Hitachi Group IT Performance Report 2017

Size: px
Start display at page:

Download "Hitachi Group IT Performance Report 2017"

Transcription

1 Hitachi Group IT Performance Report 2017

2 Contents Message from CIO 1 2 Basic IT policy...1 Growth: Accelerating digital transformation...3 The Hitachi Group has been working to resolve wide range of social issues by utilizing digital technology such as AI for social innovation business which combined OT (operational technology) such as system control and operations and IT (information technology) which we have developed over 50 years with product system which has Hitachi's in-born strengths. 1 Taking the lead in digitalization, 3 4 Efficiency: Optimizing the Hitachi Group's IT resources...7 Control: Promoting information security governance to maintain the Hitachi brand and ensure business continuity...9 Hitachi Group IT Performance Report 2017 To support this social innovation business, our IT divisions are working to achieve both diversity and efficiency, and to optimize IT costs while improving speed. To do this, they are consolidating the Hitachi Group's IT environments to cloud systems following the latest trend in the world today. We are also installing Hitachi's IoT platform Lumada * 1 in in-house environments to make it easier to make use of cutting-edge digital technologies such as AI, analytics, and machine learning, to facilitate the accumulation and sharing of knowledges while expanding the use and application of data. Additionally, in view of growing the threat of cyber attacks, we have recognized information security as one of our key management challenges. To promote information security governance across the Hitachi Group as a whole, we have made an independent specialized division separate from our IT divisions, and strengthened our information security systems. I would like to leverage these initiatives in collaborative creation with our customers, and raising the value of our customers' businesses. This report details the strategies and current status of our IT divisions as quantitatively as possible. I hope you will all find this report useful. Shinichiro Omori Senior Vice President and Executive Officer, CIO Hitachi, Ltd. The Hitachi Group's IT Mid-Term Plan for 2018 was formulated in accordance with the 2018 Mid-Term Management Plan. In this IT Mid-Term Plan, we are strengthening our competitive IT based on the three pillars of Growth, Efficiency, and Control. (1) Hitachi Group's 2018 IT Mid-Term Plan In the 2018 Mid-Term Management Plan, Hitachi, Ltd. aims to focus on the social innovation business to become an innovation partner of the IoT age. Our IT divisions formulated the Hitachi Group's IT Mid-Term Plan for 2018 to support this aim, based on the three pillars of Growth, Efficiency, and Control. It is important to expand the use and application of vast amounts of digital data to maximize its value and effectiveness. Therefore, "Growth" focuses on two areas: First, creating innovation using digital data in front office that deal with face-to-face customer service, and workplaces that deal with creating solutions. Second, sophisticating the management decision-making through the expansion of digital data. As an initiative toward expanding digital innovation in front offices and other workplaces, we are introducing Hitachi's IoT platform "Lumada" to in-house environments, and accumulating and sharing expertise through the creation of case examples. In addition, to expand digital data that helps to sophisticate management decision-making, we are working on a platform that allows management information common in the Hitachi Group to be accumulated and used centrally. *1: Lumada: An IoT platform provided by Hitachi that enables the development of IoT-related solutions and easy customization

3 and accelerating social innovation business through IT To make steady progress on these initiatives, it is crucial that we develop our human resources. To do this, we have defined Hitachi-Group-standard "types" of IT human resources, and we are promoting skill enhancement particularly focusing on analytics engineers. Additionally, we must constantly understand advanced technologies, and revise and deploy technology policies that are required for the Hitachi Group. With this aim, we have set up an expert organization in the corporate IT strategy planning division. "Efficiency", which aims to secure a budget for strategic investment towards growth, involves continuous initiatives to reduce regular IT costs to establish a competitive IT portfolio. Particularly, we are promoting transition to a common IT platform in the Hitachi Group that actively uses public cloud technology, aiming to reduce costs associated with expanding consolidation. Our goal is to secure 35% of the entire IT budget for strategic IT investment. Regarding information security threats, we are strengthening our initiatives from the three perspectives "organizations", "systems", and "operations". As part of this initiative, for "Control" in FY 2017, we established a CISO* 1 who promotes all information security matters in the entire Hitachi Group. We have also isolated security functions from IT divisions, and established new, independent division specializing in security. We are also strengthening the robustness of IT environments step-by-step. Hitachi Group s 2018 IT Mid-Term Plan *1 CISO: Chief Information Security Officer Establishing data-driven business and management Growth Maximizing the value of digital information Reducing regular IT spending, and securing strategic IT investments to contribute to the correct divisions: Enhancement of in-house environments for Lumada, and accumulation and sharing expertise through the creation of case examples Establishment of a platform for accumulating and using data to centralize management information Efficiency Maximizing IT productivity Control Ensuring global IT governance Improving the efficiency of IT unique to individual Hitachi Group companies Consolidating and integrating common IT environments in the Hitachi Group FY 2015 (Results) FY 2018 (Targets)

