Morgan Stanley Digital Day. London, March
|
|
- Maria Phillips
- 6 years ago
- Views:
Transcription
1 Morgan Stanley Digital Day London, March
2 Atos business profile 2016 revenue: 11.7 billion By Division By Business Unit By Market 6% 27% 11% 56% 11% 8% 17% 18% 17% 20% 17% 35% 14% 15% 28% Infrastructure & Data Management Business & Platform Solutions Big Data & Cybersecurity Worldline North America Germany United-Kingdom & Ireland France Benelux & The Nordics Worldline Other Business Units 2 Manufacturing, Retail & Transportation Public & Health Telcos, Media & Utilities Financial Services
3 Current Atos delivery model evolution Worldline Unify Business & Platform Solutions Infrastructure & Data Management Big Data & Cybersecurity epayment SMAC Cloud Orchestration Big Data Cybersecurity Contactless payment Unified communication Data analytics Autonomics Sociable collaboration IoT ID & access management Transactional services aas application & management Encryption Online acquiring Openscape Circuit Cognitive Processing power bullion HPC Exascale Agile development Quantum computing Military grade security Time 3
4 A Group deeply transformed over the last 7 years Revenue 5.6 bn 11.7 bn x2 Operating margin 0.3 bn 1.1 bn x4 Free cash flow -0.1 bn 0.6 bn +0.7 bn Workforce 51K employees c. 100K employees x2 Market cap. 1.2 bn c bn x10 4
5 6 technological breakthroughs will mark the 3 rd numeric wave Data Pilots the Process Data Pilots The experience Client We are here Mainframes Web & mobile Internet of devices Data Pilots the business 1) Exascale 2) Artificial Intelligence 3) 5G 4) Swarm computing 5) Blockchains 6) Homomorphic & quantum-safe encryption 5
6 1 Power multiplied: Exascale Supply computing power as strong as that of the human brain, and then some Resolve complex problems currently impossible to handle: Industry 4.0 Fine climatology Personalized medicine Extensive risk analysis Prescriptive intelligence Exascale should be accomplished by and the singularity by sequana: the most efficient computer in the world bullion: server x86 the fastest in the world 6
7 2 Facilitated decision: Artificial Intelligence Pave the way for machines that learn by themselves, reason and naturally integrate with humans Break the traditional barriers between neuroscience and computing Analyze multiple heterogeneous data sources to find connections there Redefine the relationships between man and the digital environment Atos a pioneer in robotics & cognitivism 7
8 3 Real-time connectivity: 5G Be able to connect, in time, to trillions of devices on the internet, serving billions of people in real time Reduce network latency to <1 ms to generalize real-time (connected car ) Support mobile hyper-connectivity (HD TV, videoconference, enhanced reality ) Facilitate dynamic auto-reconfiguration of networks and devices in real-time 70% of Telcos rely on Planned deployment: Atos 8
9 4 Distributed robotics: Swarm computing Knowing how to respond to uncertainty by allowing vast ecosystems of intelligent agents and objects to self-organize and adapt in real-time Connect central intelligence to the intelligence distributed from the hive Permit the emergence of systems adapting to all types of evolving and complex contexts: Smart cities Medicine (nanorobots) Interior security Advanced research with Siemens 9
10 5 Reinvented confidence: the Blockchains Guarantee secure transactions in peer-to-peer mode without third parties with confidence Transform the transactional value chain between Customers & users Suppliers Financial intermediaries Regulators A revolution in progress for: Payments Currency (i.e. bitcoin) Healthcare transactions Digitalized agreements 10
11 6 Future confidentiality: homomorphic encryption and quantum-safe encryption Create encryption algorithm Adapt to the generalization of the Cloud Virtually unbreakable by future computing power Atos Pioneer of encryption 11
12 What does Atos brings to its customers in order to benefit from these disruptions? Customer experience Operational excellence Business reinvention Trust & compliance 12
