EMC ANZ Momentum User Group 2011- IIG Strategy and Vision

787 views
632 views

Published on

IIG STRATEGY AND VISION
John OMelia

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
787
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

EMC ANZ Momentum User Group 2011- IIG Strategy and Vision

  1. 1. IIG STRATEGY AND VISION© Copyright 2011 EMC Corporation. All rights reserved. 1
  2. 2. The Value of EMC Information Intelligence Group RSA Security INFORMATION Greenplum INFRASTRUCTURE Data Computing PRODUCTS Backup & Recovery Solutions Storage© Copyright 2011 EMC Corporation. All rights reserved. 2
  3. 3. Value Creation in the Information Economy The Information Fabric must enable… Strategic Business Transformation vs. Operational Efficiency We have entered the era where information drives strategic transformation, not just operational optimization© Copyright 2011 EMC Corporation. All rights reserved. 3
  4. 4. Driving Strategic Business Transformation INSURANCE BANKING PUBLISHING© Copyright 2011 EMC Corporation. All rights reserved. 4
  5. 5. The Opportunity Internal IT has a Unique Opportunity Evolve into a “Line” function Business has a Unique Opportunity Be the Disruptor rather than the Disrupted Compliance has a Unique Opportunity Accelerate the Pace of Disruption We have a central role to play, if we choose to…© Copyright 2011 EMC Corporation. All rights reserved. 5
  6. 6. TRENDS© Copyright 2011 EMC Corporation. All rights reserved. 6
  7. 7. 3D Information Growth Contributesto “Big Data” PRODUCED AMOUNT RICHNESS DISPERSION INFORMATION© Copyright 2011 EMC Corporation. All rights reserved. 7
  8. 8. Sarbanes-Oxley Act (SOX) ~ PCAOB ~ SAS 94 ~ AICPA/CICA Privacy Framework ~ AICPA Suitable Trust Services Criteria ~ SEC Retention of Records, 17 CFR 210.2-06 ~ SEC Controls andProcedures, 17 CFR 240.15d-15 ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3 ~ Basel II ~ BIS Sound Practices for the Management and Supervision of Operational Risk ~ Gramm-Leach-Bliley Act (GLB) ~ Standards for Safeguarding Customer Information, FTC 16 CFR 314 ~ Privacy of Consumer Financial Information Rule ~ Safety and Soundness Standards, Appendix of 12CFR 30 ~ FFIEC Information Security ~ FFIEC Development Acquisition ~ FFIEC Business Continuity Planning ~ FFIEC Audit ~ FFIEC Management ~ FFIEC Operations ~ NASD ~ NYSE ~Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1 ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3 ~ Records to be preserved by exchange members, SEC17 CFR 240.17a-4 ~ Recordkeeping, SEC 17 CFR 240.17Ad-6 ~ Record retention, SEC 17 CFR 240.17Ad-7 ~ HIPAA (Health Insurance Portability and Accountability Act) ~ HIPAA HCFA InternetSecurity Policy ~ NIST Introductory Resource Guide for [HIPAA] (800-66) ~ CMS Core Security Requirements (CSR) ~ CMS Information Security Acceptable Risk Safeguards (ARS) ~ CMSInformation Security Certification & Accreditation (C&A) ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1 ~ Federal Energy Regulatory Commission (FERC) ~ North AmericanElectric Reliability Council (NERC) ~ VISA CISP (Cardholder Information Security Program) ~ Mastercard SDP (Site Data Protection) Program ~ American Express DSS (Data Security Standard) ~PCI DSS (Payment Card Industry Data Security Standard) ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act) ~ Uniform Electronic Transactions Act (UETA) ~ FISMA (FederalInformation Security Management Act) ~ FISCAM (Federal Information System Controls Audit Manual) ~ FIPS Security Requirements for Cryptographic Modules 140-2 ~ FIPS Guideline for theAnalysis of LAN Security 191 ~ FIPS Application Profile for GILS 192 ~ Clinger-Cohen Act (Information Technology Management Reform Act) ~ National Strategy to Secure Cyberspace ~ GAOFinancial Audit Manual ~ DOD ...Standard for Electronic Records Management Software...5015-2 ~ CISWG Report on the Best Practices Subgroup ~ CISWG Information Security Program Elements ~NCUA Guidelines