Hitachi Group IT Performance Report 2017
|
|
- Elaine Neal
- 5 years ago
- Views:
Transcription
1 Hitachi Group IT Performance Report 2017
2 Contents Message from CIO 1 2 Basic IT policy...1 Growth: Accelerating digital transformation...3 The Hitachi Group has been working to resolve wide range of social issues by utilizing digital technology such as AI for social innovation business which combined OT (operational technology) such as system control and operations and IT (information technology) which we have developed over 50 years with product system which has Hitachi's in-born strengths. 1 Taking the lead in digitalization, 3 4 Efficiency: Optimizing the Hitachi Group's IT resources...7 Control: Promoting information security governance to maintain the Hitachi brand and ensure business continuity...9 Hitachi Group IT Performance Report 2017 To support this social innovation business, our IT divisions are working to achieve both diversity and efficiency, and to optimize IT costs while improving speed. To do this, they are consolidating the Hitachi Group's IT environments to cloud systems following the latest trend in the world today. We are also installing Hitachi's IoT platform Lumada * 1 in in-house environments to make it easier to make use of cutting-edge digital technologies such as AI, analytics, and machine learning, to facilitate the accumulation and sharing of knowledges while expanding the use and application of data. Additionally, in view of growing the threat of cyber attacks, we have recognized information security as one of our key management challenges. To promote information security governance across the Hitachi Group as a whole, we have made an independent specialized division separate from our IT divisions, and strengthened our information security systems. I would like to leverage these initiatives in collaborative creation with our customers, and raising the value of our customers' businesses. This report details the strategies and current status of our IT divisions as quantitatively as possible. I hope you will all find this report useful. Shinichiro Omori Senior Vice President and Executive Officer, CIO Hitachi, Ltd. The Hitachi Group's IT Mid-Term Plan for 2018 was formulated in accordance with the 2018 Mid-Term Management Plan. In this IT Mid-Term Plan, we are strengthening our competitive IT based on the three pillars of Growth, Efficiency, and Control. (1) Hitachi Group's 2018 IT Mid-Term Plan In the 2018 Mid-Term Management Plan, Hitachi, Ltd. aims to focus on the social innovation business to become an innovation partner of the IoT age. Our IT divisions formulated the Hitachi Group's IT Mid-Term Plan for 2018 to support this aim, based on the three pillars of Growth, Efficiency, and Control. It is important to expand the use and application of vast amounts of digital data to maximize its value and effectiveness. Therefore, "Growth" focuses on two areas: First, creating innovation using digital data in front office that deal with face-to-face customer service, and workplaces that deal with creating solutions. Second, sophisticating the management decision-making through the expansion of digital data. As an initiative toward expanding digital innovation in front offices and other workplaces, we are introducing Hitachi's IoT platform "Lumada" to in-house environments, and accumulating and sharing expertise through the creation of case examples. In addition, to expand digital data that helps to sophisticate management decision-making, we are working on a platform that allows management information common in the Hitachi Group to be accumulated and used centrally. *1: Lumada: An IoT platform provided by Hitachi that enables the development of IoT-related solutions and easy customization
3 and accelerating social innovation business through IT To make steady progress on these initiatives, it is crucial that we develop our human resources. To do this, we have defined Hitachi-Group-standard "types" of IT human resources, and we are promoting skill enhancement particularly focusing on analytics engineers. Additionally, we must constantly understand advanced technologies, and revise and deploy technology policies that are required for the Hitachi Group. With this aim, we have set up an expert organization in the corporate IT strategy planning division. "Efficiency", which aims to secure a budget for strategic investment towards growth, involves continuous initiatives to reduce regular IT costs to establish a competitive IT portfolio. Particularly, we are promoting transition to a common IT platform in the Hitachi Group that actively uses public cloud technology, aiming to reduce costs associated with expanding consolidation. Our goal is to secure 35% of the entire IT budget for strategic IT investment. Regarding information security threats, we are strengthening our initiatives from the three perspectives "organizations", "systems", and "operations". As part of this initiative, for "Control" in FY 2017, we established a CISO* 1 who promotes all information security matters in the entire Hitachi Group. We have also isolated security functions from IT divisions, and established new, independent division specializing in security. We are also strengthening the robustness of IT environments step-by-step. Hitachi Group s 2018 IT Mid-Term Plan *1 CISO: Chief Information Security Officer Establishing data-driven business and management Growth Maximizing the value of digital information Reducing regular IT spending, and securing strategic IT investments to contribute to the correct divisions: Enhancement of in-house environments for Lumada, and accumulation and sharing expertise through the creation of case examples Establishment of a platform for accumulating and using data to centralize management information Efficiency Maximizing IT productivity Control Ensuring global IT governance Improving the efficiency of IT unique to individual Hitachi Group companies Consolidating and integrating common IT environments in the Hitachi Group FY 2015 (Results) FY 2018 (Targets)