13 Atos Canopy Orchestrated Hybrid Cloud SAP HANA by Atos Atos Digital Workplace Atos Codex Building the Atos Digital Transformation Factory epayment SMAC Cloud Orchestration Cybersecurity Big Data Contactless payment Unified communication Data analytics Autonomics Sociable collaboration IoT ID & access management Processing power Transactional services aas application & management Encryption Openscape Cognitive Bullion HPC Exascale Online acquiring Circuit Agile development Military grade security Quantum computing With vertical offerings Manufacturing, Retail & Transportation Financial Services Telecom, Media & Utilities Public & Health 13
14 collect store analyze predict activate Codex = COgnitive DEcisions and Execution The answer to transform data into business outcomes =
15 Atos Codex in 2017 Analytics, Cognitive and IoT Industry leading HPC, HPDA computing New logo momentum! 100+ Atos Codex engagements in 2016 Ready to deploy, technology with enhanced multicloud capabilities Agile proof of values that scale rapidly to industrialized analytics platforms Global player c. 500m annual revenue 15
16 Full end-to-end SAP HANA service provider A strong foundation to address a new dynamic market 12,000+ skilled SAP professionals Global SAP-certified in Hosting, SAP HANA Operations, Cloud and AM services SAP-certified bullion server for SAP HANA up to 16TB 50+ S/4HANA projects Built and manages one of the world s largest HANA Private Cloud 3 million SAP End-Users supported 16
17 Siemens SAP HANA reference 49 Landscapes 219 SIDs 500 TB HANA Memory 3.5 PB Data >2000 Servers >300% Faster ERP reporting 9.5x Faster COPA Processing 6x Faster PS Processing >3x Faster MM Processing >300 Bullion HANA appliances 17
18 Why our clients need Atos Cybersecurity More devices More valuable data More complexity More targets Perimeter security vanishes More attacker reward Cyber crime takes a quantum leap More vulnerabilities (in)security through obscurity 18
19 Atos Cybersecurity: a business-driven approach ASSESS Consulting DEFEND SOCs & Forensics BUSINESS DRIVEN SECURITY GARANTEE IoT & Data Security ENABLE IAM & secure coms 19
20 Cybersecurity for the Olympic Games 200,000 Testing hours Sorry! Can you try again? We were re-booting! 300,000 + Accreditations 400 IT security events per second IT security events 0 Impact on the games 20
Patrick van der Griendt Atos International GSI SAP SAP HANA
25-09-2014 Patrick van der Griendt Agenda 1 The new Atos 2 Our SAP capabilities 3 Our SAP HANA Journey 4 Key Takeaways 2 25-09-2014 Patrick van der Griendt Agenda 1 The new Atos 2 Our SAP capabilities
More informationAtos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC
Atos Canopy Orchestrated Hybrid Cloud Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Cloud Animation Video 02-03-2017 Addressing Customer Challenges in all verticals With
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationREALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware
REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market
More informationNOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB
NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB Discussion topics Introductions The digital transformation Innovating at scale How
More informationModernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure
Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations
More informationQ1 Revenues. Paris April 26 th, 2017
2017 Q1 Revenues Paris April 26 th, 2017 Disclaimer This presentation does not contain or constitute an offer of securities for sale or an invitation or inducement to invest in securities in France, the
More informationSECURING THE CONNECTED ENTERPRISE.
SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE
More informationNo Industry 4.0 without Security
24-04-2017 No Industry 4.0 without Security 24-04-2017 Introduction to Atos and Industry 4.0 Who is Atos? At a glance Revenue 2016 (M EUR) * Employees 2016 (Global) Employees 2016 (Germany) Countries 12,000
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationCardOS Secure Elements for Smart Home Applications
Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.
