SlideShare a Scribd company logo
“The cloud forces us to
have a different kind of
discipline around data
security, mostly because it
breaks down the assumption
that we have any kind of
network security at all.”
John thielens
Chief Security Officer, Axway
cloud
accelerators
Can big data
transform your
business?
About Axway
• Founded in 2001
• Based in Phoenix, Arizona with offices in over 20 countries
• Specializes in managing, securing & monitoring
business interactions
• Operating for over a decade providing solutions to
leading organizations across most industries
• Over 1,700 employees
• 11,000 customers in 100 countries
For more information, visit axway.com
There’s always a risk. There are risks in doing
things the old way and risks with doing things
the new way—the cloud way. People who just say
“no” aren’t engaging in the right discussion.
Career Highlights
• 	30 years of experience in the
	 IT industry
• 	Formerly, VP of Product Marketing
	 at GXS & Inovis
• 	Personal interests: attending his
	 children’s dance recitals & baseball
	 games, playing piano, cycling &
	rollerblading
Can you tell us about Axway and the services that you offer?
We describe ourselves as a business interaction networks company. Business
interactions are about connecting businesses to other businesses and also
about connecting the components of an enterprise together. Our services
include business-to-business integrations, managed file transfer, business
operations monitoring, process management, and email and identity
security, which are offered on-premise or in the cloud.
We’ve been involved in the cloud since before it was called the cloud,
managing services on behalf of some of our largest clients, and our data
transmission solutions have been used by a number of vendors to move data
in and out of the cloud. We are continuing to invest in cloud services and
over the last few months, we’ve developed services around our heritage of
B2B and around community management.
Cloud Accelerator / JOHN thielens & alan taylor / axway
John Thielens
Chief Architect of Cloud Service
& Chief Security Officer, Axway
Career Highlights
• 	30 years of experience in the
	 IT industry
• 	Formerly, Director of Business
	 Development at MobileAware
• 	Formerly, Business Development
	 at IBM Tivoli
• 	Personal interests: spending
	 time with family, golfing &
	 entertaining guests
Alan Taylor
Alliances Director, Axway
what are the advantages of big data?
The cloud is an infinitely scalable place and so this means that we’re dealing
with more and more data. Businesses no longer have to throw data away. The
prize of “Big Data” is of course the analytics derived from all that volume,
velocity and variety of data. Data gathered from multiple sources including the
cloud can be used to find new insights and that analysis is quickly becoming a
new wave of competitive differentiation. Being able to manage “Big Data” and
deliver powerful data governance as a strategy leads all companies towards
greater efficiencies, lower risk and increased revenues.
Stored data that once was deemed worthless can now allow businesses to
discover new nuggets of value out of that data they already have. We can
create new marketing programs to drive new business that’s quantifiable,
because they can discover buying patterns and correlate information to provide
data points for multiple initiatives.
There are also defensive value points to big data. If you think about big data
analysis in regards to security, it can help businesses find gaps and risks, and
close them off to prevent loss of value by enhancing the security. Today it is
critical that within the enterprise and the cloud we understand how to protect
the customer brand by ensuring control, compliance, information security and
data protection in everything they do, including big data.
what are some of the challenges associated with big data?
Today, we can take a photograph on a device and press a button to upload
the photograph on Facebook in seconds. It’s that kind of mobility and velocity
with which data’s coming at us. It’s not only the amount of data that’s being
uploaded; it’s the variety of data as well. Creating effective systems and
processes for data standardization, information sharing, and collaboration,
auditability and security across the entire business ecosystem will soon
become an essential task for CIOs and their IT organizations.
As big data makes its way back to these data warehouses for analytics, there
are different varieties of data making their way across the network. Our job at
Axway is to transform that through our gateway technology into a common
denominator that then can go into and leave the data warehouse securely. So,
volume, velocity and variety is really the challenge that we are now constantly
responding to when we talk to customers about big data.
Are some companies using data security as an excuse not to adopt cloud?
The great thing about security is that it can play the role of an excuse very
easily. That can always be kind of a “just because” reason, but that’s really
an unfair game to play. I think even the word is wrong—we should be talking
about risk. There’s always a risk. There are risks in doing things the old way and
there are new risks with doing things the new way, the cloud way. People who
just say “no” aren’t engaging in the right discussion.
Additionally, I think that the cloud forces us to have a different kind of
discipline around data security, mostly because it breaks down the assumption
that we have any kind of network security at all.
to learn more about Axway,
visit axway.com
Our services in
combination with
CA Technologies
products results in
a powerful story
for our customers.
To learn more from cloud
service providers working
with CA Technologies, visit
ca.com/cloudaccelerators
Copyright © 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their
respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or
completeness of the information. To the extent permitted by applicable law, CA provides this document “as is” without warranty of any
kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no
event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits,
business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. The information
and results illustrated here are based upon the customer’s experiences with the referenced software product in a variety of environments,
which may include production and nonproduction environments. Past performance of the software products in such environments is not
necessarily indicative of the future performance of such software products in identical, similar or different environments.
We think about all the touch points for the data, because we assume that the
environment is hostile. Now, in an on-premise world, we often will think about
other types of defenses, like network-based defenses, but I think we may find
that the vigilance that cloud computing forces us to have, in which we assume
the data lives in a hostile environment, is actually a good discipline to bring
back on-premise. As we look at some other trends around consumerization of
IT and bring your own device, hostile devices entering the network and hostile
people touching the network, our secure network and firewalls really are
connected to a hostile environment, just like the cloud.
Why is identity and access management so critical to data security?
In a lot of ways, identity and access management is the backbone of the
security infrastructure for the enterprise. If we think that the major threat
points in the system are, in fact, the human element, then identity and access
management is really where the system and the humans connect to each
other. If our security value is to mean anything in the hands of people who
aren’t managed properly, then our technology is for naught.
Why did Axway choose to partner with CA Technologies?
We began working with CA Technologies because of a mutual customer, and
our relationship has really blossomed over the past few years. We also chose
CA Technologies because they are a market leader and it’s important to us that
we align ourselves with the best partners in the industry.
If you look at CA Single Sign-On and CA SiteMinder®, CA Technologies is the
market leader bar-none. Our solutions in combination with CA Technologies
products results in a powerful story for our customers. The encryption, the
data security, and the workflow process is provided by Axway software, and
the authorization, identity management, credential life cycle, and the two
factor mechanisms are all under the control of CA Technologies software. Not
only are we a reseller of CA Technologies products, but we actually use the
technology ourselves to run some of our large projects.
More recently, we’ve found ourselves drawn to the CA Technologies vision of
what cloud means. Marketing people love the word, but enterprises are still
trying to figure out what it means to them. I think CA Technologies and Axway
have a well-aligned vision for the cloud, for the cloud, and CA Technologies can
help us realize that vision through our partnership.
But when we think about securing data in the cloud, we know we’re going through
public networks, and so we have to think about defending all of the points of
entry. Where does the data flow? That has to be secured. Who has access? That
has to be secured. Who’s taking back-up tapes? That has to be secured.

