Your SlideShare is downloading. ×
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Technology Trends: Value Office by Sridharan Sankaran
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Technology Trends: Value Office by Sridharan Sankaran


Published on

Technology Trends: Value Office by Sridharan Sankaran …

Technology Trends: Value Office by Sridharan Sankaran

At 3rd National Shared Services Conclave 2013

Sridharan Sankaran
Sr Director – Information Intelligence Group
EMC India Center Of Excellence
October 25, 2013

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide
  • Lets first begin by talking about how value is created today versus the past.If you go back to how value got created during the industrial revolution, you would take raw materials, and then create the finished goods which in turn would give you value. CLICKIn today's information economy value is created by taking raw data and then adding information and analytics to it for business insight and action, which is how value and wealth are created today.CLICKBut where the real shift is taking place is the transformation of information. We are entering into an era where information drives strategic transformation, not just operational optimizationWe have done a poor job at mapping the capability and the transformative effect of information back to what the strategic business imperatives need to be. We have a tremendous opportunity moving forward to not just focus on operational optimization but to think about how business models shifts can occur.Let me provide a few strategic industry examples that will clarify my point (Next slide) Strategic vs. Operational Business Transformation: We are entering into an era where information drives strategic transformation, not just operational optimization
  • What we are going to talk about now are some of the major macro trends in the marketplace are and how they are affecting business at a core level.We are in a transformative wave of IT which only occur 10-15 yrs. The biggest difference we see is that these trends are not happening one after the other, the are happening at the same time which presents a tremendous opportunity for the business but a potential quagmire for IT unless you are prepared. And obviously EMC is in the business of helping IT professionals be prepared and get the most out of their IT infrastructure to enable their business to seize these new opportunities.
  • The first trend centers around Big Data. We talk about how data is 3-dimensional now. There is more being produced than every before largely due to social media – most of which is unstructured in nature. The nature of information has changed as well. Most of the growth in information is occurring in the richer, complex content types such as images, video and voice. And lastly it’s highly dispersed and even though there is a lot of it out there its hard to find what you need when you need it. People have more and more devices (3-7 on average) and we are moving to a hybrid environment where information can live in the cloud and on premise.All of these three elements combined bring create a Big Data problem, one that requires fundamentally different architectures to manage, support, and process.
  • Although the number of regulations have been increasing, the reality is many of the regulations have been around for quite some time. The issue is that some of the regulations were originally created based on our physical or paper records and now we are dealing with regulations that deal specifically with the management or governance of electronic information. Regulations are growing at a rapid pace and it is not just in the North America, the phenomenon is truly global (i.e. at one point the UK Liberal government was literally creating a new regulation a day – they had over 3000 regulations created in their tenure) .  Fundamentally it’s not just certifications or regulations, but standards and acts, and it’s all about managing your information from A to Z – who has access, how are they accessing  it, what are they doing with it and how are we ensuring that we only keep it for the required amount of time.
  • Another trend that you are seeing is the emergence of the New User in the Post-PC era. The expectations of this new user is fundamentally different then the users in the past.They are more open to using new technologies and want to make sure that they are far more social and transparent in the workplace as they are at home using web 2.0 technologies such as Facebook and Twitter. This new type of worker uses social computing as their main communication vehicle – their work and personal communication vehicles are blurred. They expect simplicity in provisioning. A user can easily provision tools to help make them more productive. And IT gets alerted that they have just been signed up a new type of SaaS based application. They are looking for more control and choice in both the devices and the applications they use. Traditionally IT controlled productivity. When you join a company IT gives you your laptop, your phone…They controlled what device you were going to use. Today the new user controls what they want. The new user doesn’t wait for IT – they think differently.One of the key questions the New User is asking is “Why is it so much more productive for me to work at home then it is for me to be productive from the office?”. The new user waits for no one but the business must equip themselves with the right amount of governance and compliance. IT really has to address this balancing act.
