Tavan Bogd Group
4. Growth and Innovation
- Chair: Mobicom Corporation
- Vice Chair: Erdene Resource Development Corp.
5. Resources and Environment
- Chair: Oyu Tolgoi LLC
- Vice Chair: Erdenes Mongol
6. Tax, Legal and Ethics
- Chair: Avinex LLP
- Vice Chair: Rio Tinto Mongolia
Chaired by senior executives and thought leaders from key economic sectors
8. DIGITAL ENTERPRISE 2019
BCM WORKING GROUPS FOCUS AND COMPOSITION
Working Group Composition
Chairs / Vice-Chairs / Non-Board Vice-Chairs
Members (BCM Members)
BCM Secretariat (support)
Sector-focused advocacy
Policy and regulatory engagement
Partnership development
Public education & media engagement
Improve sector competitiveness & attractiveness to investors
Policy positions / papers
9. DIGITAL ENTERPRISE 2019
BCM Growth & Innovation Working Group
Events Practice sharing
Government engagement
Raising awareness about Digital Transformation and its potential benefits to business and
society.
10. DIGITAL ENTERPRISE 2019
BCM by the NUMBERS
• 1 Annual Summit per year to showcase key business issues
• 18 major policy items were advocated in last 18 months
• More than 80 Knowledge Sharing Sessions since 2007
• More than 100 Monthly Meetings since 2007
• Over 550 issues of NewsWire since 2007
• More than 1,400 active subscribers to BCM Mailing list
• Social media presence: 17,000+ followers on Facebook, 3,000+ on Twitter
11. DIGITAL ENTERPRISE 2019
CONTACT US
bcmongolia.org @bcmongolia @bcmongolia
Address:
Suite 1103, Floor 11,
Suite 1202, Floor 12,
Express tower, Peace Avenue,
Khoroo 1, Chingeltei District,
Ulaanbaatar
Phone: 976-11-317027
15. Digital Literacy for Mongolia
Byambajargal Ayushjav
Founder and CEO
Faro Foundation Mongolia NGO
DIGITAL ENTERPRISE 2019
16. FARO Foundation Mongolia
Faro Foundation Mongolia (FFM) is a non-
governmental organization that has focused on
promoting adequate and accessible use of social
media and digital literacy in Mongolia.
FFM’s work includes but are not limited to,
promoting online safety, digital literacy, child
protection programs, proper use of social media,
public awareness regarding cyber bullying and
such.
The primary goal of FFM is to implement positive
change in the community through the use of social
media.
DIGITAL ENTERPRISE 2019
19. Social Media Stats Mongolia (May 2018 – May 2019)
DIGITAL ENTERPRISE 2019
20. Digital Literacy
Digital literacy refers to an individual's ability to find,
evaluate, and compose clear information through
writing and other mediums on various digital
platforms.
Five Essential digital skills:
• Communicating
• Handling information and content
• Transacting
• Problem solving
• Being safe and Legal Online
DIGITAL ENTERPRISE 2019
22. Digital Literacy Library
Developed:
Youth and Media at the
Berkman Klein Center for
Internet & Society at
Harvard University
License:
Creative Commons
Attribution-ShareAlike 4.0
International license
DIGITAL ENTERPRISE 2019
23. Digital Literacy
Digital Literacy Curriculum
is designed for:
Students – 18 Lessons
Teachers – 18 Lessons
Parents – 6 Lessons
DIGITAL ENTERPRISE 2019
36. Internet today
DIGITAL ENTERPRISE 2019
Source: crc.gov.mn
Нийт гэрээт интернет
хэрэглэгчийн 70% нь 2-5 Mbps-н
хурдтай гадаад интернет
үйлчилгээ ашиглаж байна
37. Internet today
DIGITAL ENTERPRISE 2019
Mongolian Internet Penetration is
65% in 2018, but!
Global Speeds - April 2019
Source: https://www.speedtest.net
Mongolian Speeds - April 2019
39. - Global Forecast and Trends of Internet
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
Content Delivery Networks (CDNs) will carry
72% percent of Internet traffic by 2022 up
from 56 percent in 2017.
By 2022, global mobile devices will grow from
8.6 billion in 2017 to 12.3 billion by 2022 - over
422 million of those will be 5G capable.
Fixed IP traffic will grow at a CAGR of 24 percent
between 2017 and 2022, while mobile traffic
grows at a CAGR of 46 percent. Global mobile data
traffic was 9 percent of total IP traffic in 2017
and will be 20 percent of total IP traffic by 2022.
40. - Global Forecast and Trends of Internet
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
Интернетэд холбогдох төхөөрөмжийн өсөлт IP Video дамжуулалтын өсөлт
M2M интернетийн холболтын тоо
41. - Global Forecast and Trends of Internet
DIGITAL ENTERPRISE 2019
Source: www.gartner.com
2018 2019 2020 2021 2022
Cloud Business Process Services
(BPaaS)
45.8 49.3 53.1 57.0 61.1
Cloud Application Infrastructure
Services (PaaS)
15.6 19.0 23.0 27.5 31.8
Cloud Application Services (SaaS) 80.0 94.8 110.5 126.7 143.7
Cloud Management and Security
Services
10.5 12.2 14.1 16.0 17.9
Cloud System Infrastructure
Services (IaaS)
30.5 38.9 49.1 61.9 76.6
Total Market 182.4 214.3 249.8 289.1 331.2
Public Cloud үйлчилгээний орлогын төлөв
(Billions of U.S. Dollars) DDoS attacks-н төлөв
42. - Conclusion of Forecast
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
IoTCDN
Cloud
Services
IP
Video
Big
data
Security
- What should do ISP’s for Future demand?
