Morgan Stanley Digital Day. London, March

Size: px
Start display at page:

Download "Morgan Stanley Digital Day. London, March"

Transcription

1 Morgan Stanley Digital Day London, March

2 Atos business profile 2016 revenue: 11.7 billion By Division By Business Unit By Market 6% 27% 11% 56% 11% 8% 17% 18% 17% 20% 17% 35% 14% 15% 28% Infrastructure & Data Management Business & Platform Solutions Big Data & Cybersecurity Worldline North America Germany United-Kingdom & Ireland France Benelux & The Nordics Worldline Other Business Units 2 Manufacturing, Retail & Transportation Public & Health Telcos, Media & Utilities Financial Services

3 Current Atos delivery model evolution Worldline Unify Business & Platform Solutions Infrastructure & Data Management Big Data & Cybersecurity epayment SMAC Cloud Orchestration Big Data Cybersecurity Contactless payment Unified communication Data analytics Autonomics Sociable collaboration IoT ID & access management Transactional services aas application & management Encryption Online acquiring Openscape Circuit Cognitive Processing power bullion HPC Exascale Agile development Quantum computing Military grade security Time 3

4 A Group deeply transformed over the last 7 years Revenue 5.6 bn 11.7 bn x2 Operating margin 0.3 bn 1.1 bn x4 Free cash flow -0.1 bn 0.6 bn +0.7 bn Workforce 51K employees c. 100K employees x2 Market cap. 1.2 bn c bn x10 4

5 6 technological breakthroughs will mark the 3 rd numeric wave Data Pilots the Process Data Pilots The experience Client We are here Mainframes Web & mobile Internet of devices Data Pilots the business 1) Exascale 2) Artificial Intelligence 3) 5G 4) Swarm computing 5) Blockchains 6) Homomorphic & quantum-safe encryption 5

6 1 Power multiplied: Exascale Supply computing power as strong as that of the human brain, and then some Resolve complex problems currently impossible to handle: Industry 4.0 Fine climatology Personalized medicine Extensive risk analysis Prescriptive intelligence Exascale should be accomplished by and the singularity by sequana: the most efficient computer in the world bullion: server x86 the fastest in the world 6

7 2 Facilitated decision: Artificial Intelligence Pave the way for machines that learn by themselves, reason and naturally integrate with humans Break the traditional barriers between neuroscience and computing Analyze multiple heterogeneous data sources to find connections there Redefine the relationships between man and the digital environment Atos a pioneer in robotics & cognitivism 7

8 3 Real-time connectivity: 5G Be able to connect, in time, to trillions of devices on the internet, serving billions of people in real time Reduce network latency to <1 ms to generalize real-time (connected car ) Support mobile hyper-connectivity (HD TV, videoconference, enhanced reality ) Facilitate dynamic auto-reconfiguration of networks and devices in real-time 70% of Telcos rely on Planned deployment: Atos 8

9 4 Distributed robotics: Swarm computing Knowing how to respond to uncertainty by allowing vast ecosystems of intelligent agents and objects to self-organize and adapt in real-time Connect central intelligence to the intelligence distributed from the hive Permit the emergence of systems adapting to all types of evolving and complex contexts: Smart cities Medicine (nanorobots) Interior security Advanced research with Siemens 9

10 5 Reinvented confidence: the Blockchains Guarantee secure transactions in peer-to-peer mode without third parties with confidence Transform the transactional value chain between Customers & users Suppliers Financial intermediaries Regulators A revolution in progress for: Payments Currency (i.e. bitcoin) Healthcare transactions Digitalized agreements 10

11 6 Future confidentiality: homomorphic encryption and quantum-safe encryption Create encryption algorithm Adapt to the generalization of the Cloud Virtually unbreakable by future computing power Atos Pioneer of encryption 11

12 What does Atos brings to its customers in order to benefit from these disruptions? Customer experience Operational excellence Business reinvention Trust & compliance 12