4 2 Accelerating digital transformation We are continuing to introduce environments for accumulating and analyzing data, and enhancing the use and application of data in the Group. Accordingly, we are working to develop IT human resources and enhance the skills they will need for this expansion. (1) Creating innovation using digital data To expand the use and application of data, and effectively apply its results to our work, we must improve the efficiency of data analysis. To do this, we believe it is important to establish a platform for efficiently analyzing data collected and accumulated through many PoCs* and projects, visualizing the data, and making models of expertise that can then be reused. We are therefore enhancing Lumada in-house environments as a platform for promoting the use and application of data. By using Lumada in-house environments, we are collecting data from the entire work processes including the core value chain, from enterprise information systems and sensors installed in facilities and equipment, and loading this data into various analyses and visualizations. Based on the results of these analyses, we quantitatively evaluate work effectiveness to produce feedback for optimizing work processes. To be able to effectively use Lumada in-house environments, we are enhancing and providing analysis templates for reusing process sequences in data analysis. These templates contain specialist expertise so that sophisticated algorithms and machine learning can be used easily. Some case examples show that analysis work hours were reduced by approximately 70% by using these templates. We are also sharing expertise by introducing an analysis knowledge portal, which provides guidelines summarizing key points for each task in the analysis process. Also, it provides worksheets containing samples to help workers complete tasks efficiently. Optimizing entire end-to-end business processes by making use and application of data Finally, we are working on cooperation with business divisions by providing templates to third parties outside the Hitachi Group, and sharing Lumada common expertise in companies. AI *PoC: Proof of Concept Data Procurement Production Distribution Maintenance Overall optimization Feedback Studio Dashboard, application base, etc. Core Analytics Edge AI, machine Asset avatars learning, etc. Collecting data, controlling Foundry devices, etc. OS, security, etc.

5 70 Work hours required for analysis reduced by using analysis templates % Lumada in-house environments are used for a wide range of business areas including sales, procurement, and management. The number of case examples using such environments has increased by approximately 70%* compared to FY Recently analysis expertise has been accumulated by using data from sensors installed in facilities and equipment, and the number of case examples in the production and maintenance areas are increasing. Moreover, we are working on the efficiency improvement of maintenance services such as failure cause analysis of devices and facilities by using machine learning. Regarding a tendency to rely on individual skills to investigate failure causes, by indicating potential failure causes with machine learning, we aim to reduce time for investigation spent by maintenance staffs, and improve the availability of facilities and customer satisfaction. We are also using AI to make auditing work more efficient. Once AI loads auditing procedures then it automatically extracts candidate auditing targets from vast amounts of previously presented documents. We expect this extraction to take significantly less time compared to whole manual procedure. For example, in the production and maintenance areas, we carry out preventive maintenance and repair using predictive failure diagnosis technology. Specifically, by detecting unusual states of equipment in manufacturing line and addressing them before troubles, we aim to reduce maintenance time and improve the availability of production lines. Through this initiative, we expect to reduce regular maintenance time and failure repair time by approximately 33%. Also, we expect to reduce maintenance work hours and downtime in critical facility operations by approximately 92% by creating scheduled repair plans and arranging for replacement components in advance with predicting failures in product equipment about three months ahead. Percentage of use cases using Lumada in-house environments in each business area * Calculated in comparison with the numbers from April 2017 to February % 13% 27% 24% 22% 9% Opportunity management, etc. Inventory improving visualization, etc. Factory improving visualization, etc. Devices predictive diagnosis, etc. Performance improving visualization, etc. Work style innovation, etc.

