Your SlideShare is downloading. ×
0
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
ANZ Momentum Day 2012: John O'Melia Keynote
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ANZ Momentum Day 2012: John O'Melia Keynote

583

Published on

ANZ Momentum Day 2012

ANZ Momentum Day 2012

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
583
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Strategies & Solutions for Business Transformation John O’Melia VP WW Services INFORMATION INTELLIGENCE GROUP WEDNESDAY, AUGUST 29, 2012© Copyright 2012 EMC Corporation. All rights reserved. 1
  • 2. The Value of EMC Information Intelligence Group RSA Security INFORMATION Greenplum INFRASTRUCTURE Data Computing PRODUCTS Backup & Recovery Solutions Storage© Copyright 2012 EMC Corporation. All rights reserved. 2
  • 3. FINDING NEWSOURCES Engineering Standards andOF ENERGY Procedures Well File Management SOP Management Quality Specification Management Drawing Management HSE Standards and Procedures Plant and Facility Management© Copyright 2012 EMC Corporation. All rights reserved. 3
  • 4. ADVANCING MEDICALADVANCING MEDICALDISCOVERIESDISCOVERIES Quality Specification Electronic Drug Management Submissions Medical Imaging Management Lab Tech Collaboration HIPAA Standards and Procedures SOP Management© Copyright 2012 EMC Corporation. All rights reserved. 4
  • 5. PROTECTING BORDERS Records ManagementInformation RightsManagement Image & Video Management Security Collaboration Security Standards and Procedures Investigative Case Management© Copyright 2012 EMC Corporation. All rights reserved. 5
  • 6. ACCELERATING THEPACE OF BUSINESS Loan Processing Multi-channel Communications New Customer On-boarding HR Employee Benefits New Product Launch Management Claims Processing© Copyright 2012 EMC Corporation. All rights reserved. 6
  • 7. TRENDS© Copyright 2012 EMC Corporation. All rights reserved. 7
  • 8. 3D Information Growth Contributesto “Big Data” PRODUCED AMOUNT RICHNESS DISPERSION INFORMATION© Copyright 2012 EMC Corporation. All rights reserved. 8
  • 9. Sarbanes-Oxley Act (SOX) ~ PCAOB ~ SAS 94 ~ AICPA/CICA Privacy Framework ~ AICPA Suitable Trust Services Criteria ~ SEC Retention of Records, 17 CFR 210.2-06 ~ SEC Controls andProcedures, 17 CFR 240.15d-15 ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3 ~ Basel II ~ BIS Sound Practices for the Management and Supervision of Operational Risk ~ Gramm-Leach-Bliley Act (GLB) ~ Standards for Safeguarding Customer Information, FTC 16 CFR 314 ~ Privacy of Consumer Financial Information Rule ~ Safety and Soundness Standards, Appendix of 12CFR 30 ~ FFIEC Information Security ~ FFIEC Development Acquisition ~ FFIEC Business Continuity Planning ~ FFIEC Audit ~ FFIEC Management ~ FFIEC Operations ~ NASD ~ NYSE ~Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1 ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3 ~ Records to be preserved by exchange members, SEC17 CFR 240.17a-4 ~ Recordkeeping, SEC 17 CFR 240.17Ad-6 ~ Record retention, SEC 17 CFR 240.17Ad-7 ~ HIPAA (Health Insurance Portability and Accountability Act) ~ HIPAA HCFA InternetSecurity Policy ~ NIST Introductory Resource Guide for [HIPAA] (800-66) ~ CMS Core Security Requirements (CSR) ~ CMS Information Security Acceptable Risk Safeguards (ARS) ~ CMSInformation Security Certification & Accreditation (C&A) ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1 ~ Federal Energy Regulatory Commission (FERC) ~ North AmericanElectric Reliability Council (NERC) ~ VISA CISP (Cardholder Information Security Program) ~ Mastercard SDP (Site Data Protection) Program ~ American Express DSS (Data Security Standard) ~PCI DSS (Payment Card Industry Data Security Standard) ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act) ~ Uniform Electronic Transactions Act (UETA) ~ FISMA (FederalInformation Security Management Act) ~ FISCAM (Federal Information System Controls Audit Manual) ~ FIPS Security Requirements for Cryptographic Modules 140-2 ~ FIPS Guideline for theAnalysis of LAN Security 191 ~ FIPS Application Profile for GILS 192 ~ Clinger-Cohen Act (Information Technology Management Reform Act) ~ National Strategy to Secure Cyberspace ~ GAOFinancial Audit Manual ~ DOD ...Standard for Electronic Records Management Software...5015-2 ~ CISWG