for Safeguarding Member Information 12 CFR 748 ~ IRS Revenue Procedure: Retention of books and records 97-22 ~ IRS Revenue Procedure: Record retention: automatic dataprocessing… 98-25 ~ IRS Internal Revenue Code Section 501(c)(3) ~ Federal Rules of Civil Procedure ~ Uniform Rules of Civil Procedure ~ ISO 15489-1 Information and Documentation: Recordsmanagement: General ~ ISO 15489-2 Information and Documentation: Records management: Guidelines ~ DIRKS: A Strategic Approach to Managing Business Information ~ Sedona PrinciplesAddressing Electronic Document Production ~ NIST ...Principles and Practices for Securing IT Systems 800-14 ~ NIST Developing Security Plans for Federal Information Systems 800-18 ~ NISTSecurity Self-Assessment Guide... 800-26 ~ NIST Risk Management Guide... 800-30 ~ NIST Contingency Planning Guide... 800-34 ~ NIST ...Patch and Vulnerability Management Program 800-40 ~NIST Guidelines on Firewalls and Firewall Policy 800-41 ~ NIST Security Controls for Federal Information Systems 800-53 ~ NIST ...Mapping...Information and...Systems to Security Categories 800-60~ NIST Computer Security Incident Handling Guide 800-61 ~ NIST Security Considerations in...Information System Development 800-64 ~ ISO 73:2002 Risk management -- Vocabulary ~ ISO 1335Information technology – Guidelines for management of IT Security ~ ISO 17799:2000 Code of Practice for Information Security Management ~ ISO 27001:2005 ...Information Security ManagementSystems -- Requirements ~ IT Information Library (ITIL) Planning to Implement Service Management ~ IT Information Library (ITIL) ICT Infrastructure Management ~ IT Information Library (ITIL)Service Delivery ~ IT Information Library (ITIL) Service Support ~ IT Information Library (ITIL) Application Management ~ IT Information Library (ITIL) Security Management ~ COSO Enterprise RiskManagement (ERM) Framework ~ CobiT 3rd Edition ~ CobiT 4th Edition ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control... ~ NFPA 1600 Disaster/EmergencyManagement and Business Continuity ~ Information Security Forum (ISF) Standard of Good Practice ~ Information Security Forum (ISF) Security Audit of Networks ~ A Risk Management Standard,jointly issued by AIRMIC, ALARM, and IRM ~ Business Continuity Institute (BCI) Good Practice Guidelines ~ IIA Global Technology Audit Guide - Information Technology Controls ~ ISSA Generally REGULATIONS & STANDARDS INCREASEAccepted Information Security Principles (GAISP) ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE) ~ Cable Communications Privacy Act Title 47 § 551 ~Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv) ~ CAN SPAM Act ~ Childrens Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Childrens Online Privacy Protection Act(COPPA) 16 CFR 312 ~ Drivers Privacy Protection Act (DPPA) 18 USC 2721 ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232 ~ Privacy Act of 1974 5 USC 552a ~ Telemarketing SalesRule (TSR) 16 CFR 310 ~ Video Privacy Protection Act (VPPA) 18 USC 2710 ~ Specter-Leahy Personal Data Privacy and Security Act ~ AR Personal Information Protection Act SB 1167 ~ AZAmendment to Arizona Revised Statutes 13-2001 HB 2116 ~ CA Information Practice Act SB 1386 ~ CA General Security Standard for Businesses AB 1950 ~ CA Public Records Military VeteranDischarge Documents AB 1798 ~ CA OPP Recommended Practices on Notification of Security Breach ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134 ~ COConsumer Credit Solicitation Protection HB 1274 ~ CO Prohibiting Inclusion of Social Security Number HB 1311 ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650 ~ CTConcerning Nondisclosure of Private Tenant Information HB 5184 ~ DE Computer Security Breaches HB 116 ~ FL Personal Identification Information/Unlawful Use HB 481 ~ GA Consumer ReportingAgencies SB 230 ~ GA Public employees; Fraud, Waste, and Abuse HB 656 ~ HI Exempting disclosure of Social Security numbers HB 2674 ~ IL Personal Information