6 2 Accelerating digital transformation (2) Sophisticating management decision-making by expanding digital data To allow flexible yet fast management decision-making in the entire Hitachi Group, we are accelerating the enhancement of environments for digital data use and application, to more efficiently identify cost structures of consolidated sales profit/loss and SG&A* 1, etc. We are continuing to work on the use and application of management information. For example, analyzing detailed data on indirect costs by organization, cost item, and work category is proving useful to optimizing SG&A and improving gross margins. In addition, we are considering using CRM* 2 -related and other data to help with decision-making in management resource distribution, in marketing, sales activities, and project management. To further accelerate the use and application of this kind of digital data, we aim to build environments so that we can efficiently accumulate, analyze, and visualize data from numerous sources. By centralizing data that has until now been siloed in their respective business areas, we will enhance a data accumulation and application platform so that users themselves can use data. *1 SG&A: Selling, General and Administrative expenses *2 CRM: Customer Relationship Management With the data accumulation and application platform, we can combine and use "individual information" in the core value chain area and "shared information" that centrally stores management data common in the Hitachi Group which is used for corporate-provided finance, sales, procurement, human resources areas. We will also implement security functionality and perform access control for user profiles, so that the appropriate data can be provided to the appropriate people. While enhancing this data accumulation and application platform, we are also simplifying and integrating the business systems that serve as data sources. By expanding the use of corporate-provided standard business applications, we can enable efficient and homogeneous digital data accumulation, as well as help to expand the global standardization of work processes and prevent duplicate IT investments. Data governance is also important in platforms for accumulating and applying data, which require accuracy, completeness, and consistency. Therefore, we have defined common rules for the use and application of data in the Hitachi Group, enhanced the structure for monitoring data quality, and are working to secure data quality by using the PDCA cycle. Data governance Enhancing a data accumulation and application platform for centralizing management information Dashboard (routine analysis) Checks necessary data at any time Lumada in-house environment External data Manager Administrator Worker Self-service BI (non-routine analysis) Freely analyzes breakdown data Data accumulation and application platform Standard business applications Business data Automates work using data Business-unit system

7 758 Ascertaining indirect cost items and breakdowns by job category at main Hitachi Group companies (FY 2016 results) billion yen 14 Standard IT human resources of the Hitachi Group classifications (3) Initiatives to shift our IT human resource portfolios Amidst the rapidly changing field of IT, for example the expanding use of public cloud systems and acceleration of digital transformation centering around the IoT field, the roles of in-house IT divisions are changing. Therefore, we believe it is urgent that we promote a systematic skill shift in IT human resources. Particularly, we are promoting the development and enhancement of analytics engineers, as the IT human resources that will drive digital transformation. Developing analytics engineers involves not only data analysis methods and IT knowledge; it is also crucial to be able to form hypotheses and think of ideas from a business perspective. To this end, we are planning to hold training courses to develop our analytics engineers, and raise skill levels. We are also promoting development through OJT, for example by participating in analytics projects using Lumada. We are promoting these initiatives not only with our IT divisions, but also involving our OT divisions. Going forward, we continue to accelerate the development of analytics engineers regardless of their respective divisions. To efficiently develop the required IT human resources in the entire Hitachi Group in near future, we established the Hitachi Group IT Human Resources Committee. This committee has used the information system user skill standards proposed by the general incorporated association "Japan Institute Users Association of Information Systems" as a base to define in-house IT tasks (functions), skills for completing tasks, and work jobs that require those skills, classifying the Hitachi-Group-standard IT human resources into 13 types. Later we added "analytics engineers (data analysts)" definition, making a current total of 14 types. By defining standard IT human resources types, we can now understand our human resources skill portfolio in the Hitachi Group. Based on this skill portfolio, the entire Group is now proposing plans and promoting measures to develop our common IT human resources to transform our human resources portfolio. Shifting the human resource portfolios of Hitachi Group IT divisions On-Site Resources Status as of April 2017 Projection for the end of FY 2021 *1: BU: Business units of Hitachi, Ltd. *2: CoE: Center of Excellence. Consolidates cutting-edge technology and expertise.