Report on the Best Practices Subgroup ~ CISWG Information Security Program Elements ~NCUA Guidelines for Safeguarding Member Information 12 CFR 748 ~ IRS Revenue Procedure: Retention of books and records 97-22 ~ IRS Revenue Procedure: Record retention: automatic dataprocessing… 98-25 ~ IRS Internal Revenue Code Section 501(c)(3) ~ Federal Rules of Civil Procedure ~ Uniform Rules of Civil Procedure ~ ISO 15489-1 Information and Documentation: Recordsmanagement: General ~ ISO 15489-2 Information and Documentation: Records management: Guidelines ~ DIRKS: A Strategic Approach to Managing Business Information ~ Sedona PrinciplesAddressing Electronic Document Production ~ NIST ...Principles and Practices for Securing IT Systems 800-14 ~ NIST Developing Security Plans for Federal Information Systems 800-18 ~ NISTSecurity Self-Assessment Guide... 800-26 ~ NIST Risk Management Guide... 800-30 ~ NIST Contingency Planning Guide... 800-34 ~ NIST ...Patch and Vulnerability Management Program 800-40 ~NIST Guidelines on Firewalls and Firewall Policy 800-41 ~ NIST Security Controls for Federal Information Systems 800-53 ~ NIST ...Mapping...Information and...Systems to Security Categories 800-60~ NIST Computer Security Incident Handling Guide 800-61 ~ NIST Security Considerations in...Information System Development 800-64 ~ ISO 73:2002 Risk management -- Vocabulary ~ ISO 1335Information technology – Guidelines for management of IT Security ~ ISO 17799:2000 Code of Practice for Information Security Management ~ ISO 27001:2005 ...Information Security ManagementSystems -- Requirements ~ IT Information Library (ITIL) Planning to Implement Service Management ~ IT Information Library (ITIL) ICT Infrastructure Management ~ IT Information Library (ITIL)Service Delivery ~ IT Information Library (ITIL) Service Support ~ IT Information Library (ITIL) Application Management ~ IT Information Library (ITIL) Security Management ~ COSO Enterprise RiskManagement (ERM) Framework ~ CobiT 3rd Edition ~ CobiT 4th Edition ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control... ~ NFPA 1600 Disaster/EmergencyManagement and Business Continuity ~ Information Security Forum (ISF) Standard of Good Practice ~ Information Security Forum (ISF) Security Audit of Networks ~ A Risk Management Standard,jointly issued by AIRMIC, ALARM, and IRM ~ Business Continuity Institute (BCI) Good Practice Guidelines ~ IIA Global Technology Audit Guide - Information Technology Controls ~ ISSA Generally REGULATIONS & STANDARDS INCREASEAccepted Information Security Principles (GAISP) ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE) ~ Cable Communications Privacy Act Title 47 § 551 ~Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv) ~ CAN SPAM Act ~ Childrens Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Childrens Online Privacy Protection Act(COPPA) 16 CFR 312 ~ Drivers Privacy Protection Act (DPPA) 18 USC 2721 ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232 ~ Privacy Act of 1974 5 USC 552a ~ Telemarketing SalesRule (TSR) 16 CFR 310 ~ Video Privacy Protection Act (VPPA) 18 USC 2710 ~ Specter-Leahy Personal Data Privacy and Security Act ~ AR Personal Information Protection Act SB 1167 ~ AZAmendment to Arizona Revised Statutes 13-2001 HB 2116 ~ CA Information Practice Act SB 1386 ~ CA General Security Standard for Businesses AB 1950 ~ CA Public Records Military VeteranDischarge Documents AB 1798 ~ CA OPP Recommended Practices on Notification of Security Breach ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134 ~ COConsumer Credit Solicitation Protection HB 1274 ~ CO Prohibiting Inclusion of Social Security Number HB 1311 ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650 ~ CTConcerning Nondisclosure of Private Tenant Information HB 5184 ~ DE Computer Security Breaches HB 116 ~ FL Personal Identification Information/Unlawful Use HB 481 ~ GA Consumer ReportingAgencies SB 230 ~ GA Public employees; Fraud, Waste, and Abuse HB 656 ~ HI Exempting disclosure of Social Security numbers HB 2674 ~ IL Personal Information Protection Act HB 1633 ~ INRelease of Social Security Number, Notice of Security Breach SB 503 ~ LA Database Security Breach Notification Law SB 205 Act 499 ~ ME To Protect Maine Citizens from Identity Theft LD 1671 ~MN Data Warehouses; Notice