SlideShare a Scribd company logo
© 2017 VMware Inc. All rights reserved.
Partner Leadership
Summit 2017
Pat Gelsinger
CEO
© 2017 VMware Inc. All rights reserved.
Welcome!
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Tension Points for Public Sector IT Leaders
3
Invest Strategically to
Modernize Government IT
Reduce Spending
on Government IT
Improve Cyber Security to
Protect Against All Threats
Meet Citizen Demand
for Open Access
Embrace Cloud, IoT, Mobile,
and New Apps
Streamline Operations
Across the Board
Our Promise to
Federal Government
A portfolio of technology solutions that
enables your agency to better harness
the resources you need to power
smarter government and improve
security from your users to wherever
your data resides.
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Moving Up the Value Chain
Addressing Our Joint Customers’ Most Complex Challenges
Virtualization
Leader
Conquering Silos
of Compute
2007
SDDC
Leader
Conquering Silos
Across the Data
Center
2012
Mobile-Cloud
Leader
Conquering Silos
Across:
• Cloud
• Mobile
• Security
2017
5
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
It’s In Our DNA
Fearless
Innovators
Challenging
Conventional
Wisdom
Making the
Impossible
Possible
6
Challenging the Conventional Wisdom:
5 Myths of IT
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #1
“Bi-modal IT is the best strategy:
One team moves fast and
innovates, the other keeps
the lights on.”
8
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
ExploratoryPredictable “New & Cool Team”“Old & Slow Team”
Translation?
IT Ops Developers
9
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Discord
Budget
Battles
A Management
Nightmare
Real-World Result?
“New & Cool Team”“Old & Slow Team”
IT Ops Developers
10
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
The Real Challenge: Innovate Everywhere
Intrinsic Security
Traditional Apps Cloud-Native Apps
Agile Infrastructure
11
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #2
“It’s time to take everything to
the Public Cloud. Simply close
the doors on-prem ASAP.”
12
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Why not?
Private Cloud Public Cloud
13
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Why Not:
14
C PC P
2
ost
erformance
ompliance
rivacy
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
vCloud Air Network
Best-in-Class
Private Cloud
VMware Cross-Cloud Architecture
Freedom and Control
15
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
State of the Cloud 2030
Traditional IT Public CloudPrivate Cloud
52%19% 29%
596 Million
Total Global IT Workloads
Source: VMware Analysis
16
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Making Private Cloud Easy
17
vRealize Cloud
Management
VMware Cloud
Foundation™
Hyper-Converged
Infrastructure
…increasingly delivered as a service
…as Easy as Public Cloud
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
We will be living in a hybrid
world for decades to come.
Bottom Line
18
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #3
“With cyber security,
government IT must run
faster just to stay in place.”
19
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Y/Y Growth in
Security Budget
Y/Y Growth
in IT Budget
4%
24%
Source: IDC Worldwide Black Book 2016 , Version 2.1, August 2016
security grows…
As spend on
20
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
20152014
43M
59M
Security Incidents
are on the rise.
Security breaches
21
Source: PWC: The State of Global Information Security Survey 2016
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Source: Momentum Partners
Infrastructure Security
Security Operations & Incident Response
Endpoint Security Application Security
Messaging Security Web Security
IoT Security Threat Intelligence Mobile Security Data Security
Cloud Security
Specialized Threat Analysis & Protection Identity & Access ManagementTransaction Security
Risk & Compliance
Security Challenge Today:
Too Many Point Solutions
22
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
What Really Matters:
Secure Users, Apps & Data…Simplify Compliance
Secure User Identity
& Endpoints
Secure Application
Infrastructure
Streamline Governance & Compliance
Users DataApps
23
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Secure User Identity & Endpoints Secure Application Infrastructure
Streamline Governance & Compliance
Users DataApps
VMware Strategy: Transform Security
Secure Infrastructure
Cyber Hygiene
Foundational Products
Secure User Identity
& Endpoints
Secure Application
Infrastructure
Streamline Governance & Compliance
Users DataApps
24
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #4
“My mobile experience as a
citizen is fragmented, insecure,
and my user experience sucks.”
25
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
My Personal Life My Work Life
“Consumer Tech” “Government Tech”
26
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Next-Gen
User Experience
True Stateless
Desktops
Real-Time
App Delivery
Desktop
as-a-Service
Hybrid Cloud
Architecture
Core Challenge
27
Stitch Together Silos of Innovation
Identity
Management
Device
Management
Application
Management
Content
Management
Personal
Productivity
Mobile
Security
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Once Again:
Too Many Point Solutions to Manage
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #5
“All apps will be built via
containers and…VMware
will be irrelevant.”
ONE WAY
30
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 31
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
10X
2020
Emerging Challenge for IT:
Container Proliferation
32
70% of Containers in 2020 will be in VMs
Source: IDC Worldwide Cloud Predictions 2017
2015
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Q: Which Container Technology Will Win?
33
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
vRealize Cloud Management, VMware Integrated OpenStack
NSX and vSAN
VMware Cloud on AWS / vCloud Air™ Network
vRealize Cloud Management, VMware Integrated OpenStack
NSX and vSAN
VMware Cloud on AWS / vCloud Air™ Network
Developer Ready Infrastructure
VMware Strategy
Delivering Today’s Platform to Meet Tomorrow’s Needs
34
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Aligning To Your Strategic Priorities
VMware’s Vision
Any Cloud
Any Device
VMware Workspace ONE™
Desktop Mobile Identity
Any Application
Traditional Apps Cloud-Native Apps SaaS Apps
Software-Defined Data Center
VMware Cross-Cloud Architecture™
Private Cloud Hybrid Cloud Public Cloud
VMware Cloud Foundation™
VMware vRealize® Cloud Management
VMware vCloud
®
Air™
Network
F
VMware Cross-Cloud Services™
Government IT
Strategic Priorities
Integrate
Public
Clouds
Modernize
Data
Centers
Transform
Security
Empower
Digital
Workspaces
Government IT Strategic Priorities
Empower
Digital
Workspaces
Transform
Security
Modernize
Data
Centers
Integrate
Public
Clouds
35
Our Commitment
to You

