66
© 2013 IBM Corporation Welcome and introduction to the conference Peter Ellegaard Country Manager Cloud & Smart Infrastructure Denmark (Tivoli) May 28th 2013 Lokomotivværkstedet Copenhagen

Pulse Comes To You Intro

Embed Size (px)

Citation preview

Page 1: Pulse Comes To You Intro

© 2013 IBM Corporation

Welcome and introduction

to the conferencePeter EllegaardCountry Manager Cloud & Smart Infrastructure Denmark (Tivoli)

May 28th 2013Lokomotivværkstedet Copenhagen

Page 2: Pulse Comes To You Intro

2

The Venue

Lokomotivværkstedet +100 years old listed building Danish railway history Lokomotiv maintenance 9.000 m2

One of few possible places Nordic event More than 500 attendees 5 tracks Exhibition hall Dinner / Lasse Rimmer 1:1 meetings 4 User Group meetings

New experience Virtual space division Headphones needed Leave headphones on chair

Page 3: Pulse Comes To You Intro

3

Cloud & Smarter Infrastructure (Tivoli)

Tivoli®

Page 4: Pulse Comes To You Intro

4

Visibility

Control

Automation

to see and understandyour business in real time

to transform and adaptwhile limiting risk & cost

to achieve greater efficiency and agility

Turning Opportunities Into Outcomes

Business

IT

Page 5: Pulse Comes To You Intro

5

What Is Driving new Opportunities and IT Demand

Explosion of Mobile Devices

Infrastructure OptimizationCloud Computing

Growth of Social Media

Advanced Predictive Analytics

Real-time Sensor DataCyber Security

Business Optimization

+Big Data

Business Optimization

+Big Data

Page 6: Pulse Comes To You Intro

6

The 5 main tracks

Page 7: Pulse Comes To You Intro

7

Agenda Morning

Page 8: Pulse Comes To You Intro

© 2013 IBM Corporation© 2013 IBM Corporation

Turning Opportunities into OutcomesMoe Abdula, Vice President, IBM SmartCloud Foundation Portfolio Strategy

Page 9: Pulse Comes To You Intro

9

Internet of information

Internet of engagement

Internet of “things”

200 BILLION

100 BILLION

50 BILLION

INTERMITTENTLY CONNECTED DEVICES AND PEOPLE2000 2020 2010

The convergence of technology is transforming the world into an Internet of things…

Page 10: Pulse Comes To You Intro

10

Fuels investments in

innovation

Drives need for continuous

optimizationOptimization Innovation

The ability to balance Optimization and Innovation will be critical to success…

10

Page 11: Pulse Comes To You Intro

11

41%experience

development delays

34%experience

deployment delays

45%experience

production delays

Source : A commissioned study conducted by Forrester Consulting on behalf of IBM, 4Q2011

However, organizations are challenged in Optimizing product & service delivery, and in turn, driving Innovation….

11

Business OperationsDevelopmentCustomers

Page 12: Pulse Comes To You Intro

12

An open, and holistic approach to managing the delivery of products & services across smarter infrastructures is needed…

12

Page 13: Pulse Comes To You Intro

13

IBM provides an open, and holistic approach to managing the delivery of products & services across smarter infrastructures…

Page 14: Pulse Comes To You Intro

14

Cloud Computing: A Next Generation Cloud Architecture

Built upon a Cloud standards architecture

Patterns of Expertise

Workload Optimization

Dynamically Orchestrated Services

Page 15: Pulse Comes To You Intro

15

Cloud Orchestration

Services • Storage • Network

Cloud Service Management

Images • Patches • Threats

Cloud Service Delivery

Visibility • Control • Automation

Open Service Lifecycle Collaboration

Intelligent Cloud Workloads

Virtualization

Computing Resources

Cloud Computing: Extending value & optimizing investments…

Page 16: Pulse Comes To You Intro

16

An integrated set of capabilities for enabling private/hybrid clouds andthe virtualization, automation and management of service delivery

Cloud Computing: IBM SmartCloud Foundation

Virtualized Standardized Automated

Infrastructure as a Service Capabilities

Infrastructure UsagePerformanceManagement Security

Platform as a Service Capabilities

Lifecycle Resources Environments Management Integration

Resilient to the velocity of changing business needs

Enables choice & flexibility in hybrid environments

Provides enterprise-class, workload-aware services

Built-in analytics for improved insight and decision making

16

Page 17: Pulse Comes To You Intro

17

Cloud Computing: Flexibility in consuming & integrating hybrid clouds…

Evolve existing infrastructure

to Cloud

Accelerate adoption with

expert integrated systems

Immediate access to a managed platform

Enterprise

Hosted private cloud

17

Page 18: Pulse Comes To You Intro

18

Cloud Computing: Client Case Studies

Technical University of Munich Cloud Platform, Orchestration & Monitoring

• Reduced manual workload by about 40% and provisioning time for SAP systems from 3 days to less than ½ day.