4 2 Accelerating digital transformation We are continuing to introduce environments for accumulating and analyzing data, and enhancing the use and application of data in the Group. Accordingly, we are working to develop IT human resources and enhance the skills they will need for this expansion. (1) Creating innovation using digital data To expand the use and application of data, and effectively apply its results to our work, we must improve the efficiency of data analysis. To do this, we believe it is important to establish a platform for efficiently analyzing data collected and accumulated through many PoCs* and projects, visualizing the data, and making models of expertise that can then be reused. We are therefore enhancing Lumada in-house environments as a platform for promoting the use and application of data. By using Lumada in-house environments, we are collecting data from the entire work processes including the core value chain, from enterprise information systems and sensors installed in facilities and equipment, and loading this data into various analyses and visualizations. Based on the results of these analyses, we quantitatively evaluate work effectiveness to produce feedback for optimizing work processes. To be able to effectively use Lumada in-house environments, we are enhancing and providing analysis templates for reusing process sequences in data analysis. These templates contain specialist expertise so that sophisticated algorithms and machine learning can be used easily. Some case examples show that analysis work hours were reduced by approximately 70% by using these templates. We are also sharing expertise by introducing an analysis knowledge portal, which provides guidelines summarizing key points for each task in the analysis process. Also, it provides worksheets containing samples to help workers complete tasks efficiently. Optimizing entire end-to-end business processes by making use and application of data Finally, we are working on cooperation with business divisions by providing templates to third parties outside the Hitachi Group, and sharing Lumada common expertise in companies. AI *PoC: Proof of Concept Data Procurement Production Distribution Maintenance Overall optimization Feedback Studio Dashboard, application base, etc. Core Analytics Edge AI, machine Asset avatars learning, etc. Collecting data, controlling Foundry devices, etc. OS, security, etc.
5 70 Work hours required for analysis reduced by using analysis templates % Lumada in-house environments are used for a wide range of business areas including sales, procurement, and management. The number of case examples using such environments has increased by approximately 70%* compared to FY Recently analysis expertise has been accumulated by using data from sensors installed in facilities and equipment, and the number of case examples in the production and maintenance areas are increasing. Moreover, we are working on the efficiency improvement of maintenance services such as failure cause analysis of devices and facilities by using machine learning. Regarding a tendency to rely on individual skills to investigate failure causes, by indicating potential failure causes with machine learning, we aim to reduce time for investigation spent by maintenance staffs, and improve the availability of facilities and customer satisfaction. We are also using AI to make auditing work more efficient. Once AI loads auditing procedures then it automatically extracts candidate auditing targets from vast amounts of previously presented documents. We expect this extraction to take significantly less time compared to whole manual procedure. For example, in the production and maintenance areas, we carry out preventive maintenance and repair using predictive failure diagnosis technology. Specifically, by detecting unusual states of equipment in manufacturing line and addressing them before troubles, we aim to reduce maintenance time and improve the availability of production lines. Through this initiative, we expect to reduce regular maintenance time and failure repair time by approximately 33%. Also, we expect to reduce maintenance work hours and downtime in critical facility operations by approximately 92% by creating scheduled repair plans and arranging for replacement components in advance with predicting failures in product equipment about three months ahead. Percentage of use cases using Lumada in-house environments in each business area * Calculated in comparison with the numbers from April 2017 to February % 13% 27% 24% 22% 9% Opportunity management, etc. Inventory improving visualization, etc. Factory improving visualization, etc. Devices predictive diagnosis, etc. Performance improving visualization, etc. Work style innovation, etc.