43. - Future of Internet service
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
- More internet cache systems (CDN)
- Most affordable M2M service packages
44. - Future of Internet service
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
- More reliable and stable internet peering
- More secure network, system and operation
Ping - 50ms
Layer - 3
45. - Future of Internet service
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
- More speed in Fixed broadband
- And key is good
support and service
50Mbps, 100Mbps
50. DIGITAL ENTERPRISE 2019
CONTACT CENTER
2018-2019
2016-2017
2222
1800-2222
1800-1199
2014-2015 7577-2222
2013-2014 Integrated Customer Service Center
2011-2012 333311 2288
2009-2011
2299 2277
Most PSP 2233
2004-2008 2244
2002-2003 11-312222 2222
OUTSOURCING Business FACILITY RENT Business
1800-1917 7555-5555 1800-1937 11-315757
1800-1200 1800-1289 1800-1883 1900-2103
7575-2000 1800-1200 1800-1801 1800-1289
1900-1199 1900-1199
1900-1199 1800-1200
1900-1199
1800-1200 7575-3636
1900-1199 11-327575 11-312234
7711-7711
11-315757
51. 2005 2010 2011-2013 2014 2014-2017 2018
DIGITAL ENTERPRISE 2019
16 years experience
Know How
IVR
Self–Service
Self–Sales
INTRODUCED FIRST TIME IN MONGOLIA
Call center
2222 (toll-free)
Telemarketing
24/7 Service
Call
distribution
Smart call
distribution
Customer
Segment
Implemented
25 KPI's for
Call Center
Workforce
management
(WFM)
52. DIGITAL ENTERPRISE 2019
CONTACT CENTER SYSTEM
Since 2017
Advanced Contact
Center Technology
Channel based architecture
Skilled HR base, training &
monitoring complex system
2005-2016
Customer Experience
Omni channel
High integration possibility
Smart feature / Smart routing
Workforce Optimization
Self - Service IVR
53. DIGITAL ENTERPRISE 2019
TO IMPROVE CUSTOMER EXPERIENCE
To provide personalized & prompt customer service
to MobiCom customers and partners, through Omni-
channel, resolve their issues
To deliver customer voice & request to the top
management team
To support company’s sales by up & cross sales
To care MobiCom customers, increase satisfaction
55. DIGITAL ENTERPRISE 2019
Easy
Prompt
IVR Self-sales
Data package
MCA
HiTone
Data gift
Unitloan
Hybrid Payment
Surprise - 596
~800k
Self-sales
7 types self-sales
IVR Self-Service
Bill info
Handset configuration
Candy balance
Bank account
Data package balance
Handset Leasing condition
Get puk code IVR
SMS loan amount by sms
SMS loan payment by sms
~1mln
Service activation
9 types self-service
DIGITAL SERVICE
56. DIGITAL ENTERPRISE 2019
я
Call forecast, HR forecast
WFM is powerful tool which can organize time management & HR
Work Force Management program
WORK FORCE MANAGEMENT (WFM)
58. DIGITAL ENTERPRISE 2019
Customer Journey Analytics
ALL CHANNEL’S
INFORMATION
PAST
NOW
FUTURE
SAME
BEHAVIOR
CUSTOMER
EXPERIENCE
ONE PLATFORM
SINGLE CUSTOMER VIEW
59. DIGITAL ENTERPRISE 2019
Hybrid line
Status: Active
Package: Hybrid - 19,900
Segment: Business USINESS
BOLD Gansukh
26 ages
KHAN-UUL, 3 KHOROO
TELMUUN
SINGLE
CUSTOMER VIEW
9933**** By month
CUSTOMER’S SERVICE:
HITONE
MCA
LEASING
DAILY VAS
CLIR
CUSTOMER’S HISTORY:
09:15 – 2222 – about data package
10:00 – NPS – 4 point
17:20 – 592 – 1 day data
19:03 – 2222 – data complaint
19:00 – Mobile bank - 19,900₮ payed
UNIT – Dealer
PAYMENT- Mobile bank
CHANNEL:
Now
uses
IPHONE 6S
Web
SPOS
Candy app
Internet
CARE
Usage Data
7.5GB
NPS
-15.5%
OFFER
CUSTOMER JOURNEY
60. DIGITAL ENTERPRISE 2019
Human-Assisted
Reach
Channels
Coverage
SMS
• Single Channel
• Interaction Focus
• Next up staff
• Work Mix is Broad
• Siloed Multi-Channel
• Interaction focus
• Skill based Routing
• Manual Quality Management
• Work Mix Complex
• Touchpoints Siloed
• WFO siloed
• Analytics by Channel
• Journey Orchestration
• Multi-modal, Cross-Channel
• Predictive and Proactive
• Journey Intent Routing
• Soft Switching (egWebRTC)
• Continuous WFO
• Journey Analytics & Insights
• CX Work Item SLAs Enforced
CUSTOMER EXPERIENCE CENTER
1960-2005 2006-2016 Since 2017
CONTACT CENTERCALL CENTER
Enterprise-Wide
CC MILESTONE
61. DIGITAL ENTERPRISE 2019
CUSTOMER ENGAGEMENT CYCLE
CUSTOMER EXPERIENCE
PLATFORM
IVR
voice Social
Contact
Center Chat Web site
Shop/
BranchE-mail
Mobile
App
SELF-SERVICE PAYMENT CUSTOMER SERVICE
DEALER SERVICE IVR SALES
MARKETING
SUPPORT
CUSTOMER
JOURNEY
SINGLE
CUSTOMER
VIEW
WFM
SERVICE
QUALITY
64. The Game Changer of Digital Enterprise
Juniper Network Strategy and Solution
Norman Lam CEO
VP & GM – Greater China
Juniper Networks
DIGITAL ENTERPRISE 2019
65. At A Glance
Sunnyvale, CA
HEADQUARTERED
1996
FOUNDED
$4.648B
2018 REVENUE
9,300
EMPLOYEES
88
Locations
43
COUNTRIES
24/7 AVAILABILITY
TO ADDRESS ALL CUSTOMER NEEDS
GLOBAL REACH ++ +
17 out of 20
WORLD’S
LARGEST BANKS
7 out of 10
TOP GLOBAL
UNIVERSITIES
More than 1,400
LOCATIONS FOR
NATIONAL GOVERNMENTS
10 out of 12
TOP TECHNOLOGY
COMPANIES
9 out of 10
TOP GLOBAL
WEB SERVICE
PROVIDERS
10 out of 10
WORLD’S LARGEST WIRELESS &
WIRELINE TELECOM COMPANIES
REACHING THE HIGHEST STANDARDS ENCOURAGING FUTURE INNOVATORS
OUR MISSION Connect Everything. Empower Everyone. OUR VISION Engineering Simplicity
WHO
TRUSTS
US
DIGITAL ENTERPRISE 2019
66. THE INTERNET OF THINGS
– EVERYTHING IS
CONNECTED
connected devices by
202575B
5G WILL ENABLE A NEW
BREED OF MOBILE APPS
Is how much faster 5G is
estimated to be over 4G60x
A.I. HAS
EMERGED
of business leaders say A.I.