• Replaced 150 servers with just four IBM systems, cutting 13 full racks to only four half-full racks.

• Reduced energy consumption by 80% for the SAP application landscape. Data storage reduction by 40%.

Aetna Cloud DevOps and Orchestration

• DevOps enables better, faster product development via self-service automation

• Anytime, anywhere access to healthcare services for clients using mobile & cloud

• Removed siloes by creating single role of cloud engineer that spans domains.

18

Page 19: Pulse Comes To You Intro

19

IBM provides an open, and holistic approach to managing the delivery of products & service across smarter infrastructures….

Page 20: Pulse Comes To You Intro

20

Enterprise Mobility: Why take an integrated approach?

Speed time to deployment of enterprise mobile apps and updates, while improving quality

Improve WiFi network management for greater reliability, employee productivity, and minimize business interruptions

Enhance end-to-end security to help prevent loss of intellectual property and regulated data

Less total infrastructure for lower hardware, admin costs

Reduce help desk calls, device replacement costs

20

Page 21: Pulse Comes To You Intro

21

Enterprise Mobility: Manage and secure all your devices

Endpoint Management

SystemsManagement

Security Management

Common agent

Unified console

Single management

server

Managed = Secure

Desktops, Laptops, & Servers

Smartphones & Tablets

Purpose-specific Endpoints

Implement BYOD withconfidence

Secure sensitive data, regardless of device

Handle multi-platform complexities with ease

21

Page 22: Pulse Comes To You Intro

22

Enterprise Mobility: The Industry’s Most Comprehensive Mobile Portfolio

The Broadest Portfolio of Mobile Solutions

The Deepest Set of Services Expertise

New Industry Partnerships and Resources for Developers

22

Page 23: Pulse Comes To You Intro

23

23

Enterprise Mobility: Client Case Studies

CenterBeamUnified Mobile, Desktop, and Server Management

• Can now support PCs, Macs, servers, and virtually every flavor of mobile device, increasing compliance over 20% to 98%

• Now manage 20,000 endpoints across 49 countries and six continents, a 10x increase, with just one engineer

• Mitigating client risk with strengthened endpoint security

North American Public UtilityMobile device and Endpoint Management

• Support 20,000 mobile devices - corporate and employee owned - with mixed platform and OS versions

• Add mobile devices in just days, while adhering to internal security policies and external regulations.

• Solution is scalable to 250,000 endpoints without adding infrastructure

Page 24: Pulse Comes To You Intro

24

IBM provides an open, and holistic approach to managing the delivery of products & service across smarter infrastructures….

Page 25: Pulse Comes To You Intro

25

Smarter Physical Infrastructure: Instrumented, Interconnected, Intelligent

A comprehensive set of integrated enterprise capabilities that help organizations to keep plants, facilities, data centers, or cities operating effectively.

• Dashboard views of service health• Predictive analytics & reporting• Mobile workforce support• Asset, work and inventory management

• Complex & embedded systems

• IT & Enterprise assets

• Facilities & real estate• Event filtering and correlation• Process & workflow automation,

and rules management• Enterprise content management

Process Automation

Facilities andReal Estate

EnterpriseAssets

Complex and Embedded Systems

Analytics Mobility

25

Page 26: Pulse Comes To You Intro

26

26

Facilities & Real Estate

Transportation & Fleet

Linear Assets

Plant & Production

IT & Network Equipment

Smarter Physical Infrastructure: End-to-end asset management

26

Page 27: Pulse Comes To You Intro

27

27

Smarter Physical Infrastructure: Client Case Studies

Halifax International Airport Authority Preventative Asset Monitoring, Management & Reporting

• Corrective maintenance on assets reduced from 80 percent to only 10 percent

• Number of work orders the service department can handle increased from 450 to 1,000, a 55 percent increase

• Airport is better prepared for weather events and track costs more effectively; Improved regulatory reporting.

Akita CityPredictive Facilities & Energy Management

• Real-time sensors, & 3D color-coded views allow city to predict energy use, and immediately reduce consumption to meet targets.

• Expected 6 percent reduction in energy consumption through better visibility and control over city facilities’ energy usage

• Improve preventive maintenance, and compliance with Revised Energy Saving Law.

INSERT

LOGO

Page 28: Pulse Comes To You Intro

28

IBM provides an open, and holistic approach to managing the delivery of products & service across smarter infrastructures….