More Related Content

What's hot

Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
Skybox Security
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
Amazon Web Services
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
Stefan Streichsbier
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Skybox Security
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021
Khairil Effendy
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
TechSoup
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
FaithWestdorp
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
Skybox Security
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 

What's hot (20)

Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 

Similar to Pat Gelsinger - Welcome

Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
Check Point Software Technologies
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
MarketingArrowECS_CZ
 
Keeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand CurveKeeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand Curve
Amazon Web Services
 
Keeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveKeeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand Curve
Amazon Web Services
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
PCM
 
Escape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonEscape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prison
Veritas Technologies LLC
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
marketingunitrends
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
Capgemini
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Digital Transformation EXPO Event Series
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
Veritas Technologies LLC
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
Marius Sandbu
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
AnyPresence
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
bayusch
 
Addressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorAddressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public Sector
ThousandEyes
 
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
Josef Adersberger
 

Similar to Pat Gelsinger - Welcome (20)

Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Keeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand CurveKeeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand Curve
 
Keeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveKeeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand Curve
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
 
Escape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonEscape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prison
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Addressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorAddressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public Sector
 
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
 

More from scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
scoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
scoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
scoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
scoopnewsgroup
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
scoopnewsgroup
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
scoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
scoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
scoopnewsgroup
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
scoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
scoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
scoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
scoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
scoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
scoopnewsgroup
 

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Recently uploaded

A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
Roger Valdez
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
elmerdalida001
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
viderakai
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
ResolutionFoundation
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
SERUDS INDIA
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
johnmarimigallon
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
OECDregions
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
Congressional Budget Office
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 

Recently uploaded (20)