8 3 Optimizing the Hitachi Group's IT resources To build the right IT resource portfolio comparable to a global cutting-edge enterprise, promote expansion of strategic IT investments for growth. We are reforming our IT cost portfolios. (1) Reforming IT cost portfolios In the Hitachi Group, we have been promoting the "Hitachi Smart Transformation Project" to enhance growth and structural reforms in the global market. As a part of this project, IT divisions have been reducing regular IT spending across the entire Group. We are promoting measures to allocate resources, gained by reducing such regular IT spending, to strategic IT investment. We aim to expand strategic IT investment, which was 25% of the entire IT budget in FY 2015, to 35% in FY The Hitachi Group is working as one to reduce IT spending relating to regular operations and maintenance. To improve efficiency, IT environments in individual business units and Group companies are expanding measures to consolidate and integrate into a common Hitachi Group IT platform that actively applies public cloud technology. To enable each company's own IT that is differentiated for each business structure, business units and Group companies are promoting measures to improve the efficiency of operation and maintenance such as system integration. In order to optimize our investment in shared IT across the Hitachi Group, we have established a specialized division in our IT strategy planning division, within the Group s corporate management. This division maintains a shared investment policy, and defines and manages the decision-making process for investment. Defined responsibilities of process owner ( PO, responsible for budget management and profitability) and transformation engineer ( TE, responsible for the development and effectiveness of IT operations) are assigned, so that for specific investments the lines of authority and responsibility are clear. (2) Consolidating IT environments in the Hitachi Group Accelerating the use of public cloud systems To adapt flexibly to changes in business environments such as globalization, M&A (mergers and acquisitions), and expanding partnerships with external customers, and to both uphold system diversity and improve efficiency, we are accelerating the use of public cloud systems. For example, in collaboration environments, we are reducing system operation costs and improving efficiency by introducing global standard collaboration tools, as well as improving usability, for example by allowing staffs to use computers and smartphones from outside the company. There are now approximately 270,000 users of cloud collaboration tools. Reduction measures of regular IT spending Improving the efficiency of IT unique to individual Hitachi Group companies At the same time, to use in-house environments seamlessly with public cloud systems, we are improving usability and enhancing access management with SSO* using in-house IDs. The Hitachi Group had 38 cloud systems supporting SSO as of the end of February 2018, and we are promoting further expansion. To safely use public cloud systems, we have created usage guidelines for risk countermeasures, and verify each Group company that applies to use such systems is complying with the guidelines. By certifying companies for complying with guidelines, we can identify the status of public cloud use, ensure that no duplicate verifications are performed, and implement security risk countermeasures. Public cloud use in FY 2016 has increased by 38% compared to FY *SSO: Single Sign-On Accelerating the use of public cloud systems Consolidating the procurement and operation management of clients Consolidating the operation and maintenance of applications System integration etc.

9 38 Increase in the use of public cloud systems (FY 2016 compared to FY 2015) % 38 SSO-enabled cloud systems (As of the end of February 2018) systems Overview of public cloud use through SSO authentication SSO enables seamless use of in-house environment and public cloud Approved public cloud systems Authorization system On-premises Office Outside Consolidating the procurement and operation management of clients In the Hitachi Group, we are consolidating client procurement and operation management. We are reducing procurement costs through centralized purchasing that takes advantage of economies of scale, reducing operation and management costs through centralized management, and improving security measures based on the Hitachi Group security standards. We had over approximately 260,000 clients running as of February Among these, those that use consolidated or centralized management was approximately 130,000. We will continue to consolidate procurement and operation management for client environment going forward, to reduce IT costs. Overview of the consolidation of operation and maintenance of applications Company A ERP applications On-premises Company B ERP applications Company C ERP applications Each company's individual operations and environments *3 AMO: Application management outsourcing *4 DB: Database *5 EMEA: Europe, the Middle East and Africa Housing Virtual environments Consolidating the operation and maintenance of applications We are commonalizing individual ERP* 1 environments of each Group company, and standardizing operation and maintenance work (for approximately 40 companies and 70 systems* 2 ). We are proceeding with this consolidation and improving efficiency in the entire Group to reduce operation and maintenance costs. These initiatives enable us to plan efficient and scheduled ERP upgrades based on standardized environments in the future, and we expect a reduction in migration costs and improvement to system quality. We have already finished consolidating 8 systems, and will consolidate 30 more systems by *1 ERP: Enterprise Resource Planning *2 Results at the end of FY 2016 AMO* 3 Common Platforms Japan EMEA* 5 Company A Company B Company C Americas AMO services Platform services