6 2 Accelerating digital transformation (2) Sophisticating management decision-making by expanding digital data To allow flexible yet fast management decision-making in the entire Hitachi Group, we are accelerating the enhancement of environments for digital data use and application, to more efficiently identify cost structures of consolidated sales profit/loss and SG&A* 1, etc. We are continuing to work on the use and application of management information. For example, analyzing detailed data on indirect costs by organization, cost item, and work category is proving useful to optimizing SG&A and improving gross margins. In addition, we are considering using CRM* 2 -related and other data to help with decision-making in management resource distribution, in marketing, sales activities, and project management. To further accelerate the use and application of this kind of digital data, we aim to build environments so that we can efficiently accumulate, analyze, and visualize data from numerous sources. By centralizing data that has until now been siloed in their respective business areas, we will enhance a data accumulation and application platform so that users themselves can use data. *1 SG&A: Selling, General and Administrative expenses *2 CRM: Customer Relationship Management With the data accumulation and application platform, we can combine and use "individual information" in the core value chain area and "shared information" that centrally stores management data common in the Hitachi Group which is used for corporate-provided finance, sales, procurement, human resources areas. We will also implement security functionality and perform access control for user profiles, so that the appropriate data can be provided to the appropriate people. While enhancing this data accumulation and application platform, we are also simplifying and integrating the business systems that serve as data sources. By expanding the use of corporate-provided standard business applications, we can enable efficient and homogeneous digital data accumulation, as well as help to expand the global standardization of work processes and prevent duplicate IT investments. Data governance is also important in platforms for accumulating and applying data, which require accuracy, completeness, and consistency. Therefore, we have defined common rules for the use and application of data in the Hitachi Group, enhanced the structure for monitoring data quality, and are working to secure data quality by using the PDCA cycle. Data governance Enhancing a data accumulation and application platform for centralizing management information Dashboard (routine analysis) Checks necessary data at any time Lumada in-house environment External data Manager Administrator Worker Self-service BI (non-routine analysis) Freely analyzes breakdown data Data accumulation and application platform Standard business applications Business data Automates work using data Business-unit system
7 758 Ascertaining indirect cost items and breakdowns by job category at main Hitachi Group companies (FY 2016 results) billion yen 14 Standard IT human resources of the Hitachi Group classifications (3) Initiatives to shift our IT human resource portfolios Amidst the rapidly changing field of IT, for example the expanding use of public cloud systems and acceleration of digital transformation centering around the IoT field, the roles of in-house IT divisions are changing. Therefore, we believe it is urgent that we promote a systematic skill shift in IT human resources. Particularly, we are promoting the development and enhancement of analytics engineers, as the IT human resources that will drive digital transformation. Developing analytics engineers involves not only data analysis methods and IT knowledge; it is also crucial to be able to form hypotheses and think of ideas from a business perspective. To this end, we are planning to hold training courses to develop our analytics engineers, and raise skill levels. We are also promoting development through OJT, for example by participating in analytics projects using Lumada. We are promoting these initiatives not only with our IT divisions, but also involving our OT divisions. Going forward, we continue to accelerate the development of analytics engineers regardless of their respective divisions. To efficiently develop the required IT human resources in the entire Hitachi Group in near future, we established the Hitachi Group IT Human Resources Committee. This committee has used the information system user skill standards proposed by the general incorporated association "Japan Institute Users Association of Information Systems" as a base to define in-house IT tasks (functions), skills for completing tasks, and work jobs that require those skills, classifying the Hitachi-Group-standard IT human resources into 13 types. Later we added "analytics engineers (data analysts)" definition, making a current total of 14 types. By defining standard IT human resources types, we can now understand our human resources skill portfolio in the Hitachi Group. Based on this skill portfolio, the entire Group is now proposing plans and promoting measures to develop our common IT human resources to transform our human resources portfolio. Shifting the human resource portfolios of Hitachi Group IT divisions On-Site Resources Status as of April 2017 Projection for the end of FY 2021 *1: BU: Business units of Hitachi, Ltd. *2: CoE: Center of Excellence. Consolidates cutting-edge technology and expertise.