A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 

Pat Gelsinger - Welcome

  • 1. © 2017 VMware Inc. All rights reserved. Partner Leadership Summit 2017 Pat Gelsinger CEO © 2017 VMware Inc. All rights reserved.
  • 3. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Tension Points for Public Sector IT Leaders 3 Invest Strategically to Modernize Government IT Reduce Spending on Government IT Improve Cyber Security to Protect Against All Threats Meet Citizen Demand for Open Access Embrace Cloud, IoT, Mobile, and New Apps Streamline Operations Across the Board
  • 4. Our Promise to Federal Government A portfolio of technology solutions that enables your agency to better harness the resources you need to power smarter government and improve security from your users to wherever your data resides.
  • 5. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Moving Up the Value Chain Addressing Our Joint Customers’ Most Complex Challenges Virtualization Leader Conquering Silos of Compute 2007 SDDC Leader Conquering Silos Across the Data Center 2012 Mobile-Cloud Leader Conquering Silos Across: • Cloud • Mobile • Security 2017 5
  • 6. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution It’s In Our DNA Fearless Innovators Challenging Conventional Wisdom Making the Impossible Possible 6
  • 7. Challenging the Conventional Wisdom: 5 Myths of IT
  • 8. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #1 “Bi-modal IT is the best strategy: One team moves fast and innovates, the other keeps the lights on.” 8
  • 9. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution ExploratoryPredictable “New & Cool Team”“Old & Slow Team” Translation? IT Ops Developers 9
  • 10. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Discord Budget Battles A Management Nightmare Real-World Result? “New & Cool Team”“Old & Slow Team” IT Ops Developers 10
  • 11. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution The Real Challenge: Innovate Everywhere Intrinsic Security Traditional Apps Cloud-Native Apps Agile Infrastructure 11
  • 12. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #2 “It’s time to take everything to the Public Cloud. Simply close the doors on-prem ASAP.” 12
  • 13. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Why not? Private Cloud Public Cloud 13
  • 14. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Why Not: 14 C PC P 2 ost erformance ompliance rivacy
  • 15. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution vCloud Air Network Best-in-Class Private Cloud VMware Cross-Cloud Architecture Freedom and Control 15
  • 16. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution State of the Cloud 2030 Traditional IT Public CloudPrivate Cloud 52%19% 29% 596 Million Total Global IT Workloads Source: VMware Analysis 16
  • 17. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Making Private Cloud Easy 17 vRealize Cloud Management VMware Cloud Foundation™ Hyper-Converged Infrastructure …increasingly delivered as a service …as Easy as Public Cloud
  • 18. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution We will be living in a hybrid world for decades to come. Bottom Line 18
  • 19. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #3 “With cyber security, government IT must run faster just to stay in place.” 19
  • 20. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Y/Y Growth in Security Budget Y/Y Growth in IT Budget 4% 24% Source: IDC Worldwide Black Book 2016 , Version 2.1, August 2016 security grows… As spend on 20
  • 21. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 20152014 43M 59M Security Incidents are on the rise. Security breaches 21 Source: PWC: The State of Global Information Security Survey 2016
  • 22. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Source: Momentum Partners Infrastructure Security Security Operations & Incident Response Endpoint Security Application Security Messaging Security Web Security IoT Security Threat Intelligence Mobile Security Data Security Cloud Security Specialized Threat Analysis & Protection Identity & Access ManagementTransaction Security Risk & Compliance Security Challenge Today: Too Many Point Solutions 22
  • 23. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution What Really Matters: Secure Users, Apps & Data…Simplify Compliance Secure User Identity & Endpoints Secure Application Infrastructure Streamline Governance & Compliance Users DataApps 23
  • 24. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Secure User Identity & Endpoints Secure Application Infrastructure Streamline Governance & Compliance Users DataApps VMware Strategy: Transform Security Secure Infrastructure Cyber Hygiene Foundational Products Secure User Identity & Endpoints Secure Application Infrastructure Streamline Governance & Compliance Users DataApps 24
  • 25. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #4 “My mobile experience as a citizen is fragmented, insecure, and my user experience sucks.” 25
  • 26. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution My Personal Life My Work Life “Consumer Tech” “Government Tech” 26
  • 27. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Next-Gen User Experience True Stateless Desktops Real-Time App Delivery Desktop as-a-Service Hybrid Cloud Architecture Core Challenge 27 Stitch Together Silos of Innovation Identity Management Device Management Application Management Content Management Personal Productivity Mobile Security
  • 28. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Once Again: Too Many Point Solutions to Manage
  • 29. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
  • 30. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #5 “All apps will be built via containers and…VMware will be irrelevant.” ONE WAY 30
  • 31. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 31
  • 32. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 10X 2020 Emerging Challenge for IT: Container Proliferation 32 70% of Containers in 2020 will be in VMs Source: IDC Worldwide Cloud Predictions 2017 2015
  • 33. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Q: Which Container Technology Will Win? 33
  • 34. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution vRealize Cloud Management, VMware Integrated OpenStack NSX and vSAN VMware Cloud on AWS / vCloud Air™ Network vRealize Cloud Management, VMware Integrated OpenStack NSX and vSAN VMware Cloud on AWS / vCloud Air™ Network Developer Ready Infrastructure VMware Strategy Delivering Today’s Platform to Meet Tomorrow’s Needs 34
  • 35. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Aligning To Your Strategic Priorities VMware’s Vision Any Cloud Any Device VMware Workspace ONE™ Desktop Mobile Identity Any Application Traditional Apps Cloud-Native Apps SaaS Apps Software-Defined Data Center VMware Cross-Cloud Architecture™ Private Cloud Hybrid Cloud Public Cloud VMware Cloud Foundation™ VMware vRealize® Cloud Management VMware vCloud ® Air™ Network F VMware Cross-Cloud Services™ Government IT Strategic Priorities Integrate Public Clouds Modernize Data Centers Transform Security Empower Digital Workspaces Government IT Strategic Priorities Empower Digital Workspaces Transform Security Modernize Data Centers Integrate Public Clouds 35