More Related Content

What's hot

Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
Mike Spaulding
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
James Sutter
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
MatsBluekens1
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
Cloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 ResearchCloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 Research
Rugby7277
 
CIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial ITCIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial IT
schemmel
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
African Cyber Security Summit
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
Mike Davis
 
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
DWP Information Architects Inc.
 
Managing Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and BusinessManaging Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and Business
Dana Gardner
 
Asean 1017 ezine_14pp
Asean 1017 ezine_14ppAsean 1017 ezine_14pp
Asean 1017 ezine_14pp
Pekerja lepas
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
Aneel Mitra
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
Kingfin Enterprises Limited
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
Array Networks
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
suvadeep Kundu
 
How To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and EffectivelyHow To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and Effectively
Andy Harjanto
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
DMIMarketing
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
Rick Bouter
 
How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?
Bernard Marr
 

What's hot (20)

Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Cloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 ResearchCloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 Research
 
CIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial ITCIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial IT
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
 
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
 
Managing Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and BusinessManaging Cloud Computing Brings Complex Duality Between IT and Business
Managing Cloud Computing Brings Complex Duality Between IT and Business
 
Asean 1017 ezine_14pp
Asean 1017 ezine_14ppAsean 1017 ezine_14pp
Asean 1017 ezine_14pp
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
 
How To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and EffectivelyHow To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and Effectively
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?
 