13 Atos Canopy Orchestrated Hybrid Cloud SAP HANA by Atos Atos Digital Workplace Atos Codex Building the Atos Digital Transformation Factory epayment SMAC Cloud Orchestration Cybersecurity Big Data Contactless payment Unified communication Data analytics Autonomics Sociable collaboration IoT ID & access management Processing power Transactional services aas application & management Encryption Openscape Cognitive Bullion HPC Exascale Online acquiring Circuit Agile development Military grade security Quantum computing With vertical offerings Manufacturing, Retail & Transportation Financial Services Telecom, Media & Utilities Public & Health 13

14 collect store analyze predict activate Codex = COgnitive DEcisions and Execution The answer to transform data into business outcomes =

15 Atos Codex in 2017 Analytics, Cognitive and IoT Industry leading HPC, HPDA computing New logo momentum! 100+ Atos Codex engagements in 2016 Ready to deploy, technology with enhanced multicloud capabilities Agile proof of values that scale rapidly to industrialized analytics platforms Global player c. 500m annual revenue 15

16 Full end-to-end SAP HANA service provider A strong foundation to address a new dynamic market 12,000+ skilled SAP professionals Global SAP-certified in Hosting, SAP HANA Operations, Cloud and AM services SAP-certified bullion server for SAP HANA up to 16TB 50+ S/4HANA projects Built and manages one of the world s largest HANA Private Cloud 3 million SAP End-Users supported 16

17 Siemens SAP HANA reference 49 Landscapes 219 SIDs 500 TB HANA Memory 3.5 PB Data >2000 Servers >300% Faster ERP reporting 9.5x Faster COPA Processing 6x Faster PS Processing >3x Faster MM Processing >300 Bullion HANA appliances 17

18 Why our clients need Atos Cybersecurity More devices More valuable data More complexity More targets Perimeter security vanishes More attacker reward Cyber crime takes a quantum leap More vulnerabilities (in)security through obscurity 18

19 Atos Cybersecurity: a business-driven approach ASSESS Consulting DEFEND SOCs & Forensics BUSINESS DRIVEN SECURITY GARANTEE IoT & Data Security ENABLE IAM & secure coms 19

20 Cybersecurity for the Olympic Games 200,000 Testing hours Sorry! Can you try again? We were re-booting! 300,000 + Accreditations 400 IT security events per second IT security events 0 Impact on the games 20

Patrick van der Griendt Atos International GSI SAP SAP HANA

Patrick van der Griendt Atos International GSI SAP SAP HANA 25-09-2014 Patrick van der Griendt Agenda 1 The new Atos 2 Our SAP capabilities 3 Our SAP HANA Journey 4 Key Takeaways 2 25-09-2014 Patrick van der Griendt Agenda 1 The new Atos 2 Our SAP capabilities

More information

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Atos Canopy Orchestrated Hybrid Cloud Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Cloud Animation Video 02-03-2017 Addressing Customer Challenges in all verticals With

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market

More information

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB Discussion topics Introductions The digital transformation Innovating at scale How

More information

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations

More information

Q1 Revenues. Paris April 26 th, 2017

Q1 Revenues. Paris April 26 th, 2017 2017 Q1 Revenues Paris April 26 th, 2017 Disclaimer This presentation does not contain or constitute an offer of securities for sale or an invitation or inducement to invest in securities in France, the

More information

SECURING THE CONNECTED ENTERPRISE.

SECURING THE CONNECTED ENTERPRISE. SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE

More information

No Industry 4.0 without Security

No Industry 4.0 without Security 24-04-2017 No Industry 4.0 without Security 24-04-2017 Introduction to Atos and Industry 4.0 Who is Atos? At a glance Revenue 2016 (M EUR) * Employees 2016 (Global) Employees 2016 (Germany) Countries 12,000

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

CardOS Secure Elements for Smart Home Applications

CardOS Secure Elements for Smart Home Applications Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.