will be a business advantage
%
80
THE CLOUD IS EATING
THE WORLD
%
50 of enterprise applications
in the cloud by 2020
FIGHTING CYBER-CRIME
AND LOSING
will be spent on fighting
cybercrime in 2022$8T
THE WORLD IS CHANGING FAST
DIGITAL ENTERPRISE 2019
67. AND OUR OPPORTUNITY IS IMMENSE TO…
DISTRIBUTE CLOUDS
TO ENABLE 5GAND
IoT
DELIVER THE
SOFTWARE DEFINED
NETWORK
HELP COMPANIES
BUILD CLOUDS
CONNECT
PEOPLE
TO CLOUDS
Our intelligent SDN solution
enables customers to
achieve open, intelligent and
flexible business objectives
from cloud design to
implementation and post-
operation management.
We help our customers build
and run their cloud
environments with world-
class infrastructure
We build the best core,
edge, metro, and enterprise
networks to allow our
customers and their
customers to connect to the
cloud
We help our customers
transform their infrastructure
to scale-out distributed
clouds to help unleash the
promise of
5G & IoT
DIGITAL ENTERPRISE 2019
68. We're recognized As A leader in Data Center
127
GARTNER
MAGIC QUADRANT FOR DATA CENTER NETWORKING FORRESTER WAVE TM
HARDWARE PLATFORMS FOR SOFTWARE DEFINED NETWORKING
JUNOS
Contrail
Automation
High performance
Open standard
automation
DIGITAL ENTERPRISE 2019
69. WE ARE LEADING THE TELCO TRANSFORMATION
SERVICE & SUPPORT
TECHNOLOGY INNOVATION
Least Important
Source: IHS Markit, December 2017
SP VENDOR RANKING FOR BUYING
CORE/EDGE ROUTERS
Product Reliability
Service & Support
Technology Innovation
Security
TOP SP SELECTION CRITERIA
#1
PRODUCT RELIABILITY
SECURITY
#1
#1 #1
71. Secure and automated multicloud
DIGITAL ENTERPRISE 2019
Enable Digital Enterprise journey
72. DESTINATION: SECURE & AUTOMATED MULTICLOUD
New IT platform is hybrid & multicloud because it’s the
best:
• Venue
• Resilience
• Agility
• Flexibility
• Economics
…MULTICLOUDSECURE & AUTOMATED…
Top 2 priorities:
• Security:
Failing security can take you from hero to zero immediately
• Automation:
Reliability engineering precedes moving faster for business
It’s no longer only about TCO
DIGITAL ENTERPRISE 2019
73. SECURE AND AUTOMATED MULTICLOUD – NOT JUST ABOUT CLOUDS
Branch / Remote
Office
Campus / HQ
SaaS Public Cloud
Public Cloud
Data Centers / Private Cloud
Private / Public WAN
DCI
ALL PLACES IN NETWORK TOUCH MULTICLOUD APPLICATIONSPEOPLE & IoT
SECURE and AUTOMATED MULTICLOUD
how what
DIGITAL ENTERPRISE 2019
74. JUNIPER Open PORTFOLIO
Connected Security
Campus/HQBranch/Remote Office Public CloudData Centers/Private Cloud SaaS Public Cloud
AI-Driven Enterprise Enterprise Multicloud
WAN
JUNIPER ENTERPRISE
Secure and Automate Multicloud
Switching SecurityRouting
Juniper Portfolio
Software
Contrail
MistJunos
Wi-Fi and BLE Services
DIGITAL ENTERPRISE 2019
Connect SEE Secure Deliver
75. 5-STEP Migration to Digital Enterprise
Device Led
Business Led
Operations Led
Architecture Led
Customer Led
DIGITAL ENTERPRISE 2019
76. We Help our customers Deliver the Amazing
IMPROVE HEALTHCARE TRANSFORM COMMERCE BUILD APPLICATIONS
RETHINK EDUCATION POWER SOCIAL CHANGE EXPLORE NATURE ENCOURAGE DISCOVERY
ENABLE CLEAN ENERGY
DIGITAL ENTERPRISE 2019
80. Sophos Solution and How We
Deal With Next-Generation Attack
DIGITAL ENTERPRISE 2019
Stan Ho
SE Manager of China and Mongolia
Sophos Group.
since Nov, 2007
81.