  • There are 3 implications in the Post-PC eraThe 1st is choice computing – applications and devices are chosen by users, not IT, the user becomes the center of the IT universeThe 2nd is the disaggregation of data – while data centers are consolidating across multiple organizations, the data itself is becoming disaggregated. Most users have on average between 3-7 devices and information gets replicated across these devices; data can live in the cloud or on premise. As a result there is a need in the marketplace for a consistent set of policies applied to data, regardless of its location or the device upon which it resides.The 3rd is around emerging roles in the Post-PC era, all focused on enhancing the experience and productivity of the New Users. There is the New Developer who will use new tools and techniques available to enhance the New User experience. There is the Cloud Architect who will ensure information can be made available anywhere and at any time. There is the Data Scientist who makes sure the right set of information is made available to the right user and the right time. These three implications have profound implications to the architecture, technologies and best practices used by organizations as the Post-PC era becomes more and more a part of our daily lives.
  • Note to Presenter: Click now in Slide Show mode for animationAn ideal solution is aboutmanaging all the information, processes, collaboration or comments that are added, policies that are applied to the data (for example a retention policy), and the people involved together in a single location. This means, you don’t have to leave your user application interface to search for documents or locate other information that is stored in other systems.
  • Big Data applications have a unique set of characteristics. For example they need a “Big Data Storage Platform”, “Big Data Analytics Platform” and a way to drive “Action From Insight”.On the big data side if you look at the stack its easy to understand how EMC will help store all this data with Isilon and Atmos. To get to big data scale, organizations need a “fully automated, scale-out storage platform” that allows them to “add capacity at zero operational cost” and “scale performance and throughput linearly”. EMC Isilon and EMC Atmos are big data storage platforms. EMC Atmos is optimized for global distribution of Big DataBig Data Analytics: To get “Big Data Insight” you need a Big Data Analytics Platform that “integrates structured and unstructured analytics” with “realtime feeds and queries” through a “self-service interface” and “built-in collaboration.” EMC Greenplum is “purpose-built for Big Data analytics”.Action From Insight: To fully capitalize on the Big Data Opportunity, organizations must “Drive action from insight”, delivering “data in context as a part of all decision-making processes”. EMC Documentum xCP delivers case management, which takes “content-rich, collaborative interactions” and puts them into a “structured process with clear roles, next steps and outcomes.” EMC Documentum xCP is the “Action engine for Big Data.”
  • If you consider the next new set of application – social process-enabled applications– one of thekey characteristics that is limiting our business process today is thatcollaboration and interactivity need to be conducted on a business process. Typically the user has to leave the context of the business process, fire up another application, conduct their collaboration with whomeverand then go back into the process driven application to complete the work. This method is very time consuming, huge productivity loss just from ‘switching’ costs(CLICK) What we need to have is a way to imbed the collaboration within a business process, so that the worker doesn't need to leave the application and business flow to have interact with a group of individuals. This way the worker can have that collaborative interaction within the context of that business flow without leaving the application, allowing for the process to continue while (CLICK) applying all the correct workflow checks and approvals, and the right compliance at every stage through the process.All of which allowing the user to have a seamless experiences that is deeply social within the right business process.(Industry Example of the challenge: This new wave of applications is providing in context (in band) collaboration. Let me explain. Traditionally take a claims process for example, a claims adjuster would start a claim file and there would be a set of deliverables and activities that would propagate the claim file and send that claim file into a workflow process. But if you needed to stop the process and have a discussion with another claims adjuster, supervisor or a lawyer (any other constituent), you would need to logout of your claims application, login to a collaboration system (SharePoint), have a conversation, make a decision, log back out of that system, log back into your claims system and note that decision or conversation in your main system of record which is your claim file system. What Documentum xCP allows you to do is have the ability to collaborate within any process, within the application you are working in without any disruption. Everything is tracked according to the file and everything is regulated according to your compliance standards, while making the user more productive and efficient.)
  • The third set of new applications is Trust-Enabled.Ten years ago all of the technologies that had information needing governance were located inside the enterprise and could be managed.Today, cloud-based applications and the “electronification” of once analog relationships between organizations and their customers and partners have driven more and more content outside of the corporate firewall. This new mash-up of information that resides outside the firewall feeds critical business processes. This is not a pattern that is likely to change, therefore it will be critical that governance be brought to this type of content as well. We see a tremendous opportunity but also high risk if organizations don’t establish a consistent set of policies across their information and have those policies be independent of location – meaning the policies need to be able to be enforced on a users desktop, within any cloud based application and from content coming in from any other 3rd party person or application. This federation of policies is one of the most critical areas that businesses need to focus on.(Additional content: Some new approaches that we’ve developed and are continuing to investigate for our customer are focused around security and governance. Being a part of EMC allows us to take advantage of the RSA products, coupled with our Information Rights Management capabilities allows us to securely store, protect and access information inside and outside the firewall. In addition our IRM capabilities allow you to set security controls on pieces of information, for example time stamping and digital shredding. Another area is around expand information governance beyond the firewall, For example being able to search for content in the cloud and securing bringing it in to your organization and then and applying retention policies to applications beyond the firewall. Later this year we are also providing our customers the ability to port cloud based email into our email archiving products, from there allowing for an eDiscovery process to launch. Just a couple of examples of how these new applications will drive business and transform IT.)