8 3 Optimizing the Hitachi Group's IT resources To build the right IT resource portfolio comparable to a global cutting-edge enterprise, promote expansion of strategic IT investments for growth. We are reforming our IT cost portfolios. (1) Reforming IT cost portfolios In the Hitachi Group, we have been promoting the "Hitachi Smart Transformation Project" to enhance growth and structural reforms in the global market. As a part of this project, IT divisions have been reducing regular IT spending across the entire Group. We are promoting measures to allocate resources, gained by reducing such regular IT spending, to strategic IT investment. We aim to expand strategic IT investment, which was 25% of the entire IT budget in FY 2015, to 35% in FY The Hitachi Group is working as one to reduce IT spending relating to regular operations and maintenance. To improve efficiency, IT environments in individual business units and Group companies are expanding measures to consolidate and integrate into a common Hitachi Group IT platform that actively applies public cloud technology. To enable each company's own IT that is differentiated for each business structure, business units and Group companies are promoting measures to improve the efficiency of operation and maintenance such as system integration. In order to optimize our investment in shared IT across the Hitachi Group, we have established a specialized division in our IT strategy planning division, within the Group s corporate management. This division maintains a shared investment policy, and defines and manages the decision-making process for investment. Defined responsibilities of process owner ( PO, responsible for budget management and profitability) and transformation engineer ( TE, responsible for the development and effectiveness of IT operations) are assigned, so that for specific investments the lines of authority and responsibility are clear. (2) Consolidating IT environments in the Hitachi Group Accelerating the use of public cloud systems To adapt flexibly to changes in business environments such as globalization, M&A (mergers and acquisitions), and expanding partnerships with external customers, and to both uphold system diversity and improve efficiency, we are accelerating the use of public cloud systems. For example, in collaboration environments, we are reducing system operation costs and improving efficiency by introducing global standard collaboration tools, as well as improving usability, for example by allowing staffs to use computers and smartphones from outside the company. There are now approximately 270,000 users of cloud collaboration tools. Reduction measures of regular IT spending Improving the efficiency of IT unique to individual Hitachi Group companies At the same time, to use in-house environments seamlessly with public cloud systems, we are improving usability and enhancing access management with SSO* using in-house IDs. The Hitachi Group had 38 cloud systems supporting SSO as of the end of February 2018, and we are promoting further expansion. To safely use public cloud systems, we have created usage guidelines for risk countermeasures, and verify each Group company that applies to use such systems is complying with the guidelines. By certifying companies for complying with guidelines, we can identify the status of public cloud use, ensure that no duplicate verifications are performed, and implement security risk countermeasures. Public cloud use in FY 2016 has increased by 38% compared to FY *SSO: Single Sign-On Accelerating the use of public cloud systems Consolidating the procurement and operation management of clients Consolidating the operation and maintenance of applications System integration etc.