82. Sophos Snapshot
• Founded in Oxford in 1985
• 3,500 employees
• 327,000 customers
• 100 million users in 150 countries
• 45,000 channel partners
• SophosLabs threat research facility
• “Channel First” go-to-market model
Sophos Headquarters, Abingdon, UK
83. Sophos History
Evolution to complete security
1985
Founded in Abingdon
(Oxford), UK
Peter Lammer
c1985
Jan Hruska
c1985
Acquired
DIALOGS
Acquired
Astaro
2011 2012 2013
Acquired
Utimaco
Safeware AG
20081988
First
checksum-
based
antivirus
software
1989
First signature-
based antivirus
software
1996
US presence
established in Boston
Voted best
small/medium sized
company in UK
Acquired
ENDFORCE
2014
Acquired
Cyberoam
Acquired
Mojave
Networks
Acquired
Barricade
IPO London
Stock Exchange
Launched
Synchronized Security
2007 2015
Acquired
Surfright
2017
Acquired
Invincea
2016
Acquired
PhishThreat
Acquired
Reflexion
2019
Acquired
Avid Secure
Acquired
DarkBytes
Acquired
Rook Security
84. Sophos Global Sites
San Francisco
Bay Area
Vancouver
Canada
Abingdon
UK
Budapest
Hungary
Singapore
Sydney
Australia
Manila
Philippines
Tokyo
Japan
Milan
Italy
Karlsruhe
Germany
Wiesbaden
Germany
Dortmund
Germany
Paris
France
Ahmedabad
India
Dubai
UAE
Hengelo
Netherlands
Linz
Austria
Bangalore
India
New Delhi
India
Ottawa
Canada
São Paulo
Brazil
Buenos Aires
Argentina
Bogotá
Colombia
Ciudad de México
Mexico
Boston
MA
TW/HK/China
85. A Leader in Endpoint Protection
“The Sophos Intercept X product, designed to protect against
and recover from the malicious actions related to ransomware
and exploits, proved popular with both existing Sophos Endpoint
Protection customers and as an augmentation to an incumbent
EPP. This momentum continued its increased brand awareness in
the enterprise space.
Also included in the Intercept X purchase are Sophos' EDR-like
capabilities — called Root Cause Analysis — and the ML
malware detection technology from the acquisition of Invincea
was added in late 2017.
Sophos' cloud-based EPP with the Intercept-X platform is a good
fit for organizations that can take advantage of a cloud-based
administration platform, and that value strong protection
against ransomware and exploit-based attacks over advanced
forensic investigation capabilities.”
Gartner Magic Quadrant
ENDPOINT PROTECTION
Source: Gartner (February 2016)
This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all
warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed
in Gartner publications are not representations of fact, and are subject to change without notice.
Magic Quadrant for Endpoint Protection Platforms,
Ian McShane, Avivah Litan, Eric Ouellet, Prajeet Bhajanka; 24 January, 2018
86. A Leader in Unified Threat Management
Gartner Magic Quadrant
UNIFIED THREAT MANAGEMENT
This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all
warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed
in Gartner publications are not representations of fact, and are subject to change without notice.
Magic Quadrant for Unified Threat Management,
Rajpreet Kaur, Claudio Neiva, 20 September, 2018
Sophos first entered into this MQ publication in March 2012, positioned
in the Leader quadrant – and has retained this position for 6 consecutive
publications
“Sophos is a Leader in the UTM Magic Quadrant. It continues to gain
market share due to ease of use, security feature richness and successful
integration with its endpoint product. It demonstrates strength in its
product vision and roadmap execution, relative to those of some
competitors.”
88. Continued rapid growth in new malware
By the end of 2019 over 1 Billion unique malware samples will exist
Total Malware collected over time (AV-Test)
0
100,000,000
200,000,000
300,000,000
400,000,000
500,000,000
600,000,000
700,000,000
800,000,000
900,000,000
The Volume of malware is
staggering
1990’s - Signature based
Anti-Virus
o 1-1 map of ‘checksums’ to
malware
o String Scanning
Requires a Victim to report
the malware so a new
signature can be built
89. The age of single-use disposable malware
75%
75% of the malicious
files SophosLabs detects
are found only within a
single organization.
400,000
Sophos Labs receives and
processes 400,000
previously unseen malware
samples each day.
90. The Challenge Of Addressing New Threats
Software Vulnerabilities Reported By Year
Source information NIST National Vulnerability Database as of 1 May 2018
https://beta.nvd.nist.gov/vuln-metrics/visualizations/cvss-severity-distribution-over-time
4639
4150
5286 5186
7937
6487 6446
14647
16517
2010 2011 2012 2013 2014 2015 2016 2017 2018
91. Top Threats Worldwide
• Active Adversary
• Privilege escalation, cred theft, lateral
movement, exploits, process injection
• Advanced Malware
• Zero-day attacks w/multiple stages
• Worms, Trojans, VB script, PDF,
File-less attacks (cryptominers,
powershell, etc…), bots, rats
• Cryptomining/Cryptojacking
• Legitimate and malicious use of CPU
cycles to generate digital currency
38%21%
33%
5%
Advanced Malware
Active
Adversary
Ransomware
Cryptojacking
3%
Generic
Malware
92. How we deal with Next-Gen attack
Endpoint and Network Security
93. Predictive Security
Harness The Power of Data Science to Protect Against Future Attacks
SEEING THE FUTURE IS THE FUTURE OF SECURITY
94. Deep Learning Neural Network
SMARTER FASTER SMALLER
DEEP
LEARNING
• High Detection Rates
• Gets Better with
More Data
20 – 100 ms
Detection
10 – 20 MB
Model Size
TRADITIONAL
MACHINE
LEARNING
• Low Detection Rates
• Diminishing Returns
with More Data
100 – 500 ms
Detection
500 MB to 1 GB
Model Size
95. Intercept X with EDR for Endpoints and Servers
ANTI-EXPLOIT
MACHINE LEARNING
ANTI-RANSOMWARE
MALWARE REMOVAL ROOT CAUSE ANALYSIS
STOP UNKNOWN THREATS PREVENT RANSOMWARE DENY THE ATTACKER
96. Sophos Intercept X: Intelligent EDR
Data
Correlated, Contextualized,
and Organized
Insights
Humanized, Prioritized,
and Actionable
Explore
Search, Investigate, and
Hunt
IT Generalists
Analysts, IR, and SoC
Specialists and Products
Cybersecurity
Experts-in-a-Box
AI Expert Insights
• EDR Starts with the
Strongest Protection
Stop Breaches
before they Start
• Add Expertise,
Not Headcount
“Experts in a Box”
• Guided Incident
Response
Respond with the
Click of the Button
97. Next-Gen Firewall –Essential Protection Tasks
STEALTH
MALWARE
SOFTWARE
EXPLOITS
CRYPTO
RANSOMWARE
CREDENTIAL
HARVESTING
PROCESS
ATTACKS
UNKNOWn
THREATS Block Attacks
?