  • Here are just a few examples of some of the use cases where “process to decision” is critical. Some of the key decision-making that xCP can help enable includes whether to approve or reject the application for a product or service, a loan, a claim, etc. Also, in many industries like insurance, for example, being able to properly cross-sell and upsell customers on related products or services is a key way to increase revenue. Determining if the applicant is eligible for additional services (e.g., what is their risk to the business) is critical. xCP and Greenplum can help detect if any fraudulent activity is occurring before any offers are made.
  • Let’s take a closer look at the value of Documentum xCP.Documentum xCP delivers value in three major ways. First, it improves worker productivity by delivering solutions that are easy to use and meet exact business requirements. This includes a complete view of your customer and the trends within your solution. It automates manual, error-prone processes and makes sure humans are involved only when they need to be in the decision-making process. The most expensive part of decision making is when human insight is required so we want to minimize this as much as possible. However, when it’s needed, we want to make it an easy, informed, decision based on all available information in the right context to speed decision making and lower the cost. xCP delivers intelligence by helping you drive better business decisions and outcomes. Finally, xCP improves your business agility by not only by improving your time to value but also giving you the peace of mind that you can change your solution at any time should your business needs change.
  • Transcript

    • 1. Technology Trends: Value Office Sridharan Sankaran Sr Director – Information Intelligence Group EMC India Center Of Excellence October 25, 2013 © Copyright 2013 EMC Corporation. All rights reserved. 1
    • 2. Value Creation in the Information Economy The Information Fabric must enable… Strategic Business Transformation vs. Operational Efficiency We have entered the era where information drives strategic transformation, not just operational optimization © Copyright 2011 EMC Corporation. All rights reserved. 2
    • 3. TRENDS © Copyright 2011 EMC Corporation. All rights reserved. 3
    • 4. 3D Information Growth Contributes to “Big Data” PRODUCED AMOUNT RICHNESS DISPERSION INFORMATION © Copyright 2011 EMC Corporation. All rights reserved. 4
    • 5. Sarbanes-Oxley Act (SOX) ~ PCAOB ~ SAS 94 ~ AICPA/CICA Privacy Framework ~ AICPA Suitable Trust Services Criteria ~ SEC Retention of Records, 17 CFR 210.2-06 ~ SEC Controls and Procedures, 17 CFR 240.15d-15 ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3 ~ Basel II ~ BIS Sound Practices for the Management and Supervision of Operational Risk ~ GrammLeach-Bliley Act (GLB) ~ Standards for Safeguarding Customer Information, FTC 16 CFR 314 ~ Privacy of Consumer Financial Information Rule ~ Safety and Soundness Standards, Appendix of 12 CFR 30 ~ FFIEC Information Security ~ FFIEC Development Acquisition ~ FFIEC Business Continuity Planning ~ FFIEC Audit ~ FFIEC Management ~ FFIEC Operations ~ NASD ~ NYSE ~ Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1 ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3 ~ Records to be preserved by exchange members, SEC 17 CFR 240.17a-4 ~ Recordkeeping, SEC 17 CFR 240.17Ad-6 ~ Record retention, SEC 17 CFR 240.17Ad-7 ~ HIPAA (Health Insurance Portability and Accountability Act) ~ HIPAA HCFA Internet Security Policy ~ NIST Introductory Resource Guide for [HIPAA] (800-66) ~ CMS Core Security Requirements (CSR) ~ CMS Information Security Acceptable Risk Safeguards (ARS) ~ CMS Information Security Certification & Accreditation (C&A) ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1 ~ Federal Energy Regulatory Commission (FERC) ~ North American Electric Reliability Council (NERC) ~ VISA CISP (Cardholder Information Security Program) ~ Mastercard SDP (Site Data Protection) Program ~ American Express DSS (Data Security Standard) ~ PCI DSS (Payment Card Industry Data Security Standard) ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act) ~ Uniform Electronic Transactions Act (UETA) ~ FISMA (Federal Information Security Management Act) ~ FISCAM (Federal Information System Controls Audit Manual) ~ FIPS Security Requirements for Cryptographic Modules 140-2 ~ FIPS Guideline for the Analysis of LAN Security 191 ~ FIPS Application Profile for GILS 192 ~ Clinger-Cohen Act (Information Technology Management Reform Act) ~ National Strategy to Secure Cyberspace ~ GAO Financial Audit Manual ~ DOD ...Standard for Electronic Records Management Software...5015-2 ~ CISWG Report on the Best Practices Subgroup ~ CISWG Information Security Program Elements ~ NCUA Guidelines for Safeguarding Member Information 12 CFR 748 ~ IRS Revenue Procedure: Retention of books and records 97-22 ~ IRS Revenue Procedure: Record retention: automatic data processing… 98-25 ~ IRS Internal Revenue Code Section 501(c)(3) ~ Federal Rules of Civil Procedure ~ Uniform Rules of Civil Procedure ~ ISO 15489-1 Information and Documentation: Records management: General ~ ISO 15489-2 Information and Documentation: Records management: Guidelines ~ DIRKS: A Strategic Approach to Managing Business Information ~ Sedona Principles Addressing Electronic Document Production ~ NIST ...Principles and Practices for Securing IT Systems 800-14 ~ NIST Developing Security Plans for Federal Information Systems 800-18 ~ NIST Security Self-Assessment Guide... 800-26 ~ NIST Risk Management Guide... 800-30 ~ NIST Contingency Planning Guide... 800-34 ~ NIST ...Patch and Vulnerability Management Program 800-40 ~ NIST Guidelines on Firewalls and Firewall Policy 800-41 ~ NIST Security Controls for Federal Information Systems 800-53 ~ NIST ...Mapping...Information and...Systems to Security Categories 800-60 ~ NIST Computer Security Incident Handling Guide 800-61 ~ NIST Security Considerations in...Information System Development 800-64 ~ ISO 73:2002 Risk management -- Vocabulary ~ ISO 1335 Information technology – Guidelines for management of IT Security ~ ISO 17799:2000 Code of Practice for Information Security Management ~ ISO 27001:2005 ...Information Security Management Systems -- Requirements ~ IT Information Library (ITIL) Planning to Implement Service Management ~ IT Information Library (ITIL) ICT Infrastructure Management ~ IT Information Library (ITIL) Service Delivery ~ IT Information Library (ITIL) Service Support ~ IT Information Library (ITIL) Application Management ~ IT Information Library (ITIL) Security Management ~ COSO Enterprise Risk Management (ERM) Framework ~ CobiT 3rd Edition ~ CobiT 4th Edition ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control... ~ NFPA 1600 Disaster/Emergency Management and Business Continuity ~ Information Security Forum (ISF) Standard of Good Practice ~ Information Security Forum (ISF) Security Audit of Networks ~ A Risk Management Standard, jointly issued by AIRMIC, ALARM, and IRM ~ Business Continuity Institute (BCI) Good Practice Guidelines ~ IIA Global Technology Audit Guide - Information Technology Controls ~ ISSA Generally Accepted Information Security Principles (GAISP) ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE) ~ Cable Communications Privacy Act Title 47 551 ~ Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv) ~ CAN SPAM Act ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Driver's Privacy Protection Act (DPPA) 18 USC 2721 ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232 ~ Privacy Act of 1974 5 USC 552a ~ Telemarketing Sales Rule (TSR) 16 CFR 310 ~ Video Privacy Protection Act (VPPA) 18 USC 2710 ~ Specter-Leahy Personal Data Privacy and Security Act ~ AR Personal Information Protection Act SB 1167 ~ AZ Amendment to Arizona Revised Statutes 13-2001 HB 2116 ~ CA Information Practice Act SB 1386 ~ CA General Security Standard for Businesses AB 1950 ~ CA Public Records Military Veteran Discharge Documents AB 1798 ~ CA OPP Recommended Practices on Notification of Security Breach ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134 ~ CO Consumer Credit Solicitation Protection HB 1274 ~ CO Prohibiting Inclusion of Social Security Number HB 1311 ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650 ~ CT Concerning Nondisclosure of Private Tenant Information HB 5184 ~ DE Computer Security Breaches HB 116 ~ FL Personal Identification Information/Unlawful Use HB 481 ~ GA Consumer Reporting Agencies SB 230 ~ GA Public employees; Fraud, Waste, and Abuse HB 656 ~ HI Exempting disclosure of Social Security numbers HB 2674 ~ IL Personal Information Protection Act HB 1633 ~ IN Release of Social Security Number, Notice of Security Breach SB 503 ~ LA Database Security Breach Notification Law SB 205 Act 499 ~ ME To Protect Maine Citizens from Identity Theft LD 1671 ~ MN Data Warehouses; Notice Required for Certain Disclosures HF 2121 ~ MO HB 957 ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732 ~ NJ Identity Theft Prevention Act A4001/S1914 ~ NY A4254, A3492 [no title] ~ NV SB 347 [no title] ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048 ~ ND Personal information protection act SB 2251 ~ OH Personal information -- contact if unauthorized access HB 104 ~ RI Security Breach Notification Law H 6191 ~ TN Security Breach Notification SB 2220 ~ TX Identity Theft Enforcement and Protection Act SB 122 ~ VT Relating to Identity Theft HB 327 ~ VA Identity theft; penalty; restitution; victim assistance HB 872 ~ WA Notice of a breach of the security SB 6043 ~ EU Directive on Privacy and Electronic Communications 2002/58/EC ~ EU Directive on Data Protection 95/46/EC ~ US Department of Commerce EU Safe Harbor Privacy Principles ~ Consumer Interests in the Telecommunications2011 EMC Corporation. All rights reserved. And Electronic Communications 2002.58.EC ~ OECD Technology Risk Checklist ~ OECD Guidelines on...Privacy and Transborder © Copyright Market Act No. 661 ~ Directive On Privacy 5 REGULATIONS & STANDARDS INCREASE
    • 6. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Choice © Copyright 2011 EMC Corporation. All rights reserved. 6
    • 7. Implications CHOICE COMPUTING DATA CENTERS UNIFY, BUT DATA DISAGGREGATES NEW ROLES The New Developer The Cloud Architect The Data Scientist DATA CENTERS The New User DATA © Copyright 2011 EMC Corporation. All rights reserved. 7
    • 8. © Copyright 2013 EMC Corporation. All rights reserved. 8
    • 9. Forrester: Dynamic Case Management © Copyright 2013 EMC Corporation. All rights reserved. 9
    • 10. Gartner: Intelligent Business Operations (iBPMS) Management and Administration Business Rule Management Process Component Registry/ Repository Model-Driven Composition Environment Process Orchestration Engine Human Interaction Management On-Demand Analytics Active Analytics © Copyright 2013 EMC Corporation. All rights reserved. Content Interaction Management Connectivity 10
    • 11. CONTENT POLICIES COLLABORATION PEOPLE PROCESS DATA ALL INFORMATION © Copyright 2013 EMC Corporation. All rights reserved. 11
    • 12. Big Data-Enabled Applications 4 3 2 1 Collaborativ e Act Real Time Analyze ? Structured & Unstructure d Petabyte Scale © Copyright 2011 EMC Corporation. All rights reserved. Store 12
    • 13. Social Process-Enabled Applications © Copyright 2011 EMC Corporation. All rights reserved. 13
    • 14. Trust-Enabled Applications © Copyright 2011 EMC Corporation. All rights reserved. 14
    • 15. USE CASES • Accounts Payable • HR employee onboarding • Employee performance reviews PUBLIC SECTOR FINANCIAL SERVICES • Benefits eligibility • Mortgage lending • Social services (HHS) • Loan servicing • Courts case management • Banking and wealth management account opening • Dispute resolution © Copyright 2013 EMC Corporation. All rights reserved. • Investigative Case Management • Service Procurement • Customer Service & Warranty Claims INSURANCE HEALTHCARE • Property and casualty claims processing • Medical/dental reimbursement • Insurance underwriting • New member enrollment • New account opening • Electronic patient records 15
    • 16. VALUE OF PRODUCTIVITY Build solutions quickly that business users will love © Copyright 2013 EMC Corporation. All rights reserved. INTELLIGENCE Drive better business decisions and outcomes AGILITY Get solutions up and running fast and easily; change at any time 16 16