9 38 Increase in the use of public cloud systems (FY 2016 compared to FY 2015) % 38 SSO-enabled cloud systems (As of the end of February 2018) systems Overview of public cloud use through SSO authentication SSO enables seamless use of in-house environment and public cloud Approved public cloud systems Authorization system On-premises Office Outside Consolidating the procurement and operation management of clients In the Hitachi Group, we are consolidating client procurement and operation management. We are reducing procurement costs through centralized purchasing that takes advantage of economies of scale, reducing operation and management costs through centralized management, and improving security measures based on the Hitachi Group security standards. We had over approximately 260,000 clients running as of February Among these, those that use consolidated or centralized management was approximately 130,000. We will continue to consolidate procurement and operation management for client environment going forward, to reduce IT costs. Overview of the consolidation of operation and maintenance of applications Company A ERP applications On-premises Company B ERP applications Company C ERP applications Each company's individual operations and environments *3 AMO: Application management outsourcing *4 DB: Database *5 EMEA: Europe, the Middle East and Africa Housing Virtual environments Consolidating the operation and maintenance of applications We are commonalizing individual ERP* 1 environments of each Group company, and standardizing operation and maintenance work (for approximately 40 companies and 70 systems* 2 ). We are proceeding with this consolidation and improving efficiency in the entire Group to reduce operation and maintenance costs. These initiatives enable us to plan efficient and scheduled ERP upgrades based on standardized environments in the future, and we expect a reduction in migration costs and improvement to system quality. We have already finished consolidating 8 systems, and will consolidate 30 more systems by *1 ERP: Enterprise Resource Planning *2 Results at the end of FY 2016 AMO* 3 Common Platforms Japan EMEA* 5 Company A Company B Company C Americas AMO services Platform services
10 4 Promoting information security governance to maintain the Hitachi brand and ensure business continuity Among the various risks surrounding IT, cyberattacks are daily becoming more and more sophisticated. The entire Hitachi Group is promoting preparation against a wide range of information security risks. (1) The Hitachi's security approach of "defense by the organization, by the system, and by operation" In the Hitachi Group, we are promoting safety and security based on the security approach "defense by the organization, by the system, and by operation". Not only do we build systems according to security measures, we also implement organization management and operative measures for monitoring and detecting unauthorized access from outside the company in order to continuously maintain the measures' effect. We believe it is important to perform risk analysis to ensure no biases in the three principles "defense by the organization, by the system, and by operation", and to always be thoroughly prepared for various risks. This is not just a challenge for IT; activities must involve management, business, and the organization as a whole, working steadily to establish processes and create manuals for this purpose. We believe in the importance of being ready for emergencies. Hitachi's approach to security: "Defense by the organization, by the system, and by operation" (2) Strengthening information security systems In its expansion of the social innovation business, the Hitachi Group acknowledges strengthening information security governance as an important management challenge in view of the advancement of IoT and growing the threat of cyber attacks. We have established a CISO who works directly under the CEO to promote all the information security matters in the entire Hitachi Group. Accordingly, we have isolated security functions from their IT divisions, placing them in a new, independent division, the "Information Security Risk Management Division", under the authority of the CISO. In this way, we are expanding and strengthening our information security structure. Information security systems Defense by the organization Defense by operation Technical requirements of security * *H-ARC Defense by the system
11 (3) Enhancing the security of IT environments IT divisions have taken information security measures to strengthen security to ensure robustness, for example: Network security, such as proxy services and VPNs* 1 security, such as spam filters and dynamic analysis End-point security, such as thin clients, antivirus, and remote wipes ID security Document security We are also promoting the following measures in collaboration with the Information Security Risk Management Division against the threat of sophisticated cyberattacks. Enhancement of network segment We are applying SDN* 2, a software-based network control technology to WANs* 3, to optimize network bandwidth and to minimize the area affected in emergencies by changing the configuration rapidly, and compartmentalizing networks. Vulnerability testing We are