Contain Threats
?
Visibility and Control (over users/apps/data)
98. XG Series Winning Advantages
Industry leading performance with unique connectivity, reliability, and management
1. Flexible Connectivity
3. Easy Management
Modular desktop options for LTE, DSL, WiFi
Built-in bypass ports
Full line of copper and fiber FleXi Port modules
Unique RED devices
Micro USB Management Ports
USB and HDMI Ports
2. Business Continuity
Redundant Power Supplies across the entire line
Hot swap drives and PSUs on high-end models
4. Industry Leading Performance
Among the highest rated price-performance by NSSLabs
High-performance solid-state storage on every model
99. Next-Gen XG Firewall
NEW HARDWAREDEEP LEARNING VISIBILITY
• Boosts performance 20+%
• Adds unmatched connectivity
• Best in class business
continuity
• Identifies 100% of
applications
• Uncovers shadow IT, data at
risk
• Unmasks top risky users
• Unparalleled malware
detection
• 3,500 new files convicted
weekly
• Pre-emptive detection
reduces risk
100. Sophos XG Firewall
The world’s best visibility, protection, and response
1. Exposes Hidden Risks
3. Automatically Responds to Incidents
Visual dashboard & rich on-box reporting
Identify risky users and suspicious payloads
Identify unknown cloud & evasive apps
Unique Security Heartbeat™
Integrates EP Health into rules
Automatically isolate infected systems
2. Blocks Unknown Threats
Full suite of protection – easy to manage
Deep learning
Top performing IPS Engine
101. XG Firewall + Intercept X =
Stop Ransomware and NextGen Attack
Exposes Hidden Risks
Blocks Unknown Threats
Automatically Responds to Incidents
102. Security Heartbeat™
Sophos Security Heartbeat – Automated Response
Sophos is the only vendor to use system health in firewall rules
Security Heartbeat™
Servers
XG Firewall Sophos Central
Security Heartbeat™ links Endpoints
with the firewall to monitor health
and immediately share the presence
of threats.
Instant Identification
Security Heartbeat can
instantly share telemetry
about the user, systems and
process responsible
Automated Response
Automatically isolate, or limit
network access, and encryption
keys for compromised systems
until they are cleaned up
Internet
XG Firewall Endpoints
104. Allows partners to
manage multiple
customer installations
Endpoint Protection
Email Security
Web Gateway
Server Protection
Encryption
Mobile Protection
Wireless
Allows users to access
email, mobile, and
encryption features
Sophos Central
Partner Dashboard Admin Self Service
Firewall Management
105. Synchronized Security
Cloud Intelligence
Sophos Labs
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
| 24x7x365, multi-continent operation |
Malware Identities | URL Database | Machine Learning | Threat Intelligence | Genotypes | Reputation |
Behavioral Rules | APT Rules | App Identities | Anti-Spam | DLP | SophosID | Sandboxing | API Everywhere
Sophos Central
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
In Cloud On Prem
Next-Gen Endpoint
Mobile
Server
Encryption
Next-Gen Firewall
Wireless
Email
Web
106. Kerry Logistics Producer
Head office in
Hongkong
Over 100 Branches
across Word Wide。
Quote
“Sophos has engineered a simple solution that
can help organizations quickly provide secure
internet access both locally and remotely.”
30000+ Computers
Central Endpoint Advanced,
Intercept X,
200+ Servers
Sophos Central Server Protection
Network
100+ XG Firewalls (XG)
Unify
and simplify management
Improved protection
against mail, web, zero-day attack
Analytics
for better discovery and reporting
Chenny Chen, CTO
Unparalleled
Protection
107. Construction Company
Over 65 years in Taiwan
China, Hong Kong,
Macau, Gurgaon, Kuala
Lumpur
Quote
1000 Computers
Sophos Central Endpoint
Advanced
200 Servers
Sophos Central Server Advanced
Network
56 XG Firewalls w/Web
Protection, 2 iView Appliances
Real-time
network protection and real-time
response across 50 sites in Taiwan and
30 in Hong Kong,China
Automation
Looking for solution to scale
performance and security
Automated
Incident Response
“We use Synchronized Security to protect our
users from ransomware attacks and enhance
our IT security environment.”