10 4 Promoting information security governance to maintain the Hitachi brand and ensure business continuity Among the various risks surrounding IT, cyberattacks are daily becoming more and more sophisticated. The entire Hitachi Group is promoting preparation against a wide range of information security risks. (1) The Hitachi's security approach of "defense by the organization, by the system, and by operation" In the Hitachi Group, we are promoting safety and security based on the security approach "defense by the organization, by the system, and by operation". Not only do we build systems according to security measures, we also implement organization management and operative measures for monitoring and detecting unauthorized access from outside the company in order to continuously maintain the measures' effect. We believe it is important to perform risk analysis to ensure no biases in the three principles "defense by the organization, by the system, and by operation", and to always be thoroughly prepared for various risks. This is not just a challenge for IT; activities must involve management, business, and the organization as a whole, working steadily to establish processes and create manuals for this purpose. We believe in the importance of being ready for emergencies. Hitachi's approach to security: "Defense by the organization, by the system, and by operation" (2) Strengthening information security systems In its expansion of the social innovation business, the Hitachi Group acknowledges strengthening information security governance as an important management challenge in view of the advancement of IoT and growing the threat of cyber attacks. We have established a CISO who works directly under the CEO to promote all the information security matters in the entire Hitachi Group. Accordingly, we have isolated security functions from their IT divisions, placing them in a new, independent division, the "Information Security Risk Management Division", under the authority of the CISO. In this way, we are expanding and strengthening our information security structure. Information security systems Defense by the organization Defense by operation Technical requirements of security * *H-ARC Defense by the system

11 (3) Enhancing the security of IT environments IT divisions have taken information security measures to strengthen security to ensure robustness, for example: Network security, such as proxy services and VPNs* 1 security, such as spam filters and dynamic analysis End-point security, such as thin clients, antivirus, and remote wipes ID security Document security We are also promoting the following measures in collaboration with the Information Security Risk Management Division against the threat of sophisticated cyberattacks. Enhancement of network segment We are applying SDN* 2, a software-based network control technology to WANs* 3, to optimize network bandwidth and to minimize the area affected in emergencies by changing the configuration rapidly, and compartmentalizing networks. Vulnerability testing We are implementing checks and monitoring ("IP patrols") against the perceived risks of connecting devices not managed by the IT department to internal networks. Devices not managed by the IT department are detected through IP scanning, and low-security terminals are discovered at an early stage through vulnerability testing. By implementing vulnerability measures on low-security terminals, we will reduce the risk of virus infections and spreading via network connections. Thorough compliance with operation rules To address the ever-growing sophistication of vulnerability exploits, we are performing detailed evaluations of necessary ports, and closing unused ports. Furthermore, we always rule to apply the latest patch and execute it. Overview of security robustness (4) IT business continuity plans (BCP) Along with the basic approach of installing and operating servers in robust datacenters, the Hitachi Group also defines levels for emergency measures according to recovery time objectives for each service and recovery point objectives. Depending on the disaster recovery level, work is being done to prepare secondary servers and data backup environments, and to preserve data backups. We are also conducting periodic drills in line with BCPs. In addition to BCPs for emergencies, the Hitachi Group also conducts BCP drills in preparation for cyberattacks. Ensuring safety of backup data If the virus is spreading quickly, backup data might also be damaged at risk. To ensure the safety, we are storing data off site and installing equipment to immediately stop backup operations during an emergency, to prevent data backups from being overwritten by corrupted data. *1 VPN: Virtual Private Network *2 SDN: Software Defined Networking *3 WAN: Wide Area Network Firewall Firewall Firewall Firewall IP patrols of unmanaged devices and vulnerabilities

