Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Building Digital Trust


Published on

Digital businesses need to establish trust between customers, suppliers, and services at massive scale, which at the core is about trust in its people, data, and systems. CIO’s running hybrid IT inclusive of the mainframe platform should consider best practices that are based on customer adoption patterns for establishing a system of digital trust leveraging blockchain and machine learning algorithms.

Verify People – How do you verify people are who they say they are?

Protect Data – How do you protect data so that your business runs securely?

Ensure Systems – How do you ensure systems are reliable and available and self healing?
To learn more on how to credibly establish and demonstrate Digital Trust, visit

Published in: Technology
  • Be the first to comment

Building Digital Trust

  1. 1. Building Digital Trust Ashok Reddy General Manager, CA Technologies @AshokTReddy October 3, 2017 Taking risks with confidence in a Digital Economy, Where every business is a Digital Enterprise
  2. 2. For Informational Purposes Only This presentation was based on current information and resource allocations as of October 2017 and is subject to change or withdrawal by CA at any time without notice. Not withstanding anything in this presentation to the contrary, this presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make such release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a when and if-available basis as part of CA maintenance and support, and in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis. In the event of a conflict between the terms of this paragraph and any other information contained in this presentation, the terms of this paragraph shall govern. Certain information in this presentation may outline CA’s general product direction. All information in this presentation is for your informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this presentation “as is” without warranty of any kind, including without limitation, any implied warranties or merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and proprietary. No unauthorized copying or distribution permitted. 2
  3. 3. 3 Digital Enterprise in a Digital Economy Made not Born Use digital technologies such as Mobile, Social, Web to Innovate, Improve Productivity and Optimize/ Leverage existing assets to Grow 3
  4. 4. 4 80% SHOP ONLINE 25% CARD ONLY Source: “Online Shopping and E-Commerce”, Pew Research Scale to billions of Users, Apps, API’s, Bots, Algo’s
  5. 5. 5 Sell Digital Tickets to popular Broadway Shows How to protect fans from thousands of little scalper bots trying to scoop up tickets? Challenge Digital Enterprise: Example 1
  6. 6. 6 Solution: Building Digital Trust
  7. 7. 7 Build consumer confidence in digital transaction similar to physical environment Ensure payments are made by the rightful owner of the Visa account? Challenge Digital Enterprise: Example 2
  8. 8. 8 Solution: Building Digital Trust Source:
  9. 9. Additional Challenges on the Digital Frontier $16B in Identity Fraud $3T in business growth could be slowed due to cyber attacks $2.5B in avg total cost of unplanned application downtime per year Source: Jupiter Research, The Economist, Pew Research, Business Insider,, 9
  10. 10. 10 DIGITAL TRUST IS THE CURRENCY OF DIGITAL ENTERPRISE People Real and secure? Data Safe and Private? Systems Reliable and trusted? Increasingly today
  11. 11. 11 Digital Enterprise: • Visa is the world’s largest retail electronic payments processing network and increased revenue by almost double digits last year • VisaNet handles an average of 150 million transactions every day and is capable of handling more than 24,000 transactions per second Source:
  12. 12. VERIFY PEOPLE PROTECT DATA ENSURE SYSTEMS How to Build Digital Trust? 12
  13. 13. VERIFY PEOPLE How to Build Digital Trust? 13 How do you Verify People are who they say they are?
  14. 14. 14 Growing # of Touches Hackers Bypassing Controls Need for Simple UX Verify Payments are RealChallenges
  15. 15. PROTECT DATA How to Build Digital Trust? 15 How do you Protect Data so that your business runs securely?
  16. 16. 16 Maintaining User Privacy Managing Data Stores and Data in Motion Avoid Ransomware Protect DataChallenges
  17. 17. CHALLENGE: Increased transaction volumes made it difficult to find, classify and protect all regulated financial data on the mainframe Initial scans identified 5% had unknown sensitive data Increased risk assessment through automated efforts Improved business agility by automating scans Solution: Protect Enterprise Data Without CA DCD I was lost in mountains of data …now I’m found 17 “
  18. 18. ENSURE SYSTEMS How to Build Digital Trust? 18 How do you ensure systems are reliable and available and self healing?
  19. 19. 19 Responding proactively, not reactively Mitigating SLA risks Ensure SystemsChallenges
  20. 20. CHALLENGE: • Being notified after a customer is impacted is too late. • Static thresholds yield too many false positives and cause a lot of unnecessary churn to investigate. Solution: Ensure Systems with Proactive Operational Intelligence 5X Improvement in Resolution Time 20 Increased IT efficiency with faster problem triage and remediation Improved customer experience through problem prevention Reduced mean time to resolution (MTTR)
  21. 21. 21 Building Digital Trust with Blockchain Source: /infographics/deloitte-au-fs-opportunities-implications-200516.pdf
  22. 22. 22 Walmart Supply Chain Food Safety Benefits • Increased trust between suppliers and Walmart • Dramatic cost reduction in recalls ($93.2B per year for US economy) • Walmart Leadership: New ecosystem with other distributors (Nestle, Kroger, Tyson, etc.) What •Provenance of each product in the supply chain or sold is tracked •Origin: Manufacturer, production date, batch •History: Packing house, importers, distributor, retail store How •Blockchain holds complete provenance details for each product •Accessible across Walmart (warehouses, stores, etc.) •Accessible by suppliers Why Blockchain? •Near real-time distributed ledger offers up-to- date status of products •Immutability of ledger guarantees accuracy •Selective access control to ledger information avoids competitive information to leak Source: IBM and Walmart: Blockchain for Food Safety, David Galvin
  23. 23. 23 6-8 Days 3 Seconds Digital Trust with Blockchain for Food Safety Source: unilever-walmart-blockchain-food-contamination.html
  24. 24. 24 Why Blockchain on the Mainframe? IBM is running its Blockchain as a Service on System z Several Fortune 500 Enterprises running Blockchain networks on Mainframe System of Trust • Pervasive Encryption and Scale Encrypt everything, at 18x faster Hardware attached FIPS 140-2 Level 4 security 2M Docker secure containers per system • Data Centricity – 70% of Enterprise data is on the Mainframe Source: IBM
  25. 25. 25 How Can we help you build Digital Trust? * Source: 1) As per 2016 Fortune 500 list of companies, published 6/6/16; CA data as of 1/31/17 company-by-the-ethisphere-institute-for-the-second-time.html $1T+ of 20 Largest Global Banks in financial transactions ensured and protected every day Co-invented and support Verify by Visa One of 2017’s Most Ethical Companies by Ethisphere Institute* 19 Trusted by Fortune 500 for 40+ Years to Verify, Protect & Ensure Systems
  26. 26. Verified, Protected and Ensured by CA VERIFY PROTECT ENSURE Protect Systems Protect Data Privacy Verify Privileged Users Verify Identities Ensure Mission Critical Systems Verify Payments Verify API’s Verify Applications Cloud Mainframe Mobile 26 Become the trusted partner your customer needs.
  27. 27. VERIFY PEOPLE PROTECT DATA ENSURE SYSTEMS DIGITAL TRUST is the currency of Digital Enterprise 27 Partner with your Line of Business to establish a digital trust strategy at the core of your organization to capitalize on new digital business opportunities faster than your competitors, because it reduces risk and improves your agility to scale to reach millions and billions of users and things
  28. 28. 28 Questions? @AshokTReddy
  29. 29. General Manager Ashok Reddy @AshokTReddy