Kevin Chueh, CIO
133. Security in the IoT Era: Device Visibility an Control
Michael Lafuente
Senior Technical Consultant
APJ Region
FORESCOUT Technology
DIGITAL ENTERPRISE 2019
135. DIGITAL ENTERPRISE 2019
Confluence of Macro Trends Creating Visibility Challenges
Growth of Devices &
Platform Diversity
1990s 2020
Innumerable device-specific operating systems (OS)
Cannot get agents onto new devices
Cannot write agent-based software for every OS
DESKTOP LAPTOP MOBILE
CLOUD
VIRTUAL
SERVERS
SERVERS
DATA CENTER
Cloud Adoption Creates
New Challenges
Multiple Device Locations and Access Points
Heterogeneous Environment with Multiple Vendors
De-centralized Management
OT Convergence With IT
Heightens Risk
CORPORATE HQ
• CRITICAL
INFRASTRUCTURE
• INDUSTRIAL
CONTROL SYSTEMS
INFORMATION
TECHNOLOGY
OPERATIONAL
TECHNOLOGY
OT networks are no longer physically separated
Threats moving between cyber & physical dimensions
Assets are highly vulnerable & rarely can be patched
137. DIGITAL ENTERPRISE 2019
The Hidden Challenges of IoT
IDC conducted in-depth
interviews of 7
ForeScout customers to
understand business
value provided by
ForeScout’s See, Control
and Orchestrate
capabilities
139. DIGITAL ENTERPRISE 2019
Despite this seemingly positive emphasis on IoT Security, some disturbing trends emerged
76% are Rethinking their Security Strategy
Due to IoT Security Concerns
143. DIGITAL ENTERPRISE 2019
So Why Don’t They Do Anything About It?
Complacency – Respondents & C-level
“Tolerance” (for risk) seems to be less about what they are comfortable with, and more about what they are powerless to control.”
- Forrester 2017
151. DIGITAL ENTERPRISE 2019
Servers
Virtual Servers
Network
MobileUsers
Private Cloud Public Cloud
Physical Security
Security
Building
Automation
Controller
Systems
IoT Devices Physical
Equipment
Laptops /
Desktops Badging
Campus Data Center Cloud Operational TechnologyIoT
THE DEFACTO STANDARD FOR DEVICE VISIBILITY ACROSS THE EXTENDED ENTERPRISE
Our Product Vision
153. DIGITAL ENTERPRISE 2019
Time-to-Value
65 days – average time for visibility roll out
74
Net Promoter Score
(above security industry average)
Why Customers Choose FORESCOUT
Visibility
Across all major industries including
Government, Financial Healthcare
Discover 30% more devices on average
Orchestration
Increase value of existing investment
Reduce MTTR with automation
2900+
Customers in over 80 countries
2M+ Devices in a single deployment
4.7M+ Device in Device Cloud
57M+ Total Device capacity sold
159. Agenda
251
VMware Introduction
Market position and our vision
Enterprise Digital Transformation
Why need to choose digital transformation
How to help our customer make the decision
What ‘s the Benefit for choosing VMware
Success Story
DIGITAL ENTERPRISE 2019
160. 252
Industry-Specific
Solutions
Global and
Local Presence
Compatibility and
Open Source Integration
Industry and
Domain Expertise
Strategy and
Planning Expertise
Advanced
Technology Capabilities
1,000+
VMware Service
Professionals
100+
Consulting
Partners
75,000
Solution
Partners
$8.97B
annual
revenue of
2019
5,00
Customer include
Top 500 enterprises in the
world.
A Trusted Partner for Your Digital Business Journey
VMware is the fourth biggest basic software companies!
162. The Best 100
Ent US #7
Pat Galsinger Fortune
Executive Leader #2
Leader of
Hybrid Cloud
Management
Market Scape
Leader of Unified
Endpoint
Management
Leader of Hyper
Converged
Infrastructure
Market share
Leader of Cloud
and IT Automation
Leader of HCI
and WAN Edge
Infrastructure
Magic Quadrant
The Best Container
Platform Management
Award by EMA
VMware CEO
Pat Galsinger
CRN 2018
Top 100
Executives #1
VMware Awards and Recognitions in 2018
DIGITAL ENTERPRISE 2019
163. 255
Our mission
We create an experience
that makes the cloud invisible and
easily to control so that our
customers can focus on transforming
their business
164. Agenda
256
VMware Introduction
Market position and our vision
Enterprise Digital Transformation
Why need to choose digital transformation
How to help our customer make the decision
What ‘s the Benefit for choosing VMware
Success Story
DIGITAL ENTERPRISE 2019
165. 257
Transformation goes pragmatic
As brands try to connect
to customers’ lifestyles
and habits, what real
purpose do they serve
in those moments?
RPA and AI technology
innovations will
combine to create
business value
Automation is often
placed in strategic and
operational terms.
Manufacturing
Retail.
Financial services
Transportation.
•
20% of brands will
refine and
revitalize purpose.
RPA and AI will join
forces to create digital
workers for more than
40% of enterprise.
25% of leaders will
use automation to
address the talent
scarcity squeeze.
---- source from : <<Predict 2019 Transformation goes pragmatic>>
Investors are
looking for the
industries top 4
list.