implementing checks and monitoring ("IP patrols") against the perceived risks of connecting devices not managed by the IT department to internal networks. Devices not managed by the IT department are detected through IP scanning, and low-security terminals are discovered at an early stage through vulnerability testing. By implementing vulnerability measures on low-security terminals, we will reduce the risk of virus infections and spreading via network connections. Thorough compliance with operation rules To address the ever-growing sophistication of vulnerability exploits, we are performing detailed evaluations of necessary ports, and closing unused ports. Furthermore, we always rule to apply the latest patch and execute it. Overview of security robustness (4) IT business continuity plans (BCP) Along with the basic approach of installing and operating servers in robust datacenters, the Hitachi Group also defines levels for emergency measures according to recovery time objectives for each service and recovery point objectives. Depending on the disaster recovery level, work is being done to prepare secondary servers and data backup environments, and to preserve data backups. We are also conducting periodic drills in line with BCPs. In addition to BCPs for emergencies, the Hitachi Group also conducts BCP drills in preparation for cyberattacks. Ensuring safety of backup data If the virus is spreading quickly, backup data might also be damaged at risk. To ensure the safety, we are storing data off site and installing equipment to immediately stop backup operations during an emergency, to prevent data backups from being overwritten by corrupted data. *1 VPN: Virtual Private Network *2 SDN: Software Defined Networking *3 WAN: Wide Area Network Firewall Firewall Firewall Firewall IP patrols of unmanaged devices and vulnerabilities
12 IT Strategy Division Hitachi, Ltd. Akihabara Daibiru Building, 18-13, Sotokanda 1-Chome, Chiyoda-ku, Tokyo, Japan Printed in Japan March 2018
Information Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationSupporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains
Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer
More informationEstablish a new company to foster human resource for the global rollout of the Social Innovation Business using digital technologies
FOR IMMEDIATE RELEASE Establish a new company to foster human resource for the global rollout of the Social Innovation Business using digital technologies Merging two companies of Hitachi Institute of
More informationContributes to Improving Efficiency of Repair Work and More Stable Operation
FOR IMMEDIATE RELEASE Begins Joint Demonstrative Testing of Service Platform Utilizing AI to Automatically Propose Optimal Repairs for Industrial Machinery with US Subsidiary Sullair Contributes to Improving
More informationFeatured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure
Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki
More informationDisaster Management and Security Solutions to Usher in the IoT Era
Disaster Management and Solutions for a Safe and Secure Way of Life Overview Disaster Management and Solutions to Usher in the IoT Era Takeshi Miyao Toshihiko Nakano, Ph.D. 1. The Bright and Dark Sides
More informationHitachi Announces 2018 Mid-term Management Plan
FOR IMMEDIATE RELEASE Contacts: Japan: Mickey Takeuchi U.K.: Yuki Maeda Hitachi, Ltd. Hitachi Europe Ltd. +81-3-5208-9324 +44-1628-585714 masayuki.takeuchi.cc@hitachi.com yuki.maeda@hitachi-eu.com Hitachi
More informationO&M Service for Sustainable Social Infrastructure
O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationEvolution For Enterprises In A Cloud World
Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing
More informationFeatured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication
118 Hitachi Review Vol. 65 (2016), No. 6 Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication Yasuharu Namba, Dr. Eng. Jun Yoshida Kazuaki Tokunaga Takuya
More informationCloud for Government: A Transformative Digital Tool to Better Serve Communities
Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital
More informationFujitsu Technology and Service Vision
FEATURE Fujitsu Technology and Service Vision Innovation inspired by Fujitsu, enabled by new ICT A HUMAN CENTRIC INTELLIGENT SOCIETY OUR VISION The role of ICT up to now has mainly been to increase productivity
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationManagement Frameworks
Chapter I Internal Fujitsu Group Information Security Independent of the chief information officer (CIO), the Fujitsu Group has appointed a chief information security officer (CISO) under the authority
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationHitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers
302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationAchieving Growth and Hitachi s Transformation
Our Strategy Throughout its 100 year history, the Hitachi Group has passed on its Mission and its Values to generations of employees and external stakeholders. The Vision has been created based on the
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More information*1 Indirect materials: materials used in a production process, but which can t be linked to a specific product or job.
