VMware held a leadership summit in 2017 to discuss challenges facing public sector IT leaders and opportunities to modernize government IT. The document outlines 5 myths about IT strategies and how VMware's portfolio of solutions can help address issues around bi-modal IT, hybrid cloud strategies, cybersecurity, mobile experiences, and container proliferation. VMware aims to help customers conquer silos across compute, storage, applications and clouds through virtualization, software-defined data center technologies, and cross-cloud architectures.
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
In today’s real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. VMs that are put in production, lacking adequate protection, leave high-risk vulnerabilities open for exploitation. Learn how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection. Once in operation, using the adapter for vRealize Operations, the security events become visible next to the operational events, providing a holistic view of the environment. This will be illustrated through the case study of a leading manufacturing company, Plexus Corporation, who will also share their NSX journey.
This was one of Trend Micro's sessions presented at VMworld 2017.
by Twistlock
With containers, teams worldwide are deploying faster than ever before. But traditional security practices are slow and manual - leaving many users a choice between strong security or DevOps speed. In this talk, we'll outline how adopting a new 'cloud native' approach to security lets you recognize all the benefits of containerized deployment - and enjoy stronger protection than ever before.
Let your team understand the importance of Computer security with the assistance of our Cyber Security PowerPoint Presentation Deck. In today’s time, it is quite essential to pay attention towards the protection of computer systems from theft or damage as there is a every chance of your data being accessed by someone else. Our creative designing team has crafted this PPT Deck with 17 slides for you to share the information related to IT security. Although there are cyber security standards available but still there are people in the market who try to capture your data to either use it for their own purpose or sell it to some other organization. This presentation deck enables you to highlight the information related to cyber attacks that can create concerns such as backdoor, direct-access attacks, eavesdropping, phishing, spoofing, tampering etc. By taking certain security measures you can protect your data. Cyber Security standards attempt to protect the cyber environment of a user or an organization. The PowerPoint deck contains some slides which include information related to tips, initiatives, step to ensure that your data is protected at every step. So, download it and take precautionary steps to secure your IT system. Cater for crazy cravings with our Cybersecurity Powerpoint Presentation Slides. Find a harmless way to fulfill deep desires.
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
In today’s real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. VMs that are put in production, lacking adequate protection, leave high-risk vulnerabilities open for exploitation. Learn how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection. Once in operation, using the adapter for vRealize Operations, the security events become visible next to the operational events, providing a holistic view of the environment. This will be illustrated through the case study of a leading manufacturing company, Plexus Corporation, who will also share their NSX journey.
This was one of Trend Micro's sessions presented at VMworld 2017.
by Twistlock
With containers, teams worldwide are deploying faster than ever before. But traditional security practices are slow and manual - leaving many users a choice between strong security or DevOps speed. In this talk, we'll outline how adopting a new 'cloud native' approach to security lets you recognize all the benefits of containerized deployment - and enjoy stronger protection than ever before.
Let your team understand the importance of Computer security with the assistance of our Cyber Security PowerPoint Presentation Deck. In today’s time, it is quite essential to pay attention towards the protection of computer systems from theft or damage as there is a every chance of your data being accessed by someone else. Our creative designing team has crafted this PPT Deck with 17 slides for you to share the information related to IT security. Although there are cyber security standards available but still there are people in the market who try to capture your data to either use it for their own purpose or sell it to some other organization. This presentation deck enables you to highlight the information related to cyber attacks that can create concerns such as backdoor, direct-access attacks, eavesdropping, phishing, spoofing, tampering etc. By taking certain security measures you can protect your data. Cyber Security standards attempt to protect the cyber environment of a user or an organization. The PowerPoint deck contains some slides which include information related to tips, initiatives, step to ensure that your data is protected at every step. So, download it and take precautionary steps to secure your IT system. Cater for crazy cravings with our Cybersecurity Powerpoint Presentation Slides. Find a harmless way to fulfill deep desires.