Page 29: Pulse Comes To You Intro

29

Security Intelligence,Analytics and GRC

Ap

plic

atio

ns

Peo

ple

Dat

a

Infr

astr

uct

ure

Mobile Security

Cloud Security

Security Intelligence with

Big Data

Security Intelligence: Across big data, mobile & cloud

Page 30: Pulse Comes To You Intro

33

Security Intelligence: Client Case Studies

BlueCross BlueShield of North CarolinaSecuring Big Data

• Directly supports HIPAA compliance by controlling access to client member data

• Saves 5,000 hours of staff time by removing manual steps and automating security processes

Flemish GovernmentSecuring Digital services

• Authentication flexibility ensures compatibility with future access requirements including cloud and mobile services

• Significantly reduces the time and cost to introduce new applications across100 government sites

• Provides six million citizens with seamless access to all Authorities’ services with context-aware digital identities

INSERT

LOGO

33

Page 31: Pulse Comes To You Intro

34

OSL C Specs Linked Data

AUTOMATIONVISIBILITYCONTROL

Reporting

RegistrySecurity

Dashboarding

Administration

Open Interoperability

Services

Only IBM provides a holistic approach that enables Visibility, Control & Automation across smarter infrastructures…

unnecessary risk and cost

outcomes from limited investments

with agility to changing landscapes

ReduceAchieveReact

34

Page 32: Pulse Comes To You Intro

© 2013 IBM Corporation

Bring Your Own Disaster -The Security Risk and Challenges of BYOD (From a hacker’s perspective)Martin Overton, Ethical Hacker, IBM Security ServicesLead and Senior Security Consultant, Cyber Security Intelligence and Response Team

May 28th 2013Lokomotivværkstedet Copenhagen

Page 33: Pulse Comes To You Intro

36

Agenda

What is BYOD?GrowthThreatscapeIssues and ProblemsSolutionsConslusions

Page 34: Pulse Comes To You Intro

37

What is BYOD an Why Should You Care?

“BYOD is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and PDAs – to the workplace for use and connectivity on the corporate network.” - Source: http://www.webopedia.com/TERM/B/BYOD.html

Source: Intel (1. Gartner, 2. ReadWrite.com Survey)

Page 35: Pulse Comes To You Intro

38

2,641,350The Average Company Faces Per Week

Security Attacks1. Health & Social Services2. Transportation3. Hospitality4. Finance & Insurance5. Manufacturing6. Real Estate7. Mining, Oil & Gas

Top 7 Most ATTACKED Industries

62Security IncidentsThe Average Company Experiences Per Week

1. End user didn’t think before clicking2. Weak password / default password in use3. Insecure configuration4. Use of legacy hardware or software5. Lack of basic network security protection or segmentation

Top 5 reasons WHY attacks were possible

Did you know...

Malicious Code

Sustained Probe or Scan

Unauthorized Access

Low-and-Slow Attack

Access/Credentials Abuse

Denial of Service

What IBM SeesCategories of Attack

Page 36: Pulse Comes To You Intro

39

Number of vulnerabilities increase radically with emergence of new business models and technologies.

Mobility

Employees, customers, contractors, outsourcers

Bring your own IT

Social business

Cloud and virtualization

1 trillion connected objects (cars,

appliances, cameras)

30 billion RFID1 tags (products,

passports, buildings and

animals)

1 billion workers will be remote or

mobile

1 billion mobile Internet users

30 percent growth of 3G devices33 percent of all new business

software spending will be Software as a Service

Source: IBM X-Force® Trend Report, 2011

Exponentially growing and interconnecteddigital universe

Adopting new business models and embracing new technologies

Page 37: Pulse Comes To You Intro

40

To stay ahead focus on disrupting the attackers capability, timeline and impact

Security Risk Management is the application of control to detect and block the threat, to detect and fix a vulnerability, or to respond to incidents (impacts) when all else fails.

Threat

Can exploit

Vulnerability Impact

(Weakness)(Actor) (Loss)

And cause

Security risk exists when …

“The more the environment changes, the more the opportunities exist for risk.”

Page 38: Pulse Comes To You Intro

41

In IBM’s recent 2012 Chief Information Security Officer Study, security leaders shared their views on how the landscape is changing.

Source: IBM 2012 CISO Assessment http://www.ibm.com/smarterplanet/us/en/business_resilience_management/article/security_essentials.html

Nearly two-thirds say senior executives are paying

more attention to security issues.

Two-thirds expect

to spend more on security over the next two years.

External threats

are rated as a bigger challenge than internal threats, new technology or compliance.