12 IT Strategy Division Hitachi, Ltd. Akihabara Daibiru Building, 18-13, Sotokanda 1-Chome, Chiyoda-ku, Tokyo, Japan Printed in Japan March 2018

Information Security and Cyber Security

Information Security and Cyber Security Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information

More information

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer

More information

Establish a new company to foster human resource for the global rollout of the Social Innovation Business using digital technologies

Establish a new company to foster human resource for the global rollout of the Social Innovation Business using digital technologies FOR IMMEDIATE RELEASE Establish a new company to foster human resource for the global rollout of the Social Innovation Business using digital technologies Merging two companies of Hitachi Institute of

More information

Contributes to Improving Efficiency of Repair Work and More Stable Operation

Contributes to Improving Efficiency of Repair Work and More Stable Operation FOR IMMEDIATE RELEASE Begins Joint Demonstrative Testing of Service Platform Utilizing AI to Automatically Propose Optimal Repairs for Industrial Machinery with US Subsidiary Sullair Contributes to Improving

More information

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki

More information

Disaster Management and Security Solutions to Usher in the IoT Era

Disaster Management and Security Solutions to Usher in the IoT Era Disaster Management and Solutions for a Safe and Secure Way of Life Overview Disaster Management and Solutions to Usher in the IoT Era Takeshi Miyao Toshihiko Nakano, Ph.D. 1. The Bright and Dark Sides

More information

Hitachi Announces 2018 Mid-term Management Plan

Hitachi Announces 2018 Mid-term Management Plan FOR IMMEDIATE RELEASE Contacts: Japan: Mickey Takeuchi U.K.: Yuki Maeda Hitachi, Ltd. Hitachi Europe Ltd. +81-3-5208-9324 +44-1628-585714 masayuki.takeuchi.cc@hitachi.com yuki.maeda@hitachi-eu.com Hitachi

More information

O&M Service for Sustainable Social Infrastructure

O&M Service for Sustainable Social Infrastructure O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication

Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication 118 Hitachi Review Vol. 65 (2016), No. 6 Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication Yasuharu Namba, Dr. Eng. Jun Yoshida Kazuaki Tokunaga Takuya

More information

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Cloud for Government: A Transformative Digital Tool to Better Serve Communities Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital

More information

Fujitsu Technology and Service Vision

Fujitsu Technology and Service Vision FEATURE Fujitsu Technology and Service Vision Innovation inspired by Fujitsu, enabled by new ICT A HUMAN CENTRIC INTELLIGENT SOCIETY OUR VISION The role of ICT up to now has mainly been to increase productivity

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

Management Frameworks

Management Frameworks Chapter I Internal Fujitsu Group Information Security Independent of the chief information officer (CIO), the Fujitsu Group has appointed a chief information security officer (CISO) under the authority

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers 302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Achieving Growth and Hitachi s Transformation

Achieving Growth and Hitachi s Transformation Our Strategy Throughout its 100 year history, the Hitachi Group has passed on its Mission and its Values to generations of employees and external stakeholders. The Vision has been created based on the

More information

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

*1 Indirect materials: materials used in a production process, but which can t be linked to a specific product or job.

*1 Indirect materials: materials used in a production process, but which can t be linked to a specific product or job. FOR IMMEDIATE RELEASE Hitachi to Transfer Shares in Hitachi Procurement Service to Infosys, Panasonic, and PASONA A new company, HIPUS aims to combine the strengths and expertise of each company, and accelerates

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Implementation and Future Plans for Global IoT Maintenance System

Implementation and Future Plans for Global IoT Maintenance System FEATURED ARTICLES Public and Social Infrastructure for Safe and Pleasant Cities Implementation and Future Plans for Global IoT System There is an accelerating global trend, especially in industry, for

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

1. Advice, coordination, and other assistance

1. Advice, coordination, and other assistance The information and communications services network and environment are bringing about changes in industry structure and every aspect of people s lives, as seen in the enhancement of the broadband communications

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Systems & Services Business Strategy

Systems & Services Business Strategy Systems & Services Business Strategy Hitachi IR Day 2016 June 1, 2016 Keiichi Shiotsuka Senior Vice President and Executive Officer, Head of Systems & Services Business Hitachi, Ltd. Systems & Services