Protection Act HB 1633 ~ INRelease of Social Security Number, Notice of Security Breach SB 503 ~ LA Database Security Breach Notification Law SB 205 Act 499 ~ ME To Protect Maine Citizens from Identity Theft LD 1671 ~MN Data Warehouses; Notice Required for Certain Disclosures HF 2121 ~ MO HB 957 ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732 ~ NJ Identity Theft Prevention ActA4001/S1914 ~ NY A4254, A3492 [no title] ~ NV SB 347 [no title] ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048 ~ ND Personal information protection act SB 2251 ~OH Personal information -- contact if unauthorized access HB 104 ~ RI Security Breach Notification Law H 6191 ~ TN Security Breach Notification SB 2220 ~ TX Identity Theft Enforcement andProtection Act SB 122 ~ VT Relating to Identity Theft HB 327 ~ VA Identity theft; penalty; restitution; victim assistance HB 872 ~ WA Notice of a breach of the security SB 6043 ~ EU Directive onPrivacy and Electronic Communications 2002/58/EC ~ EU Directive on Data Protection 95/46/EC ~ US Department of Commerce EU Safe Harbor Privacy Principles ~ Consumer Interests in theTelecommunications Market Act No. 661 ~ Directive On Privacy And Electronic Communications 2002.58.EC ~ OECD Technology Risk Checklist ~ OECD Guidelines on...Privacy and TransborderFlows of Personal Data ~ UN Guidelines for the Regulation of Computerized Personal Data Files (1990) ~ ISACA Cross-border Privacy Impact Assessment ~ The Combined Code on CorporateGovernance ~ Turnbull Guidance on Internal Control, UK FRC ~ Smith Guidance on Audit Committees Combined Code, UK FRC ~ UK Data Protection Act of 1998 ~ BS 15000-1 IT ServiceManagement Standard ~ BS 15000-2 IT Service Management Standard - Code of Practice ~ Canada Keeping the Promise for a Strong Economy Act Bill 198 ~ Canada Personal Information Protectionand Electronic Documents Act ~ Canada Privacy Policy and Principles ~ Argentina Personal Data Protection Act ~ Mexico Federal Personal Data Protection Law ~ Austria Data Protection Act ~Austria Telecommunications Act ~ Bosnia Law on Protection of Personal Data ~ Czech Republic Personal Data Protection Act ~ Denmark Act on Competitive Conditions and Consumer Interests ~Finland Personal Data Protection Act ~ Finland Amendment of the Personal Data Act ~ France Data Protection Act ~ German Federal Data Protection Act ~ Greece Law on Personal Data Protection~ Hungary Protection of Personal Data and Disclosure of Data of Public Interest ~ Iceland Protection of Privacy as regards the Processing of Personal Data ~ Ireland Data Protection Act ~ Ireland DataProtection Amendment 2003 ~ Italy Personal Data Protection Code ~ Italy Protection of Individuals with Regard to...Processing of Personal Data ~ Lithuania Law on Legal Protection of Personal Data~ Luxembourg Data Protection Law ~ Netherlands Personal Data Protection Act ~ Poland Protection of Personal Data Act ~ Slovak Republic Protection of Personal Data in Information Systems ~Slovenia Personal Data Protection Act ~ South Africa Promotion of Access to Information Act ~ Spain Organic law on the Protection of Personal Data ~ Sweden Personal Data Act ~ Swiss Federal Acton Data Protection ~ Australian Business Continuity Management Guide ~ Australia Spam Act of 2003 ~ Australia Privacy Amendment Act ~ Australia Telecommunications Act ~ Australia Spam Act2003: A Practical Guide for Business ~ Hong Kong Personal Data (Privacy) Ordinance ~ Hong Kong Personal Data (Privacy) Ordinance ~ India Information Privacy Act ~ Japan Guidelines forPersonal Data Protection in Electronic Commerce, ECOM ~ Japan Handbook Concerning Protection of International Data, MITI ~ Japan Personal Information Protection Act ~ Korea Act on thePromotion Copyright 2011 EMC Corporation. All rights the Protection of Personal Information by Public Agencies ~ Korea Use and Protection of Credit Information Act ~ New Zealand Privacy Act ~ 8 © of Information...Protection ~ Korea Act on reserved.