More than one-half say

mobile security is their greatest near-

term technology concern.

Page 39: Pulse Comes To You Intro

42

Motivation and Sophistication is Evolving Rapidly

Attackers have more resources

Off-the-shelf tools are available for sale

They will keep trying until they get in

Page 40: Pulse Comes To You Intro

43

The new security landscape - Sophisticated attackers are a primary concern

Threat Profile TypeShare

of IncidentsAttack Type

Advanced threat / mercenary

National governments

Terrorist cellsCrime Cartels

23%

Espionage Intellectual property theft Systems disruption Financial Crime

Malicious Insiders

EmployeesContractorsOutsourcers

15%

Financial Crime Intellectual Property Theft Unauthorized Access/

Hacktivist Social Activists 7%

Systems disruption Web defacement Information Disclosure

OpportunistWorm and virus writers

“Script Kiddies”49%

Malware propagation Unauthorized Access Web defacement

Po

ten

tia

l Im

pa

ct

Source: Government Accountability Office, Department of Homeland Security's Role in Critical Infrastructure Protection Cybersecurity, GAO-05-434; IBM CyberSecurity Intelligence & Response Team, Sep 2012

Page 41: Pulse Comes To You Intro

44

Threat Convergence Replacing Threat Evolution

Threat Evolution:– A flat world has brought about

an unprecedented amount of

criminals and cons

– Attackers keep ROI in mind

as well, and constantly evolve

their wares in order to re-

purpose it for the next flood of

attacks

– High profile vulnerabilities will

still be the vehicles for new

attacks, however, the low and

slow attack vectors cannot be

ignored

– The economics of exploitation

must be taken into

consideration to better

prioritize risk

Page 42: Pulse Comes To You Intro

45

Adversary compromises endpoint used by a systems administrator with undetectable malware.

– The malware has two components: 1) A keystroke logger to capture credentials 2) Command and control capability

Here is the anatomy of a targeted attack. With credentials and command and control

malware, adversary impersonates the Sys Admin to gain privileged access to systems and data.

Data is stolen, and production systems are further compromised.

1Advanced persistent threat (APT)

People

Endpoints

Applications

Infrastructure

Data

Privileged user

Employees

Contractors

Consultants

Suppliers

Customers

Web applications Mobile apps

Unstructured At rest In motionStructured

Customer environment

System applications

APT1 and hacker, or activist

Page 43: Pulse Comes To You Intro

46Source: Intel

Page 44: Pulse Comes To You Intro

47

BYOD Problems

Organisation Level Issues:– Un-trusted devices on your network.– No idea if the device has been hacked or infected.– Who owns the data? The device owner or you?– How can you stop an (ex-)employee leaving with your intellectual property or

customer data?– What happens when a security breach occurs?– Are you going to insist on Whole Disk Encryption?– Patches, security software, so many different vendors, Operating Systems and

versions to contend with… Personal Issues (Device Owner):

– Your device may get seized (confiscated) as part of an investigation.– Privacy issues; your personal data on your personal device may be reviewed.– What happens when the device fails or gets stolen? Who’s responsible for fixing or

replacing it?

Page 45: Pulse Comes To You Intro

48

IBM is well qualified to secure the enterprise.

Major employee sites

Customer fulfillmentManufacturing

Employee Service Centers

IBM Research CentersIBM Internal Data Centers

2,000-plus major sites 170-plus countries

400,000-plus employees About 200,000-plus

contractors

One of the largest and most complex internal IT infrastructures in the world 800,000-plus traditional endpoints About 50 percent of employees are

mobile

Page 46: Pulse Comes To You Intro

49

Suggestions and Solutions

Ensure that security best practices are followed Use Whole-Disk-Encryption to protect data Ensure staff understand their responsibilities and the risks of BYOD Enforce security controls as well as patching Enforce the use of strong passwords/passphrases Educate staff about social engineering (phishing, scams, etc.) Partner with a vendor that can ensure end to end security of your

infrastructure as a whole, not just BYOD Use the IBM 10 point guide (next slide) to assist you Remember that security is, and always will be, a journey and not a

destination…..Their is NO silver bullet and no 100% security

Page 47: Pulse Comes To You Intro

50

Manage incidents with intelligence2

IBM uses a ten essential practice approach to better manage IT Risk and protect client reputations

Risk-aware culture and management1

Defend mobile and social space3

Security-rich services, by design4

Automatic security “hygiene”5

Control network access 6

Address cloud and complexity 7Manage third-party compliance 8

Secure data, protect privacy 9

Manage the identity lifecycle 10

Maturity-based approach

Proactive

Au

tom

ate

dM

an

ua l

Reactive

ProficientBasic

Optimized

Securityintelligence

Learn more about IBM’s Ten Security Essential Practicesibm.com/smarter/cai/security 