Skybox presentation from Security Interest Group Switzerland December 2014 meeting exploring current challenges of network security including vulnerability management and firewall change management.
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
Splunk® offers a leading platform for Operational Intelligence, enabling AWS users to look closely at machine data and gain actionable insights that can help make your organization more productive, profitable, competitive, and secure. Join us to learn how Splunk and AWS together can provide the end-to-end visibility needed to respond proactively and as quickly as possible to rapidly evolving security environments.
Learn how Splunk and AWS together can provide the end-to-end visibility needed to respond proactively and as quickly as possible to rapidly evolving security environments.
Speakers:
David Wall, Country Manager ANZ & Head of Asia Pacific & Japan & Arup Chakrabarti, Director of Engineering - Pager Duty
Myles Hosford, Security Solution Architect - AWS
Richard Smith, Strategic Alliances - Splunk
In a highly competitive digital culture, businesses are intensifying their digital transformation efforts to expand their hybrid and multi-cloud cloud initiatives. As dependencies on legacy point solutions and architectures begin to diminish, developers are becoming increasingly influential in newly digitally transformed organizations.
The need for increased agility, and speed is paramount. While CDNs have been a key fixture for many enterprise businesses to remediate global network latencies, new challenges have arisen with these solutions that are inhibiting agile workstyles.
Join this webinar to learn the following:
- The foundations of improving web performance
- How the web performance market is evolving and the challenges faced by CDN providers
- How Cloudflare supports your digital transformation
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
Evident.io helps modern IT and DevOps teams implement and maintain security within the AWS shared responsibility model by enabling IT, Security, Engineering, and Operations with a continuous global view of security risk and actionable intelligence to rapidly remediate and secure AWS deployments.
Hear how one of their customers combined the detection and analysis of misconfigurations, vulnerabilities, and risk with guided remediation and audit capabilities to gain visibility of their security environment, automate processes and meet compliance requirements.
Eddie Borrero, Chief Information Security Officer, Robert Half International
Phil Rodrigues, Security Solution Architect, AWS
Craig Dent, Solutions Architect, Evident.io
Mobility and security are important factors that need to be prioritized by fintech startups in building user trust.
This presentations shares how to build, develop, and improve these two things so that your business can grow.
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
Presented at Black Hat 2014.
Heartbleed. Target. Adobe … businesses are under siege by cybercriminals looking for financial gain and political actors looking for trade secrets. It’s a wildly uneven match where a motivated attacker can find exploitable attack vectors in minutes and maintain unabated access for months, while the security team continues to rely on time-honored methodology to fix vulnerabilities in order of severity.
But severity-based vulnerability management misses the mark completely, as it overlooks the fact that risk exposure is the real concern. This workshop will focus on identifying critical vulnerabilities so they can be fixed as quickly as possible to ensure a reduction in risk and the shrinking the attack surface over time.
In this deep dive session on vulnerability analysis and prioritization, we’ll cover:
- Calculating risk exposure: Risk = Impact * Likelihood * Time
- The data you need to be collecting about assets and vulnerabilities
- Prioritizing vulnerabilities using simple 2 factor relationships
- Asset-to-vulnerability correlation to augment the accuracy and freshness of active scan data
- Techniques to drive down the risk exposure time
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
When switching to the cloud, many nonprofits wonder how cloud apps and services will affect their organization’s security. Cloud apps and software, such as Microsoft Office 365, Google G Suite, Box, and Amazon Web Services offer a multitude of benefits to nonprofits when it comes to keeping their devices and data safe. In this 60-minute webinar, hosted by Deena Thomchick, Senior Director of Cloud Security at Symantec, we will cover the many security benefits of switching to the cloud.
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
Skybox Security addresses recent trends and changes in strategy in the network security space and the challenges facing IT security professionals and CISOs.
This is the presentation used in Check Point's November 20th webinar on "Securing Your Cloud With vSEC". Be sure to check out the webinar replay here: <bitly/UTM>
Skybox presentation from Security Interest Group Switzerland December 2014 meeting exploring current challenges of network security including vulnerability management and firewall change management.