More informationQ revenue. Bezons April 25, 2018
Q1 2018 revenue Bezons April 25, 2018 Disclaimer This document contains forward-looking statements that involve risks and uncertainties, including references, concerning the Group's expected growth and
More informationNew Digital Business Models Driving the Softwarization of the Network
New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:
More informationCybersecurity Lessons learned from the energy sector. Reach a safe harbour. Obtaining knowledge. Summary. Challenges and opportunities
Summary Cybersecurity Lessons learned from the energy sector 1. Reach a safe harbour 2. Obtaining knowledge 3. Unexpected discoveries? 4. -Driven technologies for Digital disruption 5. Ambition and Approach
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationCOST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE
2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationQ3 Revenues. Paris October 29th, 2015
2015 Q3 Revenues Paris October 29th, 2015 Paul HERMELIN A solid execution of our strategy 3,036M revenue +17.2% current growth Bookings growth +20% YoY, incl. IGATE 21% SMAC revenue growth in Q3 YoY 20%
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationThe impact of digital transformation on industries
Headline Verdana Bold The impact of digital transformation on industries Tim Hanley, Deloitte Global Leader, Consumer & Industrial Products Industry group March 2017. Sao Paolo, Brazil What we will cover
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationInformation pack. #AtosGovCloud Making the world a better place
Information pack #AtosGovCloud Making the world a better place Executive Summary Challenges for governments in a fast-changing world We are living in times of seismic change for governments and public
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationS3C Smart Consumer, Smart Customer, Smart Citizen : The Digital 3C Transformation
S3C Smart Consumer, Smart Customer, Smart Citizen : The Digital 3C Transformation Maher Chebbo, General Manager Energy EMEA, SAP Chairman of ETP SmartGrids Demand Group & Digital initiative President of
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationQ revenue. Bezons October 24, 2017
Q3 2017 revenue Bezons October 24, 2017 Disclaimer This document contains forward-looking statements that involve risks and uncertainties, including references, concerning the Group's expected growth and
More informationThe fast-track to NFV
The fast-track to NFV Five years from now, there will only be two kinds of telco: those that have put NFV at the heart of their network architecture and business model, and those that fail. The challenge
More informationSupporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains
Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer
More informationCognitive Security in the Era of Always Online. Yiannis Giokas VP R&D
Cognitive Security in the Era of Always Online Yiannis Giokas VP R&D Our Parent Company: HKT PCCW Global is an international operating division of HKT, Hong Kong s premier telecommunications service provider,
More informationID Synchronization for a multi-directory identity repository
evidian ID Synchronization for a multi-directory identity repository Introduction Building an identity repository is at the heart of identity and access management. In fact, no matter the quality of an
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationVision of the Software Defined Data Center (SDDC)
Vision of the Software Defined Data Center (SDDC) Raj Yavatkar, VMware Fellow Vijay Ramachandran, Sr. Director, Storage Product Management Business transformation and disruption A software business that
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationMicro Focus Partner Program. For Resellers
Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationRichard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel
Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationPrescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC
Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationH results. Bezons July 26, 2017
H1 2017 results Bezons July 26, 2017 Disclaimer This document contains forward-looking statements that involve risks and uncertainties, including references, concerning the Group's expected growth and
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationRIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015
www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
PBO1046BES Simplifying the Journey To The Software Defined Datacenter Tikiri Wanduragala Senior Consultant Data Center Group, Lenovo EMEA VMworld 2017 Geoff Hunt Senior Product Manager Data Center Group,
More informationThe Programmable World Opportunities and Challenges
The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationHybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018
V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationBull Trustway DataProtect. Securing your end to end infrastructure with unified encryption
Bull DataProtect Securing your end to end infrastructure with unified encryption How to ensure data security and bring compliance? Cyberattacks, negative consequences, impact on the brand image We live
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More information21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING
WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationGlobal Supply Chain Innovation Summit Digital Integration from Order to Manufacturing and Delivery
Global Supply Chain Innovation Summit Digital Integration from Order to Manufacturing and Delivery Thursday, 3 November, 2016 13:50 14:40 Laurent Carré Mobile Networks COO Supply Chain and Procurement
More informationSecurity Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018
Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationTHE RISE OF THE MODERN DATA CENTER
THE RISE OF THE MODERN DATA CENTER 1 Companies have invested heavily in this enterprise-applicationrelated infrastructure, peaking in recent years at around 2.7 trillion US dollars. THE TIME FOR TRANSFORMATION
More informationMonetizing 5G the disruption of traditional telco business models
