This document provides an overview of PCM, Inc. and their services. PCM is a Fortune 1000 IT solutions provider celebrating 30 years in business. They provide mobile, cloud, security, and digital transformation services to both public and private sector customers worldwide. Their strategy focuses on mobile first, cloud first, and security first solutions delivered by their teams of account managers, engineers, and professional services specialists.
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...Dell EMC World
Are you looking for an object store for cloud-native applications? Or do you want to archive, backup, or tier data to the cloud? Attend this session to learn about how Virtustream Storage Cloud supports cloud apps, and works with cloud enablers such as EMC CloudArray, CloudBoost, and CloudPools to move data to secure, scalable, and competitively-priced enterprise-class cloud object storage.
Cendien Cloud Migration Presentation
We migrate your servers to the cloud with no down time and minimal disruption. We help you migrate and manage it for you.
http://cendien.com
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...Dell EMC World
General-purpose public clouds try to be all things to all people. But do you really want to bet your business on them?
Attend this session to learn about Virtustream Enterprise Cloud, designed and built for mission-critical enterprise applications. Transform your entire IT estate with an enterprise-class cloud that’s used by many Fortune 500 and Global 2000 organizations.
CloudOffice is a secure all-in-one solution set combining RapidScale’s four core products and services: Infrastructure as a Service (IaaS), Disaster Recovery as a Service (DRaaS), Desktop as a Service (DaaS), and Hosted Microsoft Exchange.
We can package your business applications and add them to your CloudOffice. Your employees will be working in an enterprise-grade environment that is controlled and monitored 24x7x365. Additionally, all your data will be backed up in the cloud securely. With RapidScale's CloudOffice, you will have solutions that support collaboration and mobile workforces from any device, with any app, anywhere. It is the future of IT.
Microsoft Office 2010 offers flexible and powerful new ways to deliver your best work - at the office, at home, or at school.
Hosted Exchange enables you to communicate using business-grade email while eliminating the need to upgrade and maintain a physical Exchange server. Archiving and encryption services are available for compliance and security purposes. Tailor your solutions based on your unique needs and ensure that your communications are always available. You remain in control.
Unlike many competitive products, CloudOffice was built on a multi-tenanted Geo Load Balanced Active/Active architecture. This unique design offers several benefits to its end users but most importantly means that customers’ virtual environments are built redundantly upon one another creating the ultimate design in Disaster Recovery and Business Continuity.
RapidScale's consistent hardware refresh cycles ensure that customers’ applications are running on reliable maintained equipment at all times. Services are built in geographically redundant data centers, so if a primary site goes offline, the secondary site will initiate and users will be routed to that site. CloudOffice is a reliable and secure way to store data and clients will experience the latest technology with exceptional data protection.
RapidScale's CloudOffice product replaces a client’s physical IT infrastructure by moving all the customer applications to the Cloud. This eliminates the need for the client’s IT team to maintain and support the physical hardware. This will also minimize the workload on the customer’s finance department regarding the procurement of IT hardware and associated maintenance contracts.
At the infrastructure level, CloudOffice is fully backed by Active Directory architecture to simplify the deployment of user accounts. With our front-end control panel, even non-technical clerical and HR workers have the ability to easily spin up user accounts and provision users with a Desktop, Mailbox, Applications, and File Permissions in one fluid and smooth process using a “next, next, finish” procedure. Built on the same technology as our CloudDesktop platform, rich HD graphics and a seamless end user experience are just a few of the front facing benefits of our CloudOffice product offering.
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...Dell EMC World
Are you looking for an object store for cloud-native applications? Or do you want to archive, backup, or tier data to the cloud? Attend this session to learn about how Virtustream Storage Cloud supports cloud apps, and works with cloud enablers such as EMC CloudArray, CloudBoost, and CloudPools to move data to secure, scalable, and competitively-priced enterprise-class cloud object storage.
Cendien Cloud Migration Presentation
We migrate your servers to the cloud with no down time and minimal disruption. We help you migrate and manage it for you.
http://cendien.com
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...Dell EMC World
General-purpose public clouds try to be all things to all people. But do you really want to bet your business on them?
Attend this session to learn about Virtustream Enterprise Cloud, designed and built for mission-critical enterprise applications. Transform your entire IT estate with an enterprise-class cloud that’s used by many Fortune 500 and Global 2000 organizations.
CloudOffice is a secure all-in-one solution set combining RapidScale’s four core products and services: Infrastructure as a Service (IaaS), Disaster Recovery as a Service (DRaaS), Desktop as a Service (DaaS), and Hosted Microsoft Exchange.
We can package your business applications and add them to your CloudOffice. Your employees will be working in an enterprise-grade environment that is controlled and monitored 24x7x365. Additionally, all your data will be backed up in the cloud securely. With RapidScale's CloudOffice, you will have solutions that support collaboration and mobile workforces from any device, with any app, anywhere. It is the future of IT.
Microsoft Office 2010 offers flexible and powerful new ways to deliver your best work - at the office, at home, or at school.
Hosted Exchange enables you to communicate using business-grade email while eliminating the need to upgrade and maintain a physical Exchange server. Archiving and encryption services are available for compliance and security purposes. Tailor your solutions based on your unique needs and ensure that your communications are always available. You remain in control.