Required for Certain Disclosures HF 2121 ~ MO HB 957 ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732 ~ NJ Identity Theft Prevention ActA4001/S1914 ~ NY A4254, A3492 [no title] ~ NV SB 347 [no title] ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048 ~ ND Personal information protection act SB 2251 ~OH Personal information -- contact if unauthorized access HB 104 ~ RI Security Breach Notification Law H 6191 ~ TN Security Breach Notification SB 2220 ~ TX Identity Theft Enforcement andProtection Act SB 122 ~ VT Relating to Identity Theft HB 327 ~ VA Identity theft; penalty; restitution; victim assistance HB 872 ~ WA Notice of a breach of the security SB 6043 ~ EU Directive onPrivacy and Electronic Communications 2002/58/EC ~ EU Directive on Data Protection 95/46/EC ~ US Department of Commerce EU Safe Harbor Privacy Principles ~ Consumer Interests in theTelecommunications Market Act No. 661 ~ Directive On Privacy And Electronic Communications 2002.58.EC ~ OECD Technology Risk Checklist ~ OECD Guidelines on...Privacy and TransborderFlows of Personal Data ~ UN Guidelines for the Regulation of Computerized Personal Data Files (1990) ~ ISACA Cross-border Privacy Impact Assessment ~ The Combined Code on CorporateGovernance ~ Turnbull Guidance on Internal Control, UK FRC ~ Smith Guidance on Audit Committees Combined Code, UK FRC ~ UK Data Protection Act of 1998 ~ BS 15000-1 IT ServiceManagement Standard ~ BS 15000-2 IT Service Management Standard - Code of Practice ~ Canada Keeping the Promise for a Strong Economy Act Bill 198 ~ Canada Personal Information Protectionand Electronic Documents Act ~ Canada Privacy Policy and Principles ~ Argentina Personal Data Protection Act ~ Mexico Federal Personal Data Protection Law ~ Austria Data Protection Act ~Austria Telecommunications Act ~ Bosnia Law on Protection of Personal Data ~ Czech Republic Personal Data Protection Act ~ Denmark Act on Competitive Conditions and Consumer Interests ~Finland Personal Data Protection Act ~ Finland Amendment of the Personal Data Act ~ France Data Protection Act ~ German Federal Data Protection Act ~ Greece Law on Personal Data Protection~ Hungary Protection of Personal Data and Disclosure of Data of Public Interest ~ Iceland Protection of Privacy as regards the Processing of Personal Data ~ Ireland Data Protection Act ~ Ireland DataProtection Amendment 2003 ~ Italy Personal Data Protection Code ~ Italy Protection of Individuals with Regard to...Processing of Personal Data ~ Lithuania Law on Legal Protection of Personal Data~ Luxembourg Data Protection Law ~ Netherlands Personal Data Protection Act ~ Poland Protection of Personal Data Act ~ Slovak Republic Protection of Personal Data in Information Systems ~Slovenia Personal Data Protection Act ~ South Africa Promotion of Access to Information Act ~ Spain Organic law on the Protection of Personal Data ~ Sweden Personal Data Act ~ Swiss Federal Acton Data Protection ~ Australian Business Continuity Management Guide ~ Australia Spam Act of 2003 ~ Australia Privacy Amendment Act ~ Australia Telecommunications Act ~ Australia Spam Act2003: A Practical Guide for Business ~ Hong Kong Personal Data (Privacy) Ordinance ~ Hong Kong Personal Data (Privacy) Ordinance ~ India Information Privacy Act ~ Japan Guidelines forPersonal Data Protection in Electronic Commerce, ECOM ~ Japan Handbook Concerning Protection of International Data, MITI ~ Japan Personal Information Protection Act ~ Korea Act on thePromotion Copyright 2011 EMC Corporation. All rights the Protection of Personal Information by Public Agencies ~ Korea Use and Protection of Credit Information Act ~ New Zealand Privacy Act ~ 9 © Copyright 2012 EMC Corporation. on reserved. © of Information...Protection ~ Korea Act All rights reserved. 9
  • 10. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Choice© Copyright 2012 EMC Corporation. All rights reserved. 10
  • 11. OUR MISSION To help our customers get maximum leverage from their information© Copyright 2012 EMC Corporation. All rights reserved. 11
  • 12. © Copyright 2012 EMC Corporation. All rights reserved. 12
  • 13. © Copyright 2012 EMC Corporation. All rights reserved. 13
  • 14. NEW USER© Copyright 2012 EMC Corporation. All rights reserved. 14