Page 48: Pulse Comes To You Intro

51

Expertise: Unmatched global coverage and security awareness

20,000+ devices under contract 4,000+ MSS clients worldwide 13B+ events managed per day 3,000+ security patents 133 monitored countries (MSS)

World Wide Managed Security Services Coverage

Security Operations Centers

Security Research Centers

Security Solution Development Centers

Institute for Advanced Security Branches

IBM Research

Page 49: Pulse Comes To You Intro

52

Conclusions…

BYOD is a double-edged sword…– Brings great cost savings and power to organisations– However, this quote covers the issues well “With great power comes great

responsibility”*– That responsibility is shared between the device owner and the organisation; both

have to have security in mind at all times…– Failure to do so will lead to loss of confidential data or intellectual property (or

both) BYOD is a real game changer…

– The owner of the device is more likely to treat is with more care if it is their own…– The cost savings could be immense, just on the hardware side alone

BYOD is here and it isn’t going away…– So deal with it, don’t dismiss it as a passing fad…– Secure all devices, stop unsecured devices from accessing your network until

they are secured and match your security policy and standards…

* Who is this quote attributed to?

Page 50: Pulse Comes To You Intro

© 2013 IBM Corporation

Introduction to the IBM and Business Partner exhibitionPeter EllegaardCountry Manager Cloud & Smart Infrastructure Denmark (Tivoli)

May 28th 2013Lokomotivværkstedet Copenhagen

Page 51: Pulse Comes To You Intro

54

The virtual space division

Main session – Keynote

Exhibition area – Lunch - Refreshments

Page 52: Pulse Comes To You Intro

55

Exhibition area

Page 53: Pulse Comes To You Intro

56

Exhibition area

Page 54: Pulse Comes To You Intro

57

Exhibition area

Page 55: Pulse Comes To You Intro

58

May 28th 2013Lokomotivværkstedet Copenhagen

Page 56: Pulse Comes To You Intro

59

Smarter Physical Infrastructure

Bus

ines

s P

artn

ers

& I

BM

Exh

ibiti

on S

tand

s

Page 57: Pulse Comes To You Intro

60

Storage Management

Bus

ines

s P

artn

ers

& I

BM

Exh

ibiti

on S

tand

s

Page 58: Pulse Comes To You Intro

61

IT Optimization and Service Management

Bus

ines

s P

artn

ers

& I

BM

Exh

ibiti

on S

tand

s

Page 59: Pulse Comes To You Intro

62

Mobility in the Enterprise

Bus

ines

s P

artn

ers

& I

BM

Exh

ibiti

on S

tand

s

Page 60: Pulse Comes To You Intro

63

Security

Bus

ines

s P

artn

ers

& I

BM

Exh

ibiti

on S

tand

s

Page 61: Pulse Comes To You Intro

64

Planed events – go to registration

Smarter Business 2013 Denmark• Join the largest IBM event this year• Mark your calendar Oct 8th - Bella Center Copenhagen• SW business solutions from IBM and Business Partners• Keynote: Bruce Dickinson, Lead singer in Iron Maiden

Entrepreneur, Author and inspiring speaker

C&SI (Tivoli) Austin & Silicon Valley Study tour• Visit IBM Briefing centers in Austin TX & San Jose CA• IT Managers and IT decision makers• Mark your calendar Nov 5th - 10th • Service Management, Storage Management and Mobility - SW solutions• Pure Systems and Storage - HW Solutions• Hotel and flight expected to be DKK 15.000

Page 62: Pulse Comes To You Intro

65

User Group meetings at Pulse Comes to You

Check the agenda for tomorrow

Tivoli User Group meeting Host: Hans Peder Thomsen

European IBM Security User Group meeting Host: Sven-Erik Vestergaard

Maximo & SmartCloud Control Desk User Group meeting Host: Jens Cajus Petersen

TSM User Group meeting Host: Marianne Husted Larsen

User Groups – May 29th

Page 63: Pulse Comes To You Intro

66

Evaluation

Special Danish Licorice by Johan Bülow for filling the evaluation form

Networking by scanning CR code

NameCompanyTitlePhone numbere-mail

Page 64: Pulse Comes To You Intro

67

The virtual space division

Exhibition area – Lunch - refreshmentsExhibition area – Lunch - Refreshments

1:1 Meetings Dinner tonight

Page 65: Pulse Comes To You Intro

68

Agenda today

Page 66: Pulse Comes To You Intro

69

May 28th 2013Lokomotivværkstedet Copenhagen