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
Splunk® offers a leading platform for Operational Intelligence, enabling AWS users to look closely at machine data and gain actionable insights that can help make your organization more productive, profitable, competitive, and secure. Join us to learn how Splunk and AWS together can provide the end-to-end visibility needed to respond proactively and as quickly as possible to rapidly evolving security environments.
Learn how Splunk and AWS together can provide the end-to-end visibility needed to respond proactively and as quickly as possible to rapidly evolving security environments.
Speakers:
David Wall, Country Manager ANZ & Head of Asia Pacific & Japan & Arup Chakrabarti, Director of Engineering - Pager Duty
Myles Hosford, Security Solution Architect - AWS
Richard Smith, Strategic Alliances - Splunk
In a highly competitive digital culture, businesses are intensifying their digital transformation efforts to expand their hybrid and multi-cloud cloud initiatives. As dependencies on legacy point solutions and architectures begin to diminish, developers are becoming increasingly influential in newly digitally transformed organizations.
The need for increased agility, and speed is paramount. While CDNs have been a key fixture for many enterprise businesses to remediate global network latencies, new challenges have arisen with these solutions that are inhibiting agile workstyles.
Join this webinar to learn the following:
- The foundations of improving web performance
- How the web performance market is evolving and the challenges faced by CDN providers
- How Cloudflare supports your digital transformation
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
Evident.io helps modern IT and DevOps teams implement and maintain security within the AWS shared responsibility model by enabling IT, Security, Engineering, and Operations with a continuous global view of security risk and actionable intelligence to rapidly remediate and secure AWS deployments.
Hear how one of their customers combined the detection and analysis of misconfigurations, vulnerabilities, and risk with guided remediation and audit capabilities to gain visibility of their security environment, automate processes and meet compliance requirements.
Eddie Borrero, Chief Information Security Officer, Robert Half International
Phil Rodrigues, Security Solution Architect, AWS
Craig Dent, Solutions Architect, Evident.io
Mobility and security are important factors that need to be prioritized by fintech startups in building user trust.
This presentations shares how to build, develop, and improve these two things so that your business can grow.
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
Presented at Black Hat 2014.
Heartbleed. Target. Adobe … businesses are under siege by cybercriminals looking for financial gain and political actors looking for trade secrets. It’s a wildly uneven match where a motivated attacker can find exploitable attack vectors in minutes and maintain unabated access for months, while the security team continues to rely on time-honored methodology to fix vulnerabilities in order of severity.
But severity-based vulnerability management misses the mark completely, as it overlooks the fact that risk exposure is the real concern. This workshop will focus on identifying critical vulnerabilities so they can be fixed as quickly as possible to ensure a reduction in risk and the shrinking the attack surface over time.
In this deep dive session on vulnerability analysis and prioritization, we’ll cover:
- Calculating risk exposure: Risk = Impact * Likelihood * Time
- The data you need to be collecting about assets and vulnerabilities
- Prioritizing vulnerabilities using simple 2 factor relationships
- Asset-to-vulnerability correlation to augment the accuracy and freshness of active scan data
- Techniques to drive down the risk exposure time
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
When switching to the cloud, many nonprofits wonder how cloud apps and services will affect their organization’s security. Cloud apps and software, such as Microsoft Office 365, Google G Suite, Box, and Amazon Web Services offer a multitude of benefits to nonprofits when it comes to keeping their devices and data safe. In this 60-minute webinar, hosted by Deena Thomchick, Senior Director of Cloud Security at Symantec, we will cover the many security benefits of switching to the cloud.
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
Skybox Security addresses recent trends and changes in strategy in the network security space and the challenges facing IT security professionals and CISOs.