Editor's Notes

  1. How many of you all have heard of this idea that bi-modal IT is the best strategy today? You’ve heard that? What do you think? Our thinking? Not true!
  2. IT Operations—predictable, and you need these new developers and the exploratory folks of the future. Now, that means—How many of you want a part of the “old and slow” team? Not so much! None of us wants to be in the “old, slow, cranky” team. All of us want to be a part of the cool new team. . . These associations need to be cast aside with the two teams working in harmony toward a single purpose – to drive speed and innovation.
  3. Fragmenting IT into "old & slow vs new & fast" is a false binary and a fundamentally flawed strategy The person who came up with this obviously never ran an organization. We need to bring innovation to every aspect of the business. This model results in discord, budget battles, and a management nightmare. The real challenge is enabling innovation across IT, at the app level, infrastructure that is agile and can respond and security that is built in and enabling that pace of innovation
  4. This is what we do. We’re going to create agile, scalable infrastructure that allows innovation and scale across the entire business. Make the infra easy, automated, and scalable so that the business can innovate everywhere—in existing apps and in new apps as well.
  5. Myth #2: “It’s time to take everything to the Public Cloud. Close the doors ASAP.”
  6. And why not? There’s a certain appeal to this thought process where I can get out of running capital; I don’t need to manage those data centers myself, running that depreciation. Sounds pretty conducive, doesn’t it?
  7. Well– Why not? A little acronym for you: CP2. So the reason “why not” is, if you don’t care about Cost, Performance, Compliance, or Privacy, just move it all to the cloud. What do you think—Do you care about any of those things? Do you care about a well-performing private cloud being dramatically cheaper than a public cloud? Performance—you know, you still have this problem called speed of light and latency. Compliance and regulation. Privacy requirements are going to increase and become more acute in the context of EU and GDPR. And our industry has this pendulum swing that goes side to side, going from the mainframe era to the distributed era. When we think about things like IoT, more will move back to the edge and on-premise as well.
  8. And this is what cross-cloud is all about, enabling the best of both worlds. In the past, VMware provided compute and server freedom. In the future, VMware will provide cloud freedom and cloud control. The cloud has become the new hardware and we are uniquely positioned to enable that new future.
  9. And if you look back at my VMworld speech this year, what did we say? 50/50 by 2030. The math simply doesn’t work for an all public-cloud environment.
  10. The result is, there will be decades of a hybrid world in front of us. But we have some responsibility here. Because we have not made the private cloud nearly as easy and consumable as it needs to be. We need to make it simpler, easier, more efficient. And three ways that we’re going to do that? This is what VMware Cloud Foundation is all about—putting all the pieces together. And I expect by FY19, this becomes our primary selling notion—Cloud Foundation. All hardware becomes hyper-converged hardware in the future. We have to drive that agenda with our vSAN, VxRack, vXRAIL products, much more aggressively. And the rule of the cloud—ruthlessly automate everything. That’s what vRealize is all about. We have to drive these agendas and make private cloud much easier.
  11. And uniquely enable the hybrid cloud world. This is our opportunity.
  12. Myth #3 – Cybersecurity, IT is running faster just to stay in place. And if you’re an IT security pro, you know the gerbil is a pretty good picture. You’re running like crazy and guess what–
  13. You’re not getting ahead. And in fact, if you look at the data, you’re spending more of your IT budget on security—4% growth in IT spending overall, 25% growth in security spending. And the result is, that increase in spending on cyber security, how are you doing?
  14. Security breaches are on the rise. So we’re spending more and our breaches are increasing. Something is fundamentally wrong.
  15. Now this to me is just an awesome picture. This is the security industry. This is what our industry is presenting to our customers as saying, “Here’s the solution.” Can you believe this collection of logos? Isn’t this overwhelming? I just love this slide. Now, how can IT possibly put all of these together and make them work. Integrate them all, update them all, keep them all current. We have delivered a menagerie of point products.