  9. 9. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Choice© Copyright 2011 EMC Corporation. All rights reserved. 9
  10. 10. Evolution of IT GOVERNANCE WAVE 1 APPROACH Restriction-driven DESKTOP ERA Office Content, PDFs, CONTENT & TIFF Images CORPORATE IT Scalability EMERGING Transactional APPLICATION APPLICATION Mainframe to DISRUPTIVE FORCE DELIVERY Client-server COMPUTE CAPACITY© Copyright 2011 EMC Corporation. All rights reserved. 10
  11. 11. Evolution of IT GOVERNANCE Discoverability- WAVE 2 1 APPROACH Restriction-driven driven DESKTOP ERA WEB ERA Office Content, PDFs, Web Content CONTENT & TIFF Images and Media IT is an Operational CORPORATE IT Scalability Necessity EMERGING Transactional Ad-hoc Collaboration APPLICATION APPLICATION Client-server Mainframe to to DISRUPTIVE FORCE DISRUPTIVE FORCE DELIVERY Client-server Web-centricUBIQUITOUS CONNECTIVITY COMPUTE CAPACITY © Copyright 2011 EMC Corporation. All rights reserved. 11
  12. 12. Evolution of IT GOVERNANCE Discoverability- Policy-driven WAVE 23 WAVE APPROACH Enforcement driven WEB ERA POST-PC ERA Web Content Video and CONTENT and Media Social Content IT is an Operational Choice-driven Computing CORPORATE IT Necessity with Governance EMERGING Ad-hoc Collaboration Social and Case-based APPLICATION APPLICATION Client-server to DISRUPTIVE FORCE Web-centric to Cloud DISRUPTIVE FORCE DELIVERY Web-centric SOCIAL & BIG DATAUBIQUITOUS CONNECTIVITY (WORK PATTERN DRIVEN) © Copyright 2011 EMC Corporation. All rights reserved. 12
  13. 13. Evolution of IT GOVERNANCE Policy-driven WAVE 3 APPROACH Enforcement POST-PC ERA Video and CONTENT Social Content Choice-driven Computing CORPORATE IT with Governance EMERGING Social and Case-based APPLICATION APPLICATION DISRUPTIVE FORCE Web-centric to Cloud DELIVERYTY SOCIAL & BIG DATA (WORK PATTERN DRIVEN) © Copyright 2011 EMC Corporation. All rights reserved. 13
  14. 14. Implications CHOICE DATA CENTERS COMPUTING UNIFY, BUT DATA NEW ROLES DISAGGREGATES The New The Cloud The Data Developer Architect Scientist DATA CENTERS The New User DATA© Copyright 2011 EMC Corporation. All rights reserved. 14
  15. 15. OUR MISSION To help our customers get maximum leverage from their information© Copyright 2011 EMC Corporation. All rights reserved. 15
  16. 16. Our Strategy CONTENT RETENTION/POLICY MANAGEMENT MANAGEMENT CASE E-DISCOVERY MANAGEMENT WEB EXPERIENCE APPS CUSTOMER MANAGEMENT COMMUNICATIONS ON-PREMISE PRIVATE CLOUD MORE LOCATION CONTENT TYPES INFORMATION INDEPENDENCE MOBILE PUBLIC CLOUD PROCESS LIBRARY SERVICES GOVERNANCE SERVICES ANALYTICS© Copyright 2011 EMC Corporation. All rights reserved. 16
  17. 17. The Information Fabric The Information Fabric consists of… + + + + Process Analytics Content Management Governance Social Collaboration© Copyright 2011 EMC Corporation. All rights reserved. 17
  18. 18. Solution Overview INTELLIGENT INFORMATION PLATFORM INTELLIGENT INFORMATION CASE & PROCESS SOLUTIONS COMPOSITION ORCHESTRATE Documentum xCP ANALYTICS CASE MANAGEMENT ECM CUSTOMER Documentum Platform and Captiva CAPTURE MANAGE/FIND MyDocumentum Document COLLABORATION CenterStage COMMUNICATION Media Workspace Sciences INFORMATION GOVERNANCE CORPORATE COMPLIANCE AND MORE… E-DISCOVERY SourceOne Archiving COMPLIANCE SourceOne eDiscovery ARCHIVING Documentum Records Manager© Copyright 2011 EMC Corporation. All rights reserved. 18
  19. 19. INNOVATION PRIORITIES© Copyright 2011 EMC Corporation. All rights reserved. 19
  20. 20. The New Stack End User Provisioning USER INTERFACE Transformation LAYER END USER Application COMPOSITE Transformation APPLICATION LAYER APPLICATION DEVELOPER Infrastructure INFORMATION SERVICES Transformation PLATFORM ADMINISTRATOR© Copyright 2011 EMC Corporation. All rights reserved. 20