This is the presentation used in Check Point's November 20th webinar on "Securing Your Cloud With vSEC". Be sure to check out the webinar replay here: <bitly/UTM>
Keeping Security In-Step with Your Application Demand CurveAmazon Web Services
Protecting dynamically scaled cloud compute resources can be challenging, especially for organizations that lack the time or money it takes to maintain dynamic security. Fortinet’s auto scaling security solution addresses this issue by providing the resources to help with deployment in order to optimize organizations’ AWS networks. Join the upcoming webinar hosted by Fortinet and AWS to learn how to leverage Fortinet for auto scaling complex security policies in your Amazon VPC. Fortinet has a broad set of capabilities that when combined with AWS services creates truly a complete security architecture.
Keeping Security In-Step with your Application Demand CurveAmazon Web Services
Protecting dynamically scaled cloud compute resources can be challenging, especially for organizations that lack the time or money it takes to maintain dynamic security. Fortinet’s auto scaling security solution addresses this issue by providing the resources to help with deployment in order to optimize organizations’ AWS networks. Join the upcoming webinar hosted by Fortinet and AWS to learn how to leverage Fortinet for auto scaling complex security policies in your Amazon VPC. Fortinet has a broad set of capabilities that when combined with AWS services creates truly a complete security architecture.
Are you tired of paying the VMware tax? Are you stuck in a Veeam virtual data protection prison? It's time to move beyond these outdated "virtual only" solutions. Attend this session to learn how you can finally trade your limited virtual data protection solution in for a complete Veritas solution that can protect all of your data from a single platform, with a single license, managed from a single console.
Don’t let Ransomware hold your data and your company hostage. Ransomware attacks increased by over 300% in 2016. Watch this Tech Demo to see how Unitrends addresses this prolific threat.
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...Capgemini
In today’s real-time enterprises, operations teams often have to do more with
less, and in some cases forced to take shortcuts to meet business demands.
Workload, network and cloud virtualization introduced a quantum leap in our
operational capabilities, but security often remains an after-thought, with lots of
manual tasks and add-on point solutions that lack unified controls for this era of
digital transition.
Workloads are often put into production, lacking adequate protection
and automation of security controls. This leaves unforeseen and high-risk
vulnerabilities open for exploitation.
This session will cover the native-API capabilities of Trend Micro Deep Security
and it’s strong integration with the most common frameworks. It will demonstrate
how architectures can build-in security without any additional effort and provide
“secure-by-design” solutions that will bring their environments into the new era
of network security.
Richard will look at the reasoning behind the current move towards Cloud-based resource usage and identify the many areas of risk that must be considered when a migration project is being planned. He will look closely at emerging threats and explain how these can be confronted using the appropriate Cloud security strategy and solutions. He will also look at the various different models of Cloud and define methodologies to assist any organisation to be compliant with current and future legislation that governs data usage and protection.
Mediante el uso del marco de perímetro digital seguro, implementando un modelo “defense-in depth” se logrará la continuidad de las operaciones para evitar que los ataques maliciosos afecten las mismas y proporcionar resiliencia de acceso seguro y de red durante interrupciones, desastres naturales y calamidades. Esto permite a la fuerza de trabajo reanudar rápidamente industrias de actividades críticas y esenciales.
EMM and MBaaS: How IT Can Enable Secure App DevelopmentAnyPresence
Michael Facemire of Forrester Research and Scott Schwarzhoff of Citrix joined AnyPresence to discuss the continuing evolution of enterprise mobility management, app development imperatives and challenges, MBaaS solutions and capabilities, and how IT can be the enablers of secure app development across the enterprise.
The good, the bad, and the ugly of migrating hundreds of legacy applications ...Josef Adersberger
Wir haben bei der Allianz innerhalb von 17 Monaten eine Container Plattform in der Public Cloud aufgebaut und in einem ersten Schritt 144 Java Legacy Anwendungen cloud-ready gemacht und dorthin migriert. Im Vortrag zeigen wir, was dabei unsere Erfolgsrezepte und größten Hindernisse waren. Es geht dabei unter anderen darum, wie man eine große Anwendungslandschaft auf ihre Cloud-Readiness hin analysiert und wie man eine industrialisierte Migration von Anwendungen auf eine Cloud Plattform etabliert.