  16. And what the user wants is to secure users, apps, and data. We VMware are going to do that by securing the user identity and the endpoints and by securing the infrastructure. And what we’re going to do in terms of the way we do this is going to be industry-shaping and game-changing.
  17. What we’re going to do is make the infrastructure secure. Literally. We are going to integrate more of those functionalities directly into the infrastructure. Native encryption in vSphere, NSX microsegmentation, AirWatch. These things are going to take more of that functionality and make it that you have to turn it off, not turn it on. We’re simply going to make these things go away. And then we’re going to partner deeply with the key foundational platforms and products and integrate more of those functionalities away. And then finally, enable a world where cyber hygiene is standard and common. This fragmented, insecure environment that we have today—we have to come to a world where we bring those pieces together and enable the basics of encryption, strong identifications, software upgrades and patch. We have a fundamental challenge that we can enable a more secure environment than ever before.
  18. Myth #4 - “Enterprise mobility is fragmented, insecure, and my user experience sucks.” So other than that, what do you think? Sounds pretty good.
  19. Well—this is my car, by the way, I drive an i8. Looks cool, feels good, goes fast. That’s not me in the picture. But this is the kind of Apple store elegance that we want and expect, but when we go to our corporate environments, what we get is what is Complicated. Difficult.
  20. And what we need to enable is that ability to stitch together all of these silos of innovation into an overall solution.
  21. Once again we see way too many logos, way too many customers. And our opportunity is to displace not just one of these, but many or most of these companies. Delivering a compelling user interface. Delivering an integrated solution that brings all of those pieces together. Delivering identity, desktop-mobile management, security, and to make it cool like an i8!
  22. Consumer simple, and enterprise secure. That’s what we will do to address this myth of mobility and the end-user space.
  23. Now, Myth #5 -- All apps will be built via containers and VMware becomes irrelevant in that process.
  24. We were not aggressive in addressing the OpenStack challenge to our business. It has taken us years to navigate on top of that trend with VMware integrated OpenStack. I want you to be very clear today: VMware loves containers. We will not be late in embracing containers. Containers are much more important. They automate the application development, deployment, and lifecycle management. We are grabbing this trend much more aggressively. Let me hear you say it: “VMware loves containers.”
  25. Now, as we think about this — why is it good for our business? Well, the first thing is—analysts expect, as people refactor their applications to containers, there’s a 10x increase in the number of containers. 10x – So that’s 10x the number of ports that need NSX connectivity. That’s 10x the number of storage attach points. 10x the number of elements that need management. What do you think – 10x? This is a huge opportunity for us, and IDC, even before we have even started to really deliver our platform, 70% get wrapped in VMs. 70% of 10x – What an extraordinary opportunity for VMware – to be the company that delivers the infrastructure to create.
  26. Once again, the market is chaotic. Way too many players, nobody’s making money, it’s early in this industry formation. Who’s going to win?
  27. And against that, we’re going to solve the fundamental dilemma. We’re going to allow the infrastructure folks to have an infrastructure that enables a container world. We’re going to solve this dilemma of operations, and to uniquely allow customers to say yes, to containers, to their developer teams. We are uniquely positioned to make containers enterprise-ready. And between VIC (our VMware Integrated Containers) and Photon, an all-in, purpose-built stack, we are the company to bridge those two worlds and deliver an enterprise ready platform for a container-oriented world. We’re going to partner deeply with Pivotal and other key technologies in the space. We love containers.
  28. Driving Alignment: Customer Strategic Priorities and VMW Vision --Always start with the customer strategic IT priorities – 4 areas of priority for the IT teams we serve... --Tight alignment between customer priorities and VMW vision