www.pwc.com Monetizing 5G the disruption of traditional telco business models 4 July 2018 Service s are facing a saturated market and declining margins due to the commoditizing of connectivity services
More informationVirtualizing Networks:
Trend Report Virtualizing Networks: The IT Perspective Increase efficiency, scalability, and cost efficiency in the digital age Table of Contents Introduction 3 Managing Enterprise Networks in a Big Data
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationBusiness Continuity & Disaster Recovery
knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More informationData Center 3.0 Shift to IT as a Service with Your Own Private Cloud
Fujitsu Forum Munich 2013 Data Center 3.0 Shift to IT as a Service with Your Own Private Cloud Georg Houben, Head of Private Cloud Infrastructure Portfolio, Fujitsu International Business Harald Bernreuther,
More informationGuatemala July 31st, 2018
Guatemala July 31st, 2018 Make It Real Modernize your IT Infrastructure with Dell EMC ARTURO BENAVIDES MDC, LATIN AMERICA What do you see? 4 Poll Did you see: 1. The young man? 2. The cell phone? 3. The
More informationEvolution of connectivity in the era of cloud
Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business
More informationIoT Security and Risk Management
SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:
More informationAtoS IT Solutions and Services. Microsoft Solutions Summit 2012
Microsoft Solutions Summit 2012 1 Building Private Cloud with Microsoft Solution 2 Building Private Cloud with Microsoft Solution Atos integration Establish a new strategic IT partnership From July 2011
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationTransforming Lives. Global UST
Transforming Lives Global UST INNOVATION INFORMATION TECHNOLOGY CORPORATE OVERVIEW UST Global is a fast-growing company that provides advanced computing and digital innovation solutions to large private
More informationIs your mission critical data center ready for an always on world? Nir Oran Lead Enterprise Architect
Is your mission critical data center ready for an always on world? Nir Oran Lead Enterprise Architect Netflix Media and Entertainment Amazon Retail Apple Pay Financial Services Uber Transportation Market
More informationCyber Security: Are digital doors still open?
Cyber Security: Are digital doors still open? Introduction Security is becoming a rapidly evolving and complex issue that various organizations are contending with today. It continues to be one of the
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationSGS CYBER SECURITY GROWTH OPPORTUNITIES
SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER
More informationMultiplying disruption: Modular data centres at the edge
Multiplying disruption: Modular data centres at the edge Andrew Donoghue Director analyst relations EMEA 12.03.2019 2 Simplifying the Edge Workforce Revolution Smarter, More Efficient UPS Systems Pursuing
More informationEnhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationHow Your Organization Can Drive Success in the Age of Digital Disruption
How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,
More informationPAC Q&A The Cloud Offering from Atos
The Cloud Offering from Atos When Atos Origin and Siemens IT Solutions and Services officially merged into Atos in July 2011 they combined their cloud offerings Atos Sphere and Trusted Cloud. The new approach
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationNEW CONVERGED APPROACH FOR SAP POWERED BY ATOS
NEW CONVERGED APPROACH FOR SAP POWERED BY ATOS Michael Schmitter, Atos Tim Wörfel, Hitachi Vantara 28.02.2018 HITACHI and Atos Partnership More 9 Years Partnership Partnership covers main areas of the
More informationSOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:
(Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:
More informationTHE BUGGIE WHIP MISNOMER 2016 PRESIDIO
Bob Cagnazzi THE BUGGIE WHIP MISNOMER THE BUGGIE WHIP MISNOMER 1905 2016 WORLD OF DIGITAL TRANSFORMATION The realignment of or investment in new technology, business models, and processes to drive value
More informationCloud Security Alliance Quantum-safe Security Working Group
Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security
More informationA HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage
A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,
More informationAccenture Texas. Delivering High Performance in Health & Public Service
Accenture Texas Delivering High Performance in Health & Public Service Global reach. Texas touch. Accenture is a global management consulting, technology services and outsourcing company, with more than
More informationTransforming your network for the digital economy
Transforming your network for the digital economy Ricky Chau, Vice President, Enterprise, CenturyLink Asia Pacific 15/11/2018 Services not available everywhere. 2 We re in an Era of Digital Transformation
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationOracle bakes security into its DNA
Publication Date: 16 Nov 2018 Product code: INT003-000287 Maxine Holt Ovum view Summary At the inaugural Oracle Security Summit held at the company s stunning Santa Clara campus in September 2018, analysts
More informationSmart Manufacturing and Standards: The NIST Role
Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October
More informationSDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation
SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation Research Report August 2017 suse.com Executive Summary As we approach 2020, businesses face a maelstrom of increasing customer
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationSMART. Investing in urban innovation
SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.
More informationThe most powerful professional headset on the market is also the most secure * Jabra Engage
Whitepaper Jabra Engage The most powerful professional headset on the market is also the most secure * Taking in wireless calls to the next level: 56-bit ES encryption. 8-bit authentication. * Relates
More informationENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions
ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right
More information