Lisa Davis, VP & GM, Digital Transformation & Scale Solutions, Enterprise & Government, Data Center Group, Intel Corp.
Red Hat Government Symposium 2019
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...OECDregions
Preliminary findings from OECD field visits for the project: Enhancing EU Mining Regional Ecosystems to Support the Green Transition and Secure Mineral Raw Materials Supply.
4. Our Promise to
Federal Government
A portfolio of technology solutions that
enables your agency to better harness
the resources you need to power
smarter government and improve
security from your users to wherever
your data resides.
How many of you all have heard of this idea that bi-modal IT is the best strategy today?
You’ve heard that? What do you think? Our thinking? Not true!
IT Operations—predictable, and you need these new developers and the exploratory folks of the future. Now, that means—How many of you want a part of the “old and slow” team? Not so much! None of us wants to be in the “old, slow, cranky” team. All of us want to be a part of the cool new team. . . These associations need to be cast aside with the two teams working in harmony toward a single purpose – to drive speed and innovation.
Fragmenting IT into "old & slow vs new & fast" is a false binary and a fundamentally flawed strategy
The person who came up with this obviously never ran an organization. We need to bring innovation to every aspect of the business. This model results in discord, budget battles, and a management nightmare.
The real challenge is enabling innovation across IT, at the app level, infrastructure that is agile and can respond and security that is built in and enabling that pace of innovation
This is what we do. We’re going to create agile, scalable infrastructure that allows innovation and scale across the entire business. Make the infra easy, automated, and scalable so that the business can innovate everywhere—in existing apps and in new apps as well.
Myth #2: “It’s time to take everything to the Public Cloud. Close the doors ASAP.”
And why not? There’s a certain appeal to this thought process where I can get out of running capital; I don’t need to manage those data centers myself, running that depreciation. Sounds pretty conducive, doesn’t it?
Well– Why not? A little acronym for you: CP2. So the reason “why not” is, if you don’t care about Cost, Performance, Compliance, or Privacy, just move it all to the cloud. What do you think—Do you care about any of those things?
Do you care about a well-performing private cloud being dramatically cheaper than a public cloud?
Performance—you know, you still have this problem called speed of light and latency.
Compliance and regulation.
Privacy requirements are going to increase and become more acute in the context of EU and GDPR.
And our industry has this pendulum swing that goes side to side, going from the mainframe era to the distributed era. When we think about things like IoT, more will move back to the edge and on-premise as well.
And this is what cross-cloud is all about, enabling the best of both worlds.
In the past, VMware provided compute and server freedom.
In the future, VMware will provide cloud freedom and cloud control.
The cloud has become the new hardware and we are uniquely positioned to enable that new future.
And if you look back at my VMworld speech this year, what did we say? 50/50 by 2030. The math simply doesn’t work for an all public-cloud environment.
The result is, there will be decades of a hybrid world in front of us.
But we have some responsibility here. Because we have not made the private cloud nearly as easy and consumable as it needs to be. We need to make it simpler, easier, more efficient. And three ways that we’re going to do that? This is what VMware Cloud Foundation is all about—putting all the pieces together. And I expect by FY19, this becomes our primary selling notion—Cloud Foundation. All hardware becomes hyper-converged hardware in the future. We have to drive that agenda with our vSAN, VxRack, vXRAIL products, much more aggressively. And the rule of the cloud—ruthlessly automate everything. That’s what vRealize is all about. We have to drive these agendas and make private cloud much easier.
And uniquely enable the hybrid cloud world. This is our opportunity.
Myth #3 – Cybersecurity, IT is running faster just to stay in place. And if you’re an IT security pro, you know the gerbil is a pretty good picture. You’re running like crazy and guess what–
You’re not getting ahead. And in fact, if you look at the data, you’re spending more of your IT budget on security—4% growth in IT spending overall, 25% growth in security spending. And the result is, that increase in spending on cyber security, how are you doing?