166. SaaS
Replatform
Keep app unchanged,
move to new
environment
Refactor
Modify app, new
environment, on-prem
or in the cloud
Multi-Tier Hybrid
Shift portions of multi-tier
app to public cloud
Replace
Move to SaaS
version of packaged app
Develop for Cloud
New cloud native app
deployed on-prem &
IaaS
Maintain
Keep app unchanged,
modernize environment
Cloud Native Apps
Time to market • Innovation • Scale • Differentiation
Existing Apps
Reduce Costs • Security • Reliability • Control
Application needs are driving IT strategies and directions
Data Center and Cloud solutions must match the needs of each application
167. AGILITY
Accelerate time to Market
Deliver new services that differentiate your business
Optimize Costs
Apply your IT budget based on ROI and
app requirements
Maximize Security
Unify security from the data center to the cloud and device
Manage Across Clouds
Manage cost, usage, capacity planning, performance,
and security across all clouds and on-prem
Scale Seamlessly
Seamlessly add resources across
private and public clouds, expand globally
COMPLEXITY
AND RISK
Extend to any Cloud
everage consistent infrastructure from data
center to the cloud
The Challenge for IT:
Increase IT agility while reducing complexity and risk
168. All software will run on a cloud
Enterprise‘s application to run on a cloud
Self-service Scalable Rich services
Secure,
compliant
Self-
optimized
Resilient
169. 261
VMware Cloud Management Platform
CMP as licensed software (vRealize)
Cloud
Assembly
Service
Catalog
Code
Stream
Application
Discovery
Log
Intelligence
Wavefront Network
Insight
CMP as a Service (VMware Cloud Services)
Hybrid Cloud Public Cloud
CONTAINERSVIRTUAL MACHINES KUBERNETESVM
Cloud
Health
Self-Driving Operations
Programmable
Provisioning
Application Operations
Cloud
Health
Cloud
Assembly
Service
Broker
Code
Stream
Wavefront
Log
Intelligence
Network
Insight
vRealize
Code Stream
2.4.2
vRealize
Network Insight
4.1
vRealize
Operations
7.5
vRealize
Log Insight
4.8
VMware
Integrated
OpenStack
5.1
vRealize
Automation
7.6
vRealize
Lifecycle
Manager
2.1
vRealize
Business
for Cloud
7.6
Cloud Management Platform
Consistent Developer Experience
170. 262
Industrializing Private Cloud
• DevOps for CMP with
vRS Lifecycle Manager
• AI/ML-based performance &
capacity optimization with
integrated automation & cost (vRA-
vRBC-vROps)
• Native integrations with
SDDC technologies, including VMC
on AWS
• Cloud Agnostic –
common approach to hybrid and
multi-cloud (AWS, Azure, GCP, VCPP,
and more)
• Developer-friendly
• VMs and Container-based
applications
• Leader in Forrester Private and
Hybrid Cloud Wave
• #1 market share in
4 IDC reports
• Positioned favorably
by Gartner
• Leader in Ovum
Decision Matrix
Why VMware
• Best for SDDC
and beyond
• Most Complete
• Trusted
Market Leader
172. 264
China Mobile
China Mobile Communications Corporation(CMCC) is a Chinese state-owned telecommunication corporation
that provides mobile voice and multimedia services through its nationwide mobile telecommunications network
across mainland China. China Mobile is the largest mobile telecommunications corporation by market
capitalization, and also the worlds largest mobile phone operator by total number of subscribers, with over 902
million subscribers as of June 2018.
CMCC began to set up its Public Cloud business in Inner Mongolia, because the power supply and the climate,
and thus comes the 139 Cloud of CMCC Inner Mongo.
Business issues VMware Solution Business Value
1. Construction Size: 62 Million
square meters , contains 18
datacenter building. And 52.5
thousand cabinets;
2. Total investment : $2 billion ;
3. Functions
• Public Cloud and virtualization
Resource pools
• Multi -tenants help enterprise
migrate application to cloud.
• Site Recover services protect
enterprise business available .
1. Storage has double protect method,
even storage failure doesn’t impact the
continuity of the operation;
2. base backup policy , all data are backup
in virtual tape device;
3. comprehensive security policy
• vvSphere
• vSAN.
• NSX.
Base on VMware SDDC and
SDN components build up
the public cloud.
VMwaer vSphere
174. 266
Yili Group
Yili Group has ranked among the world’s most successful dairy companies( rank 8), It is also the largest dairy
company in China. It offers the most comprehensive range of products. In the course of development, Yili has
always adhered “internationalization” and “innovation”, and insisted to the two fundamentals of “quality” and
“responsibility”. Every day, more than 100 million Yili products are delivered to consumers.
Business issues VMware Solution Business Value
1. International operation is an import
strategy of Yili,offers the most
comprehensive range of products
and serve for the more and more
people;
2. boost the innovation in the dairy
sector, develop the health and
suitable dairy products ;
3. updated Yili's global quality and
safety management systems ;
• Design the IT infra structure in
next 3 years to match the the
requirement of business growth
rapidly
• Build up Active-Active Data Center
and recovery site, support
Seamless data recover in local city
or 5 min recovery to another city.
• vCloud Suite advance
• vSphere、vSAN、NSX
• vxRail /DELL
1. build a bridge for the communication
and exchange of information that is
necessary for production plants,
completely present the situation of a
real time.
2. Yili uses the digital technology to collect
and monitor data, get data value and
turn into attractive models, improve
the quality of service.