FOR IMMEDIATE RELEASE Hitachi to Transfer Shares in Hitachi Procurement Service to Infosys, Panasonic, and PASONA A new company, HIPUS aims to combine the strengths and expertise of each company, and accelerates
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationImplementation and Future Plans for Global IoT Maintenance System
FEATURED ARTICLES Public and Social Infrastructure for Safe and Pleasant Cities Implementation and Future Plans for Global IoT System There is an accelerating global trend, especially in industry, for
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More information1. Advice, coordination, and other assistance
The information and communications services network and environment are bringing about changes in industry structure and every aspect of people s lives, as seen in the enhancement of the broadband communications
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationSystems & Services Business Strategy
Systems & Services Business Strategy Hitachi IR Day 2016 June 1, 2016 Keiichi Shiotsuka Senior Vice President and Executive Officer, Head of Systems & Services Business Hitachi, Ltd. Systems & Services
More informationOktober 2018 Dell Tech. Forum München
Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven
More informationSecurity Solutions Assisting Social Infrastructure Digitalization
FEATURED ARTICLES Social Infrastructure and its Digitalization Overview Solutions Assisting Social Infrastructure Digitalization Takeshi Miyao Junichi Tanimoto 1. Digitalization and Threats The rise of
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationData Center Management and Automation Strategic Briefing
Data Center and Automation Strategic Briefing Contents Why is Data Center and Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationSocial Innovation -New Value through Collaborative Creation
Social Innovation -New Value through Collaborative Creation Sep. 5, 2016 Shinjiro Iwata Advisor, Hitachi, Ltd., Japan Contents 1. An Era of New Innovation 2. Hitachi s Social Innovation Business 3. A New
More informationAdvancing the MRJ project
Advancing the MRJ project 2017.1.23 2017 MITSUBISHI HEAVY INDUSTRIES, LTD. All Rights Reserved. Overview The Mitsubishi Regional Jet (MRJ) delivery date is adjusted from mid-2018 to mid-2020 due to revisions
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationConverged Cloud and Digital Transformation: A Strategy for Business Success
Converged and Digital Transformation: A Strategy for Business Success An IDC InfoBrief, Sponsored by Lenovo December 2017 Sponsored by Lenovo Page 1 Digital Transformation (DX) is Changing Everything About
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationWith K5 you can. Do incredible things with Fujitsu Cloud Service K5
With K5 you can Do incredible things with Fujitsu Cloud Service K5 Making incredible possible Digital is changing everything. According to a Fujitsu survey, customers and employees think it s vital for
More informationManagement Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED
Management Direction FY2017 Progress Review June 6, 2017 FY 2015-2016 Financial Results and FY 2017 Plan Operating profit margin Free cash flow 2.5% 2.9% 4.5% Target 10% or more (Billion JPY) 88.7 104.8
More informationThailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)
ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationManagement Information Systems. B15. Managing Information Resources and IT Security
Management Information Systems Management Information Systems B15. Managing Information Resources and IT Security Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:
More informationHitachi Received Notice of Request for Arbitration
FOR IMMEDIATE RELEASE Hitachi Received Notice of Request for Arbitration Tokyo, August 22, 2017 --- Hitachi, Ltd. (TSE: 6501, Hitachi ) today announced that it has received the notice of the request for
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationSECURITY SERVICES SECURITY
SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed
More informationManagement Direction Briefing October 29, 2015 Fujitsu Limited
Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing
More informationCA Security Management
CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate
More informationATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationFiscal 2015 Activities Review and Plan for Fiscal 2016
Fiscal 2015 Activities Review and 1. The Ricoh Group s Information Security Activities In response to changes emerging in the social environment, the Ricoh Group is promoting its PDCA management system
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationConnected Car Solutions Based on IoT
FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the
More informationAUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE
Agenda Report TO: FROM: SUBJECT: Honorable Mayor and City Council Department of Information Technology AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationDevelopment of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization
Hitachi Review Vol. 65 (2016), No. 1 741 Featured Articles Development of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization Atsushi Kawai Yuuji Ikawa Hiroaki
More informationGrow Your Services Business
Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business
More informationFederal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan
Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan June 04, 2010 FDCCI Workshop I Agenda for June 4, 2010 1. Welcome Katie Lewin GSA Director Cloud
More informationFOR IMMEDIATE RELEASE
FOR IMMEDIATE RELEASE Okuma and Hitachi Embark on Collaborative Creation Aiming to Establish an Advanced Model for Mass Customization Using IoT Launching a Joint Demonstration Experiment for Production
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationTD01 - Enabling Digital Transformation Through The Connected Enterprise
TD01 - Enabling Digital Transformation Through The Connected Enterprise Name Mukund Title Business Manager, Software, Asia Pacific Date January 22, 2018 Copyright 2016 Rockwell Automation, Inc. All Rights
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationBig data and data centers
Big data and data centers Contents Page 1 Big data and data centers... 3 1.1 Big data, big IT... 3 1.2 The IT organization between day-to-day business and innovation... 4 2 Modern data centers... 5 2.1
More informationCIO Forum Maximize the value of IT in today s economy
CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed
More informationOptimisation drives digital transformation
January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business
More information(b) Fiscal 2016 Initiative Results and Fiscal 2017 Plans
provide a new framework based on ISO 26000, the global standard for corporate social responsibility. In accordance, Hitachi Metals will further reinforce its PDCA cycle for CSR management to accurately
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationEMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation
EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation SOLUTIONS CENTER SOLUTION SUMMARY From digitalization initiatives
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationBUILDING the VIRtUAL enterprise
BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,
More informationOverall View and Collaborative Creation Activities for a Safe and Secure Society
Hitachi Review Vol. 65 (2016), No. 8 297 Technotalk Overall View and Collaborative Creation Activities for a Safe and Secure Society Kenji Watanabe, Ph.D. Toshihiko Nakano, Ph.D. Akihiro Ohashi Ichiro
More informationIT Town Hall Meeting. IT Town Hall - October 6,
IT Town Hall Meeting Scott F. Midkiff Vice President for Information Technology and CIO Professor of Electrical and Computer Engineering Virginia Tech midkiff@vt.edu IT Town Hall - October 6, 2014 1 Agenda
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationBack to the Future Cyber Security
Back to the Future Cyber Security A manifesto for Cyber Security and the Industrial Legacy Introduction Industrial facilities and infrastructure form the core of our economy and society. These advanced
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationCommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions
CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions Multi-tenant data centers are changing business for the better. Businesses
More informationEXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake
EXECUTIVE BRIEF : How Hybrid IT Outsourcing Shifts IT Focus to Innovation Challenge IT leaders are tasked to do more with less and increase technology innovation. At Stake As IT increasingly becomes the
More informationAttractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions
Concept Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions With Japan s population now beginning to decline, there is a pressing need for ways of generating
More informationHitachi Enterprise Cloud Family of Solutions
Hitachi Enterprise Cloud Family of Solutions Accelerate Enterprise Cloud Initiatives and Lower Costs SOLUTION PROFILE Companies are looking to lower the cost of IT management. They seek to achieve faster
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationIntelligent Operations Utilizing IT to Accelerate Social Innovation
324 Hitachi Review Vol. 63 (2014), No. 6 Featured Articles Operations Utilizing IT to Accelerate Social Innovation Toshiyuki Moritsu, Ph.D. Keiko Fukumoto Junji Noguchi, Ph.D. Takeshi Ishizaki Katsuya
More informationInformation Security Report
Information Report NEC s Approach to Information The NEC Group positions information security as an important management activity in our efforts to create new values through Solutions for Society. Kazuhiro
More informationCommission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers
Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September
More informationHow Cisco IT Improved Development Processes with a New Operating Model
How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More information