Security breaches are on the rise. So we’re spending more and our breaches are increasing. Something is fundamentally wrong.
Now this to me is just an awesome picture.
This is the security industry. This is what our industry is presenting to our customers as saying, “Here’s the solution.” Can you believe this collection of logos? Isn’t this overwhelming? I just love this slide. Now, how can IT possibly put all of these together and make them work. Integrate them all, update them all, keep them all current. We have delivered a menagerie of point products.
And what the user wants is to secure users, apps, and data. We VMware are going to do that by securing the user identity and the endpoints and by securing the infrastructure. And what we’re going to do in terms of the way we do this is going to be industry-shaping and game-changing.
What we’re going to do is make the infrastructure secure. Literally. We are going to integrate more of those functionalities directly into the infrastructure. Native encryption in vSphere, NSX microsegmentation, AirWatch. These things are going to take more of that functionality and make it that you have to turn it off, not turn it on. We’re simply going to make these things go away. And then we’re going to partner deeply with the key foundational platforms and products and integrate more of those functionalities away. And then finally, enable a world where cyber hygiene is standard and common. This fragmented, insecure environment that we have today—we have to come to a world where we bring those pieces together and enable the basics of encryption, strong identifications, software upgrades and patch. We have a fundamental challenge that we can enable a more secure environment than ever before.
Myth #4 - “Enterprise mobility is fragmented, insecure, and my user experience sucks.”
So other than that, what do you think?
Sounds pretty good.
Well—this is my car, by the way, I drive an i8. Looks cool, feels good, goes fast. That’s not me in the picture. But this is the kind of Apple store elegance that we want and expect, but when we go to our corporate environments, what we get is what is Complicated. Difficult.
And what we need to enable is that ability to stitch together all of these silos of innovation into an overall solution.
Once again we see way too many logos, way too many customers. And our opportunity is to displace not just one of these, but many or most of these companies. Delivering a compelling user interface. Delivering an integrated solution that brings all of those pieces together. Delivering identity, desktop-mobile management, security, and to make it cool like an i8!
Consumer simple, and enterprise secure. That’s what we will do to address this myth of mobility and the end-user space.
Now, Myth #5 -- All apps will be built via containers and VMware becomes irrelevant in that process.
We were not aggressive in addressing the OpenStack challenge to our business. It has taken us years to navigate on top of that trend with VMware integrated OpenStack. I want you to be very clear today: VMware loves containers. We will not be late in embracing containers. Containers are much more important. They automate the application development, deployment, and lifecycle management. We are grabbing this trend much more aggressively.
Let me hear you say it: “VMware loves containers.”
Now, as we think about this — why is it good for our business? Well, the first thing is—analysts expect, as people refactor their applications to containers, there’s a 10x increase in the number of containers. 10x – So that’s 10x the number of ports that need NSX connectivity. That’s 10x the number of storage attach points. 10x the number of elements that need management. What do you think – 10x? This is a huge opportunity for us, and IDC, even before we have even started to really deliver our platform, 70% get wrapped in VMs. 70% of 10x – What an extraordinary opportunity for VMware – to be the company that delivers the infrastructure to create.
Once again, the market is chaotic. Way too many players, nobody’s making money, it’s early in this industry formation. Who’s going to win?
And against that, we’re going to solve the fundamental dilemma.
We’re going to allow the infrastructure folks to have an infrastructure that enables a container world.
We’re going to solve this dilemma of operations, and to uniquely allow customers to say yes, to containers, to their developer teams.
We are uniquely positioned to make containers enterprise-ready.
And between VIC (our VMware Integrated Containers) and Photon, an all-in, purpose-built stack, we are the company to bridge those two worlds and deliver an enterprise ready platform for a container-oriented world.
We’re going to partner deeply with Pivotal and other key technologies in the space. We love containers.
Driving Alignment: Customer Strategic Priorities and VMW Vision
--Always start with the customer strategic IT priorities – 4 areas of priority for the IT teams we serve...
--Tight alignment between customer priorities and VMW vision