More information

Oktober 2018 Dell Tech. Forum München

Oktober 2018 Dell Tech. Forum München Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven

More information

Security Solutions Assisting Social Infrastructure Digitalization

Security Solutions Assisting Social Infrastructure Digitalization FEATURED ARTICLES Social Infrastructure and its Digitalization Overview Solutions Assisting Social Infrastructure Digitalization Takeshi Miyao Junichi Tanimoto 1. Digitalization and Threats The rise of

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Data Center Management and Automation Strategic Briefing

Data Center Management and Automation Strategic Briefing Data Center and Automation Strategic Briefing Contents Why is Data Center and Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Social Innovation -New Value through Collaborative Creation

Social Innovation -New Value through Collaborative Creation Social Innovation -New Value through Collaborative Creation Sep. 5, 2016 Shinjiro Iwata Advisor, Hitachi, Ltd., Japan Contents 1. An Era of New Innovation 2. Hitachi s Social Innovation Business 3. A New

More information

Advancing the MRJ project

Advancing the MRJ project Advancing the MRJ project 2017.1.23 2017 MITSUBISHI HEAVY INDUSTRIES, LTD. All Rights Reserved. Overview The Mitsubishi Regional Jet (MRJ) delivery date is adjusted from mid-2018 to mid-2020 due to revisions

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Converged Cloud and Digital Transformation: A Strategy for Business Success

Converged Cloud and Digital Transformation: A Strategy for Business Success Converged and Digital Transformation: A Strategy for Business Success An IDC InfoBrief, Sponsored by Lenovo December 2017 Sponsored by Lenovo Page 1 Digital Transformation (DX) is Changing Everything About

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

With K5 you can. Do incredible things with Fujitsu Cloud Service K5

With K5 you can. Do incredible things with Fujitsu Cloud Service K5 With K5 you can Do incredible things with Fujitsu Cloud Service K5 Making incredible possible Digital is changing everything. According to a Fujitsu survey, customers and employees think it s vital for

More information

Management Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED

Management Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED Management Direction FY2017 Progress Review June 6, 2017 FY 2015-2016 Financial Results and FY 2017 Plan Operating profit margin Free cash flow 2.5% 2.9% 4.5% Target 10% or more (Billion JPY) 88.7 104.8

More information

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Management Information Systems. B15. Managing Information Resources and IT Security

Management Information Systems. B15. Managing Information Resources and IT Security Management Information Systems Management Information Systems B15. Managing Information Resources and IT Security Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:

More information

Hitachi Received Notice of Request for Arbitration

Hitachi Received Notice of Request for Arbitration FOR IMMEDIATE RELEASE Hitachi Received Notice of Request for Arbitration Tokyo, August 22, 2017 --- Hitachi, Ltd. (TSE: 6501, Hitachi ) today announced that it has received the notice of the request for

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

SECURITY SERVICES SECURITY

SECURITY SERVICES SECURITY SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed

More information

Management Direction Briefing October 29, 2015 Fujitsu Limited

Management Direction Briefing October 29, 2015 Fujitsu Limited Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Fiscal 2015 Activities Review and Plan for Fiscal 2016

Fiscal 2015 Activities Review and Plan for Fiscal 2016 Fiscal 2015 Activities Review and 1. The Ricoh Group s Information Security Activities In response to changes emerging in the social environment, the Ricoh Group is promoting its PDCA management system

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Connected Car Solutions Based on IoT

Connected Car Solutions Based on IoT FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the

More information

AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE

AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE Agenda Report TO: FROM: SUBJECT: Honorable Mayor and City Council Department of Information Technology AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE

More information

Go Cloud. VMware vcloud Datacenter Services by BIOS

Go Cloud. VMware vcloud Datacenter Services by BIOS Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Development of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization

Development of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization Hitachi Review Vol. 65 (2016), No. 1 741 Featured Articles Development of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization Atsushi Kawai Yuuji Ikawa Hiroaki

More information

Grow Your Services Business

Grow Your Services Business Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business