  21. 21. Key Themes and Strategic Priorities • User Experience 1 The New User • Choice Delight the new information worker & the new developer • Agility Leverage our leadership in ECM and Case Management 2 Transform to strategic business transformation by turning insight into action Journey 3 to the Cloud Optimize for private, hybrid and public cloud Pervasive Unified and simple eDiscovery, archiving and federated 4 Governance compliance solutions© Copyright 2011 EMC Corporation. All rights reserved. 21
  22. 22. EMC Documentum + Box Content Management meets the cloud Best of both worlds: Box collaboration and mobility with the value of ECM© Copyright 2011 EMC Corporation. All rights reserved. 22
  23. 23. Key Themes and Strategic Priorities • User Experience 1 The New User • Choice Delight the new information worker & the new developer • Agility Leverage our readiness in ECM and Case Management • Enterprise leadership 2 Transform toAccelerated Composition • strategic business transformation by turning insight • Information Types into action • OnDemand Journey 3 to the Cloud • Cloud Architecture Optimize for private, hybrid and public cloud • Information in the cloud • Enhanced Agility and Efficiency Pervasive Unified and simple eDiscovery, archiving and federated 4 Governance • Increased Insight, Accessibility, and Transparency compliance solutions • Trust in the Cloud© Copyright 2011 EMC Corporation. All rights reserved. 23
  24. 24. The Information Fabric The Information Fabric can enable The Information Fabric consists of… new classes of applications Big data-enabled Social process-enabled Trust-enabled applications applications applications + + + + Process Analytics Content Management Governance Social Collaboration© Copyright 2011 EMC Corporation. All rights reserved. 24
  25. 25. Big Data-Enabled Applications4 Collaborative Act EMC Documentum xCP ? Analyze3 Real Time EMC Greenplum + Hadoop2 Structured & Unstructured1 Petabyte Scale Store EMC Isilon + Atmos© Copyright 2011 EMC Corporation. All rights reserved. 25
  26. 26. Social Process-Enabled Applications© Copyright 2011 EMC Corporation. All rights reserved. 26
  27. 27. Cisco and EMC Join ForcesSocial Collaboration Platform for the Enterprise SOCIAL CONTENT PROFILES TEAMS CAPTURE LIFECYCLE COMMUNITIES NETWORKS SECURITY GOVERNANCE SOCIAL COLLABORATION PROCESS PLATFORM COMMUNICATIONS DESIGN ORCHESTRATION VOICE/VIDEO IM MANAGEMENT ANALYSIS CONFERENCING EMAIL© Copyright 2011 EMC Corporation. All rights reserved. 27
  28. 28. Cisco and EMC Join ForcesSocial Collaboration Platform for the Enterprise SOCIAL CONTENT SOCIAL COLLABORATION PROCESS PLATFORM COMMUNICATIONS© Copyright 2011 EMC Corporation. All rights reserved. 28
  29. 29. Trust-Enabled Applications© Copyright 2011 EMC Corporation. All rights reserved. 29
  30. 30. So What Can We Expect Going Forward? There is a reset of mandate for both IT and software providers as they look to CHOICE COMPUTING support user choice All industries are undergoing strategic business transformation; technology BIG DATA-ENABLED is playing a key role in helping transform organizations. Organizations that PROCESS leverage Big Data will have an ability to leapfrog competition by allowing processes to enable better, faster, real-time insight and action. Cloud computing will dramatically simplify provisioning on one end, but CLOUD result in further information disaggregation. As work patterns get more inherently social, collaborative, insightful, personalized, SOCIAL PROCESS etc., organizations will look to enable these capabilities in-context of the business process As organizations move to the cloud, get more social, enable user choice, security PERVASIVE and information governance remain a concern. Federated, policy-based governance GOVERNANCE will be integrated transparently into the new information fabric© Copyright 2011 EMC Corporation. All rights reserved. 30
  31. 31. Summary A Formative Transformation Is Underway The Mandates Have Changed Information Governance, Content and Case Management Remain Critically Important© Copyright 2011 EMC Corporation. All rights reserved. 31
  32. 32. THANK YOU© Copyright 2011 EMC Corporation. All rights reserved. 32

×