  • 15. Documentum D2 Faster delivery Lower risk More responsive Increase adoption Drive higher value applications Create a great user experience© Copyright 2012 EMC Corporation. All rights reserved. 15
  • 16. Documentum MobileEnable multi-channel interactions on any device Support for iOS Mobile Devices Search and Browse Documentum Content Import Content Review and Approve Workflows View and Manage Custom Metadata Be in the know with Push Notifications© Copyright 2012 EMC Corporation. All rights reserved. 16
  • 17. SyncplicityEnterprise Sync and Share that the CIO Trusts and the User Loves Cloud-based Enterprise-class Sync and Share Seamless and Automatic File Access (from PC, Mac, Mobile Devices, and Business Applications) User Not Forced to Change Personal Organization Preferences Built for IT (Protect Users and Data, Enforce Corporate Policies, and Reduce Support and Infrastructure Costs) Best-in-Class Security (End point and over-the-wire encryption; Remote wipe user, device, or files) Free, Personal, and Business Editions Available Today© Copyright 2012 EMC Corporation. All rights reserved. 17
  • 18. Seamless SharePoint InteroperabilityChoice of Interface – D2, SharePoint, or Syncplicity© Copyright 2012 EMC Corporation. All rights reserved. 18
  • 19. © Copyright 2012 EMC Corporation. All rights reserved. 19
  • 20. IS THE EMC OnDemand PERFECT? A new enterprise-class CLOUD hybrid cloud deployment model managed by EMC experts© Copyright 2012 EMC Corporation. All rights reserved. 20
  • 21. Understand Audit Federated Automate Policy Track Policy Protect Control© Copyright 2012 EMC Corporation. All rights reserved. 21
  • 22. DOCUMENTUM xCP BIG DATA© Copyright 2012 EMC Corporation. All rights reserved. 22
  • 23. PUBLIC ENERGY FINANCIAL LIFE HEALTHCARE SECTOR SERVICES SCIENCES© Copyright 2012 EMC Corporation. All rights reserved. 23
  • 24. Solutions PRODUCTIZED SERVICES PARTNERS ENGINEERING PLANT FACILITIES ENTERPRISE MAINTENANCE ARCHIVING (EAS) MORE THAN 60 (EPFM) SOLUTIONS ENTERPRISE SHAREPOINT 24 CERTIFIED COMPLIANCE DOCUMENTUM (ECS) FRAMEWORK SOLUTIONS ACROSS 5 MAJOR LIFE SCIENCES VERTICAL SOLUTIONS VERTICALS© Copyright 2012 EMC Corporation. All rights reserved. 24
  • 25. Next 6 Months© Copyright 2012 EMC Corporation. All rights reserved. 25
  • 26. DOCUMENTUM 7.0 DOCUMENTUM Next 6 Months    8x TCO Improvement Private-Cloud Optimized Enhanced Security and Compliance© Copyright 2012 EMC Corporation. All rights reserved. 26
  • 27. D2 4.1 Next 6 Months© Copyright 2012 EMC Corporation. All rights reserved. 27
  • 28. Documentum Mobile 1.3 Next 6 Months   D2 Configuration Driven Configurable Facets  Activity Streams© Copyright 2012 EMC Corporation. All rights reserved. 28
  • 29. DOCUMENTUM xCP 2.0 Next 6 Months   Rapid Application Composition Big Data Enabled  Private-Cloud Optimized  Enhanced User Experience© Copyright 2012 EMC Corporation. All rights reserved. 29
  • 30. CAPTIVA 7.0 Next 6 Months    Unified Operator UI Unified Designer Improved Classification Accuracy© Copyright 2012 EMC Corporation. All rights reserved. 30
  • 31. Next4.7 Kazeon 6 Months5.1 Document Sciences 4.2 Documentum IRM© Copyright 2012 EMC Corporation. All rights reserved. 31
  • 32. DOCUMENTUM SOLUTION SUITE FOR LIFE SCIENCES Next 6 Months  SUBMISSIONS  TRIAL MASTER FILE© Copyright 2012 EMC Corporation. All rights reserved. 32
  • 33. PRODUCT AND SOLUTION RELEASES 23© Copyright 2012 EMC Corporation. All rights reserved. 33
  • 34. 45 EMC CERTIFIED SOLUTIONS FIN SERV BANKING AND HEALTHCARE GOVERNMENT ENERGY LIFE SCIENCES INSURANCE© Copyright 2012 EMC Corporation. All rights reserved. 34
  • 35. LIFE SCIENCES RE-ENERGIZED© Copyright 2012 EMC Corporation. All rights reserved. 35
  • 36. CLOUD DEPLOYMENT© Copyright 2012 EMC Corporation. All rights reserved. 36
  • 37. MOBILE EXPEDITED© Copyright 2012 EMC Corporation. All rights reserved. 37
  • 38. In Summary BEST OF BREED GREAT USER SOLUTIONS PRODUCTS EXPERIENCE POWER OF CONFIGURATION GREAT LOOKING USER FOCUS ON SOLUTIONS TO WITH DOCUMENTUM D2 INTERFACES ACCELERATE TIME TO BUSINESS VALUE FULLY UNIFIED SECURE MOBILE SUPPORT COMPOSITION TOOLS WITH ACCELERATE BUSINESS DOCUMENTUM xCP ALLOW USERS TO HAVE ALL TRANSFORMATION THEIR CONTENT, ANYWHERE CLOUD-BASED SYNC+SHARE AND AT ANY TIME WITH SYNCPLICITY© Copyright 2012 EMC Corporation. All rights reserved. 38

×