Similar to CA CLOUD ACCELERATOR_Axway_Executive_Profile

Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialWhy Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Dana Gardner
 
Ghosts of technology
Ghosts of technologyGhosts of technology
Ghosts of technology
Abhik Biswas
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Dana Gardner
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation
Jaime Cajigas ☁
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
Iwan Setiawan
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
Mighty Guides, Inc.
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
CIO Look Magazine
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
Iron Mountain
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
Comarch_Services
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
CIO Talk Network
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
Microsoft UK
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
CloudMask inc.
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
TCM infosys
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
Cloudthat Technologies Private
 
Azure security
Azure securityAzure security
Learn “How to get your IT budget to 1 percent of Revenue”
Learn “How to get your IT budget to 1 percent of Revenue” Learn “How to get your IT budget to 1 percent of Revenue”
Learn “How to get your IT budget to 1 percent of Revenue”
HCL Technologies
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Peak 10
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
accenture
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
klinda1
 
Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020
Mirror Review
 

Similar to CA CLOUD ACCELERATOR_Axway_Executive_Profile (20)

Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialWhy Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
 
Ghosts of technology
Ghosts of technologyGhosts of technology
Ghosts of technology
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Learn “How to get your IT budget to 1 percent of Revenue”
Learn “How to get your IT budget to 1 percent of Revenue” Learn “How to get your IT budget to 1 percent of Revenue”
Learn “How to get your IT budget to 1 percent of Revenue”
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020
 