More information

Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan

Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan Federal Data Center Consolidation Initiative (FDCCI) Workshop I: Initial Data Center Consolidation Plan June 04, 2010 FDCCI Workshop I Agenda for June 4, 2010 1. Welcome Katie Lewin GSA Director Cloud

More information

FOR IMMEDIATE RELEASE

FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE Okuma and Hitachi Embark on Collaborative Creation Aiming to Establish an Advanced Model for Mass Customization Using IoT Launching a Joint Demonstration Experiment for Production

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

TD01 - Enabling Digital Transformation Through The Connected Enterprise

TD01 - Enabling Digital Transformation Through The Connected Enterprise TD01 - Enabling Digital Transformation Through The Connected Enterprise Name Mukund Title Business Manager, Software, Asia Pacific Date January 22, 2018 Copyright 2016 Rockwell Automation, Inc. All Rights

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

Big data and data centers

Big data and data centers Big data and data centers Contents Page 1 Big data and data centers... 3 1.1 Big data, big IT... 3 1.2 The IT organization between day-to-day business and innovation... 4 2 Modern data centers... 5 2.1

More information

CIO Forum Maximize the value of IT in today s economy

CIO Forum Maximize the value of IT in today s economy CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed

More information

Optimisation drives digital transformation

Optimisation drives digital transformation January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business

More information

(b) Fiscal 2016 Initiative Results and Fiscal 2017 Plans

(b) Fiscal 2016 Initiative Results and Fiscal 2017 Plans provide a new framework based on ISO 26000, the global standard for corporate social responsibility. In accordance, Hitachi Metals will further reinforce its PDCA cycle for CSR management to accurately

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation SOLUTIONS CENTER SOLUTION SUMMARY From digitalization initiatives

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

Overall View and Collaborative Creation Activities for a Safe and Secure Society

Overall View and Collaborative Creation Activities for a Safe and Secure Society Hitachi Review Vol. 65 (2016), No. 8 297 Technotalk Overall View and Collaborative Creation Activities for a Safe and Secure Society Kenji Watanabe, Ph.D. Toshihiko Nakano, Ph.D. Akihiro Ohashi Ichiro

More information

IT Town Hall Meeting. IT Town Hall - October 6,

IT Town Hall Meeting. IT Town Hall - October 6, IT Town Hall Meeting Scott F. Midkiff Vice President for Information Technology and CIO Professor of Electrical and Computer Engineering Virginia Tech midkiff@vt.edu IT Town Hall - October 6, 2014 1 Agenda

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

DIGITAL TRUST Making digital work by making digital secure

DIGITAL TRUST Making digital work by making digital secure Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots

More information

Back to the Future Cyber Security

Back to the Future Cyber Security Back to the Future Cyber Security A manifesto for Cyber Security and the Industrial Legacy Introduction Industrial facilities and infrastructure form the core of our economy and society. These advanced

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions

CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions Multi-tenant data centers are changing business for the better. Businesses

More information

EXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake

EXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake EXECUTIVE BRIEF : How Hybrid IT Outsourcing Shifts IT Focus to Innovation Challenge IT leaders are tasked to do more with less and increase technology innovation. At Stake As IT increasingly becomes the

More information

Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions

Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions Concept Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions With Japan s population now beginning to decline, there is a pressing need for ways of generating

More information

Hitachi Enterprise Cloud Family of Solutions

Hitachi Enterprise Cloud Family of Solutions Hitachi Enterprise Cloud Family of Solutions Accelerate Enterprise Cloud Initiatives and Lower Costs SOLUTION PROFILE Companies are looking to lower the cost of IT management. They seek to achieve faster

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

Intelligent Operations Utilizing IT to Accelerate Social Innovation

Intelligent Operations Utilizing IT to Accelerate Social Innovation 324 Hitachi Review Vol. 63 (2014), No. 6 Featured Articles Operations Utilizing IT to Accelerate Social Innovation Toshiyuki Moritsu, Ph.D. Keiko Fukumoto Junji Noguchi, Ph.D. Takeshi Ishizaki Katsuya

More information

Information Security Report

Information Security Report Information Report NEC s Approach to Information The NEC Group positions information security as an important management activity in our efforts to create new values through Solutions for Society. Kazuhiro

More information

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information