3. Accelerate IT-infra agility, support more
management system go
live, improve system stability
177. Machine Data Insight Into The AI World
YANTAO HU
Senior Consultant
Splunk North Asia
DIGITAL ENTERPRISE 2019
178. Top Predictions for 2019 by Splunk
DIGITAL ENTERPRISE 2019
* Pulling together insights from our thousands of customers and our
dedicated research teams, our experts have assembled a shortlist of
the top predictions for 2019. - Splunk Predictions 2019
179. Top Predictions for 2019 by Splunk
DIGITAL ENTERPRISE 2019
Artificial Intelligence and Machine Learning as it breaks out of the lab
Security in the wake of heightened compliance regulations and
evolving digital environments
IT Operations as it transforms to focus on application mobility
IoT as it claims its stake in the modern organization
181. Nasdaq: Keeping Markets Moving
DIGITAL ENTERPRISE 2019
“ Splunk UBA gives us insight into internal threats and is a
unique data science-driven approach that automatically finds
unknown threats that traditional rule-based methods can‘t
match. ” - AVP, Nasdaq
• Using Splunk Enterprise to monitor potential external security
breaches and UBA to detect insider threats
• Analyst efficiency to gather data and speed security investigations has
increased by more than 50 percent
• Provides deep understanding of data and reusable correlation rules
across all support engineer levels
182. Splunk UBA: Active Directory Intelligence
DIGITAL ENTERPRISE 2019
Root of All Evil
Actual
Activities
Active
Directory
Events
Remote PowerShell
Go to CompB
- Login success
- Execute
UserA SrcComp
DstServ
PS
Admin$
IPC$
4688
4688
4648
4624
4768
4768
Domain Controller
internal
auth
4672
5140
5140
target
cmd
4688
SC
manager
4674
PS
4688
4624
4768
4624
Chaotic world of internal micro interactions
185. Vodafone Implementation of AI with Splunk
DIGITAL ENTERPRISE 2019
• Problem Statement
Efficiency and speed of service
restoration post planned and
unplanned outages to ensure:
Application uptime
Customer experience
Service fulfilment
Operation resource utilization
2-3 changes per week
• Requires dedicated and
coordinated efforts across
multiple teams
Complex architecture to meet business
requirements
• 12 core applications &
Complex integration to other
80
Long and complex restoration process to:
• Avoid dominos affect on
applications
186. Vodafone Implementation of AI with Splunk
DIGITAL ENTERPRISE 2019
• Splunk AI Solution
Intelligent decisions based on real time performance resulting in efficient queue throttling
Applied Machine Learning to predict ticket priorities, categories, assignees and resolutions
187. Vodafone Implementation of AI with Splunk
DIGITAL ENTERPRISE 2019
• Benefits realized
Cost Savings
Resource reduction
Man Hours Savings / Year
Up to 50% faster queue
throttling
AI & Machine Learning
Reduced SME
dependency
Opportunities
Further Artificial
Intelligence / ML within
Operations space
Customer Experience
Reduced issues and
time to BAU, enhances
Vodafone TNPS
188. DIGITAL ENTERPRISE 2019
• CBM In The German Public
Rail Transportation System
• Analyzing train door machine data
using Splunk Machine Learning
capabilities
• Maintenance & repair cost exceed
expectations
• Cost overruns influence the
operational result
• Failure of systems cause
interruptions of service
Condition-Based Maintenance Deutsche Bahn
190. Detecting Anomalies Using DBSCAN
DIGITAL ENTERPRISE 2019
DBSCAN
From Splunk
Machine Learning
Toolkit
Anomaly indicating door-locking malfunction!
Energy-consumption (Ampere) over recent
opening events
Deutsche Bahn
191. DIGITAL ENTERPRISE 2019
• Reduction of service interruptions
• Even distribution of stress to the mechanical components
• Foresight in failure-causing effects and when they occur
• Alerting and reporting at any moment through live-data
• Precise scheduling of maintenance cycles
Benefits of Implementing CBM
Overall cost reduction!
Deutsche Bahn
192. DIGITAL ENTERPRISE 2019
• Since deploying Splunk Phantom, Blackstone has seen benefits
including:
• Fast and accurate resolution of malware alerts
• Ensuring a repeatable and auditable process for investigating malware alerts
Splunk Phantom @ Blackstone
“Automation with Splunk Phantom enables us
to process malware email alerts in about 40
seconds versus 30 minutes or more.”
Adam Fletcher, CISO
Blackstone
193. DIGITAL ENTERPRISE 2019
1. Security Analyst
1. Extract attachments / Detonate in a malware sandbox /Catch the results
2. Extract URLs (from emails & attachments) / Check URL Reputation
3. Collect all IP’s involved (including sender, MTA) / Check IP reputation
4. Summarize Indicators of Compromise / Threat Intel
5. Search for Threat Intel. in your log data (Network Traffic, Proxy, Email, Email Filter,
Endpoint data sources) / Identify affected hosts and users
6. Document / The Security Analyst Hands Over to the Threat Responder
2. Response Through the Threat Responder
1. Block IP at the Firewall
2. Block URL at the Proxy
3. Block E-Mail Domain at the Spamfilter
4. Block URL & IP & Hash at the Endpoint Security
3. Malware Containment
1. Create Ticket for Service Desk
2. Service Desk cleanups host
3. Threat Responder validates cleanup was efficient
4. Ticket closed
Splunk Phantom @ Blackstone
45m
195. DIGITAL ENTERPRISE 2019
• Previous industrial revolutions
• Steam and the first machines that mechanized some work
• Electricity, the assembly line and the birth of mass production
• Computers and the beginnings of automation
• Next stage so called smart factory
• Design principles
• Interoperability
• Information transparency
• Decentralized decisions
• Technical assistance systems
Industry 4.0 at the BMW Group
196. DIGITAL ENTERPRISE 2019
Technical assistance system for rework process
Break Test Battery
Test
Chassis
Test
(Re-)
Workers
Rework
Protocols+
Test and
Error
Events
ID 12: Assignment
Error at Airbag
Control Unit Init-Test
ID 23: Operating
Voltage too low
at Steering Wheel
Test
defectiveversion wrong
unit unlock
airbag control
changed
unit version wrong
ID 45: Cannot Read
Variable
AIRBAG_SENSOR_VA
LUE
197. DIGITAL ENTERPRISE 2019
What to do with Splunk MLTK
Error Patten / Building Clusters
Clustering using Custom Splunk-ML-Algorithm:
• Spectral Clustering with a custom affinity
function
• Determines the group (color) of closely
linked errors
Forming the complete hierarchy (all nodes up
to the root) of reworking categories
198. DIGITAL ENTERPRISE 2019
Achievement
Provide an assistance system
Support the workers with the
"experience" that we can
draw from the historic data
Give qualified
recommendations for
reworks
Fix errors before subsequent
errors occur
Optimization of rework
logistics
Error Classes Error Patterns
Mapping
Rework
Categories
Hierarchy of
Rework
Categories
Recommen-
dations
200. DIGITAL ENTERPRISE 2019
Industry 4.0 – Use Case on the shop floor
Industry 4.0
• The 1st Realtime Usage Dashboard of Shop Floor at Porsche
• Data from the supply chain and unstructured data get together
• End-to-End View of All Production Stations
• Station Health Status Monitoring, Deep Dive, and Predictive
Analysis