More information

Q revenue. Bezons April 25, 2018

Q revenue. Bezons April 25, 2018 Q1 2018 revenue Bezons April 25, 2018 Disclaimer This document contains forward-looking statements that involve risks and uncertainties, including references, concerning the Group's expected growth and

More information

New Digital Business Models Driving the Softwarization of the Network

New Digital Business Models Driving the Softwarization of the Network New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:

More information

Cybersecurity Lessons learned from the energy sector. Reach a safe harbour. Obtaining knowledge. Summary. Challenges and opportunities

Cybersecurity Lessons learned from the energy sector. Reach a safe harbour. Obtaining knowledge. Summary. Challenges and opportunities Summary Cybersecurity Lessons learned from the energy sector 1. Reach a safe harbour 2. Obtaining knowledge 3. Unexpected discoveries? 4. -Driven technologies for Digital disruption 5. Ambition and Approach

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE 2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Q3 Revenues. Paris October 29th, 2015

Q3 Revenues. Paris October 29th, 2015 2015 Q3 Revenues Paris October 29th, 2015 Paul HERMELIN A solid execution of our strategy 3,036M revenue +17.2% current growth Bookings growth +20% YoY, incl. IGATE 21% SMAC revenue growth in Q3 YoY 20%

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

The impact of digital transformation on industries

The impact of digital transformation on industries Headline Verdana Bold The impact of digital transformation on industries Tim Hanley, Deloitte Global Leader, Consumer & Industrial Products Industry group March 2017. Sao Paolo, Brazil What we will cover

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

Information pack. #AtosGovCloud Making the world a better place

Information pack. #AtosGovCloud Making the world a better place Information pack #AtosGovCloud Making the world a better place Executive Summary Challenges for governments in a fast-changing world We are living in times of seismic change for governments and public

More information

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the

More information

S3C Smart Consumer, Smart Customer, Smart Citizen : The Digital 3C Transformation

S3C Smart Consumer, Smart Customer, Smart Citizen : The Digital 3C Transformation S3C Smart Consumer, Smart Customer, Smart Citizen : The Digital 3C Transformation Maher Chebbo, General Manager Energy EMEA, SAP Chairman of ETP SmartGrids Demand Group & Digital initiative President of

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Q revenue. Bezons October 24, 2017

Q revenue. Bezons October 24, 2017 Q3 2017 revenue Bezons October 24, 2017 Disclaimer This document contains forward-looking statements that involve risks and uncertainties, including references, concerning the Group's expected growth and

More information

The fast-track to NFV

The fast-track to NFV The fast-track to NFV Five years from now, there will only be two kinds of telco: those that have put NFV at the heart of their network architecture and business model, and those that fail. The challenge

More information

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer

More information

Cognitive Security in the Era of Always Online. Yiannis Giokas VP R&D

Cognitive Security in the Era of Always Online. Yiannis Giokas VP R&D Cognitive Security in the Era of Always Online Yiannis Giokas VP R&D Our Parent Company: HKT PCCW Global is an international operating division of HKT, Hong Kong s premier telecommunications service provider,

More information

ID Synchronization for a multi-directory identity repository

ID Synchronization for a multi-directory identity repository evidian ID Synchronization for a multi-directory identity repository Introduction Building an identity repository is at the heart of identity and access management. In fact, no matter the quality of an

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Vision of the Software Defined Data Center (SDDC)

Vision of the Software Defined Data Center (SDDC) Vision of the Software Defined Data Center (SDDC) Raj Yavatkar, VMware Fellow Vijay Ramachandran, Sr. Director, Storage Product Management Business transformation and disruption A software business that

More information

Retail Security in a World of Digital Touchpoint Complexity

Retail Security in a World of Digital Touchpoint Complexity Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of