CA CLOUD ACCELERATOR_Axway_Executive_Profile

  • 1. “The cloud forces us to have a different kind of discipline around data security, mostly because it breaks down the assumption that we have any kind of network security at all.” John thielens Chief Security Officer, Axway cloud accelerators Can big data transform your business?
  • 2. About Axway • Founded in 2001 • Based in Phoenix, Arizona with offices in over 20 countries • Specializes in managing, securing & monitoring business interactions • Operating for over a decade providing solutions to leading organizations across most industries • Over 1,700 employees • 11,000 customers in 100 countries For more information, visit axway.com There’s always a risk. There are risks in doing things the old way and risks with doing things the new way—the cloud way. People who just say “no” aren’t engaging in the right discussion.
  • 3. Career Highlights • 30 years of experience in the IT industry • Formerly, VP of Product Marketing at GXS & Inovis • Personal interests: attending his children’s dance recitals & baseball games, playing piano, cycling & rollerblading Can you tell us about Axway and the services that you offer? We describe ourselves as a business interaction networks company. Business interactions are about connecting businesses to other businesses and also about connecting the components of an enterprise together. Our services include business-to-business integrations, managed file transfer, business operations monitoring, process management, and email and identity security, which are offered on-premise or in the cloud. We’ve been involved in the cloud since before it was called the cloud, managing services on behalf of some of our largest clients, and our data transmission solutions have been used by a number of vendors to move data in and out of the cloud. We are continuing to invest in cloud services and over the last few months, we’ve developed services around our heritage of B2B and around community management. Cloud Accelerator / JOHN thielens & alan taylor / axway John Thielens Chief Architect of Cloud Service & Chief Security Officer, Axway Career Highlights • 30 years of experience in the IT industry • Formerly, Director of Business Development at MobileAware • Formerly, Business Development at IBM Tivoli • Personal interests: spending time with family, golfing & entertaining guests Alan Taylor Alliances Director, Axway
  • 4. what are the advantages of big data? The cloud is an infinitely scalable place and so this means that we’re dealing with more and more data. Businesses no longer have to throw data away. The prize of “Big Data” is of course the analytics derived from all that volume, velocity and variety of data. Data gathered from multiple sources including the cloud can be used to find new insights and that analysis is quickly becoming a new wave of competitive differentiation. Being able to manage “Big Data” and deliver powerful data governance as a strategy leads all companies towards greater efficiencies, lower risk and increased revenues. Stored data that once was deemed worthless can now allow businesses to discover new nuggets of value out of that data they already have. We can create new marketing programs to drive new business that’s quantifiable, because they can discover buying patterns and correlate information to provide data points for multiple initiatives. There are also defensive value points to big data. If you think about big data analysis in regards to security, it can help businesses find gaps and risks, and close them off to prevent loss of value by enhancing the security. Today it is critical that within the enterprise and the cloud we understand how to protect the customer brand by ensuring control, compliance, information security and data protection in everything they do, including big data. what are some of the challenges associated with big data? Today, we can take a photograph on a device and press a button to upload the photograph on Facebook in seconds. It’s that kind of mobility and velocity with which data’s coming at us. It’s not only the amount of data that’s being uploaded; it’s the variety of data as well. Creating effective systems and processes for data standardization, information sharing, and collaboration, auditability and security across the entire business ecosystem will soon become an essential task for CIOs and their IT organizations. As big data makes its way back to these data warehouses for analytics, there are different varieties of data making their way across the network. Our job at Axway is to transform that through our gateway technology into a common denominator that then can go into and leave the data warehouse securely. So, volume, velocity and variety is really the challenge that we are now constantly responding to when we talk to customers about big data. Are some companies using data security as an excuse not to adopt cloud? The great thing about security is that it can play the role of an excuse very easily. That can always be kind of a “just because” reason, but that’s really an unfair game to play. I think even the word is wrong—we should be talking about risk. There’s always a risk. There are risks in doing things the old way and there are new risks with doing things the new way, the cloud way. People who just say “no” aren’t engaging in the right discussion. Additionally, I think that the cloud forces us to have a different kind of discipline around data security, mostly because it breaks down the assumption that we have any kind of network security at all. to learn more about Axway, visit axway.com Our services in combination with CA Technologies products results in a powerful story for our customers.
  • 5. To learn more from cloud service providers working with CA Technologies, visit ca.com/cloudaccelerators Copyright © 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document “as is” without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. The information and results illustrated here are based upon the customer’s experiences with the referenced software product in a variety of environments, which may include production and nonproduction environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments. We think about all the touch points for the data, because we assume that the environment is hostile. Now, in an on-premise world, we often will think about other types of defenses, like network-based defenses, but I think we may find that the vigilance that cloud computing forces us to have, in which we assume the data lives in a hostile environment, is actually a good discipline to bring back on-premise. As we look at some other trends around consumerization of IT and bring your own device, hostile devices entering the network and hostile people touching the network, our secure network and firewalls really are connected to a hostile environment, just like the cloud. Why is identity and access management so critical to data security? In a lot of ways, identity and access management is the backbone of the security infrastructure for the enterprise. If we think that the major threat points in the system are, in fact, the human element, then identity and access management is really where the system and the humans connect to each other. If our security value is to mean anything in the hands of people who aren’t managed properly, then our technology is for naught. Why did Axway choose to partner with CA Technologies? We began working with CA Technologies because of a mutual customer, and our relationship has really blossomed over the past few years. We also chose CA Technologies because they are a market leader and it’s important to us that we align ourselves with the best partners in the industry. If you look at CA Single Sign-On and CA SiteMinder®, CA Technologies is the market leader bar-none. Our solutions in combination with CA Technologies products results in a powerful story for our customers. The encryption, the data security, and the workflow process is provided by Axway software, and the authorization, identity management, credential life cycle, and the two factor mechanisms are all under the control of CA Technologies software. Not only are we a reseller of CA Technologies products, but we actually use the technology ourselves to run some of our large projects. More recently, we’ve found ourselves drawn to the CA Technologies vision of what cloud means. Marketing people love the word, but enterprises are still trying to figure out what it means to them. I think CA Technologies and Axway have a well-aligned vision for the cloud, for the cloud, and CA Technologies can help us realize that vision through our partnership. But when we think about securing data in the cloud, we know we’re going through public networks, and so we have to think about defending all of the points of entry. Where does the data flow? That has to be secured. Who has access? That has to be secured. Who’s taking back-up tapes? That has to be secured.