More information

Micro Focus Partner Program. For Resellers

Micro Focus Partner Program. For Resellers Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet

More information

Managed Endpoint Defense

Managed Endpoint Defense DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

H results. Bezons July 26, 2017

H results. Bezons July 26, 2017 H1 2017 results Bezons July 26, 2017 Disclaimer This document contains forward-looking statements that involve risks and uncertainties, including references, concerning the Group's expected growth and

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme PBO1046BES Simplifying the Journey To The Software Defined Datacenter Tikiri Wanduragala Senior Consultant Data Center Group, Lenovo EMEA VMworld 2017 Geoff Hunt Senior Product Manager Data Center Group,

More information

The Programmable World Opportunities and Challenges

The Programmable World Opportunities and Challenges The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018 V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America 5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,

More information

SD-WAN Solution How to Make the Best Choice for Your Business

SD-WAN Solution How to Make the Best Choice for Your Business HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

Bull Trustway DataProtect. Securing your end to end infrastructure with unified encryption

Bull Trustway DataProtect. Securing your end to end infrastructure with unified encryption Bull DataProtect Securing your end to end infrastructure with unified encryption How to ensure data security and bring compliance? Cyberattacks, negative consequences, impact on the brand image We live

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Global Supply Chain Innovation Summit Digital Integration from Order to Manufacturing and Delivery

Global Supply Chain Innovation Summit Digital Integration from Order to Manufacturing and Delivery Global Supply Chain Innovation Summit Digital Integration from Order to Manufacturing and Delivery Thursday, 3 November, 2016 13:50 14:40 Laurent Carré Mobile Networks COO Supply Chain and Procurement

More information

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018 Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

THE RISE OF THE MODERN DATA CENTER

THE RISE OF THE MODERN DATA CENTER THE RISE OF THE MODERN DATA CENTER 1 Companies have invested heavily in this enterprise-applicationrelated infrastructure, peaking in recent years at around 2.7 trillion US dollars. THE TIME FOR TRANSFORMATION

More information

Monetizing 5G the disruption of traditional telco business models

Monetizing 5G the disruption of traditional telco business models www.pwc.com Monetizing 5G the disruption of traditional telco business models 4 July 2018 Service s are facing a saturated market and declining margins due to the commoditizing of connectivity services

More information

Virtualizing Networks:

Virtualizing Networks: Trend Report Virtualizing Networks: The IT Perspective Increase efficiency, scalability, and cost efficiency in the digital age Table of Contents Introduction 3 Managing Enterprise Networks in a Big Data

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the

More information

Transform to Your Cloud

Transform to Your Cloud Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to

More information

Data Center 3.0 Shift to IT as a Service with Your Own Private Cloud

Data Center 3.0 Shift to IT as a Service with Your Own Private Cloud Fujitsu Forum Munich 2013 Data Center 3.0 Shift to IT as a Service with Your Own Private Cloud Georg Houben, Head of Private Cloud Infrastructure Portfolio, Fujitsu International Business Harald Bernreuther,

More information

Guatemala July 31st, 2018

Guatemala July 31st, 2018 Guatemala July 31st, 2018 Make It Real Modernize your IT Infrastructure with Dell EMC ARTURO BENAVIDES MDC, LATIN AMERICA What do you see? 4 Poll Did you see: 1. The young man? 2. The cell phone? 3. The

More information

Evolution of connectivity in the era of cloud

Evolution of connectivity in the era of cloud Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business

More information

IoT Security and Risk Management

IoT Security and Risk Management SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:

More information

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012 Microsoft Solutions Summit 2012 1 Building Private Cloud with Microsoft Solution 2 Building Private Cloud with Microsoft Solution Atos integration Establish a new strategic IT partnership From July 2011

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Transforming Lives. Global UST

Transforming Lives. Global UST Transforming Lives Global UST INNOVATION INFORMATION TECHNOLOGY CORPORATE OVERVIEW UST Global is a fast-growing company that provides advanced computing and digital innovation solutions to large private

More information

Is your mission critical data center ready for an always on world? Nir Oran Lead Enterprise Architect

Is your mission critical data center ready for an always on world? Nir Oran Lead Enterprise Architect Is your mission critical data center ready for an always on world? Nir Oran Lead Enterprise Architect Netflix Media and Entertainment Amazon Retail Apple Pay Financial Services Uber Transportation Market

More information

Cyber Security: Are digital doors still open?

Cyber Security: Are digital doors still open? Cyber Security: Are digital doors still open? Introduction Security is becoming a rapidly evolving and complex issue that various organizations are contending with today. It continues to be one of the

More information

MODERNIZE INFRASTRUCTURE

MODERNIZE INFRASTRUCTURE SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Multiplying disruption: Modular data centres at the edge

Multiplying disruption: Modular data centres at the edge Multiplying disruption: Modular data centres at the edge Andrew Donoghue Director analyst relations EMEA 12.03.2019 2 Simplifying the Edge Workforce Revolution Smarter, More Efficient UPS Systems Pursuing

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

PAC Q&A The Cloud Offering from Atos

PAC Q&A The Cloud Offering from Atos The Cloud Offering from Atos When Atos Origin and Siemens IT Solutions and Services officially merged into Atos in July 2011 they combined their cloud offerings Atos Sphere and Trusted Cloud. The new approach

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

NEW CONVERGED APPROACH FOR SAP POWERED BY ATOS

NEW CONVERGED APPROACH FOR SAP POWERED BY ATOS NEW CONVERGED APPROACH FOR SAP POWERED BY ATOS Michael Schmitter, Atos Tim Wörfel, Hitachi Vantara 28.02.2018 HITACHI and Atos Partnership More 9 Years Partnership Partnership covers main areas of the

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

THE BUGGIE WHIP MISNOMER 2016 PRESIDIO

THE BUGGIE WHIP MISNOMER 2016 PRESIDIO Bob Cagnazzi THE BUGGIE WHIP MISNOMER THE BUGGIE WHIP MISNOMER 1905 2016 WORLD OF DIGITAL TRANSFORMATION The realignment of or investment in new technology, business models, and processes to drive value

More information

Cloud Security Alliance Quantum-safe Security Working Group

Cloud Security Alliance Quantum-safe Security Working Group Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security

More information

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,

More information

Accenture Texas. Delivering High Performance in Health & Public Service

Accenture Texas. Delivering High Performance in Health & Public Service Accenture Texas Delivering High Performance in Health & Public Service Global reach. Texas touch. Accenture is a global management consulting, technology services and outsourcing company, with more than

More information

Transforming your network for the digital economy

Transforming your network for the digital economy Transforming your network for the digital economy Ricky Chau, Vice President, Enterprise, CenturyLink Asia Pacific 15/11/2018 Services not available everywhere. 2 We re in an Era of Digital Transformation

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

Oracle bakes security into its DNA

Oracle bakes security into its DNA Publication Date: 16 Nov 2018 Product code: INT003-000287 Maxine Holt Ovum view Summary At the inaugural Oracle Security Summit held at the company s stunning Santa Clara campus in September 2018, analysts

More information

Smart Manufacturing and Standards: The NIST Role

Smart Manufacturing and Standards: The NIST Role Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October

More information

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation Research Report August 2017 suse.com Executive Summary As we approach 2020, businesses face a maelstrom of increasing customer

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

SMART. Investing in urban innovation

SMART. Investing in urban innovation SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.

More information

The most powerful professional headset on the market is also the most secure * Jabra Engage

The most powerful professional headset on the market is also the most secure * Jabra Engage Whitepaper Jabra Engage The most powerful professional headset on the market is also the most secure * Taking in wireless calls to the next level: 56-bit ES encryption. 8-bit authentication. * Relates

More information

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right

More information