Unlike many competitive products, CloudOffice was built on a multi-tenanted Geo Load Balanced Active/Active architecture. This unique design offers several benefits to its end users but most importantly means that customers’ virtual environments are built redundantly upon one another creating the ultimate design in Disaster Recovery and Business Continuity.
RapidScale's consistent hardware refresh cycles ensure that customers’ applications are running on reliable maintained equipment at all times. Services are built in geographically redundant data centers, so if a primary site goes offline, the secondary site will initiate and users will be routed to that site. CloudOffice is a reliable and secure way to store data and clients will experience the latest technology with exceptional data protection.
RapidScale's CloudOffice product replaces a client’s physical IT infrastructure by moving all the customer applications to the Cloud. This eliminates the need for the client’s IT team to maintain and support the physical hardware. This will also minimize the workload on the customer’s finance department regarding the procurement of IT hardware and associated maintenance contracts.
At the infrastructure level, CloudOffice is fully backed by Active Directory architecture to simplify the deployment of user accounts. With our front-end control panel, even non-technical clerical and HR workers have the ability to easily spin up user accounts and provision users with a Desktop, Mailbox, Applications, and File Permissions in one fluid and smooth process using a “next, next, finish” procedure. Built on the same technology as our CloudDesktop platform, rich HD graphics and a seamless end user experience are just a few of the front facing benefits of our CloudOffice product offering.
Workload Experience Manager (XM) gives you the visibility necessary to efficiently migrate, analyze, optimize, and scale workloads running in a modern data warehouse. In this recorded webinar we discuss common challenges running at scale with modern data warehouse, benefits of end-to-end visibility into workload lifecycles, overview of Workload XM and live demo, real-life customer before/after scenarios, and what's next for Workload XM.
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
Cloudera’s Data Science Workbench (CDSW) is available for Hortonworks Data Platform (HDP) clusters for secure, collaborative data science at scale. During this webinar, we provide an introductory tour of CDSW and a demonstration of a machine learning workflow using CDSW on HDP.
CloudApps is the next generation application purchasing and licensing management
platform for business. CloudApps connects businesses with the applications they want
while eliminating licensing management and application upgrades.
With RapidScale's CloudApps we can implement, manage and support almost any business application in our cloud. This is a growing trend and a proven ROI for businesses looking to stay compliant and up today on their business applications.
Let RapidScale’s CloudIntelligence team to design the right application business flow for your business. Today we offer some of the most commonly used business applications like QuickBooks, Microsoft Office, Mozilla Firefox, Microsoft Visio, Google Chrome and many more commonly used business applications.
MT155 Analytics and Cloud Native Apps – Your Business Game ChangerDell EMC World
Data analytics provides the opportunity for organizations to digitally transform their business and outperform their rivals. However, many organizations struggle with deriving value from data insights and operationalizing them back into the business. Pairing data analytics with cloud native apps development offers the potential to take the customer experience and your business to new levels. Cloud native apps are built on the concept of a continuous delivery of micro-services, allowing updates to be made quickly and often, for constant refinement of the customer experience. In this session, we will discuss how we can help you radically transform your organization into an insights-driven business.
RapidScale recognizes the need for compliance with the various laws and regulations across different industries. We have established our data encryption, protocols, and procedures to follow the top compliances and ensure that customer data remains secure and confidential.
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud InfrastructureNetApp
The hyper converged infrastructure (HCI) market is entering a new phase of maturity. A modern HCI solution requires a private cloud platform that integrates with public clouds to create a consistent hybrid multi-cloud experience.
During this webinar, NetApp and an IDC guest speaker covered what led to the next generation of hyper converged infrastructure and which five capabilities are required to go from hyper converged to hybrid cloud infrastructure.
EZ Cloud Connect from Tata Tele Business Services (TTBS) is designed to address these concerns and offers businesses a one-stop solution that, along with eliminating multiple-entry interaction is SLA-compliant and easily operable.
Are you actively using or moving to Office 365, G-Suite, or other popular cloud applications? If so, how confident are you that you can keep all of that critical data protected? Attend this session to learn how Veritas can help protect data across all of your different cloud applications--using the same solution you use to protect your existing non-cloud applications. Don't miss this opportunity to explore the advantages of using one unified solution to protect all of your data--across all of your physical, virtual, and cloud environments.
January 2015 Webinar - Wins and Successes from 2014RapidScale
RapidScale shares some of its biggest cloud wins and successes from 2014. RapidScale identifies the core problems and presents a solution to see winning business results for businesses.
According to IDC “By 2020, consumption-based procurement in data centers will have eclipsed traditional procurement. Reducing waste, risk, and cost are goals of every IT organization. But because it’s hard to predict how much capacity you might need, the traditional model of purchasing infrastructure upfront often results in provisioning capacity that’s too high or too low. By moving to a consumption-based Infrastructure as a Service (IaaS) model and eliminating over provisioning, Forrester found that HPE customers experienced a 30% savings. At this dinner you'll hear how you can utilize HPE GreenLake consumption services to save IT costs while maintaining in-house control of mission-critical workloads and creating a usage based on-site compelling on-premises cloud experience.
RapidScale's CloudRecovery service is about planning and designing your business’ Recovery Time Objectives (RTO) around each application. We provide cost effective high density and low density storage and complete Disaster Recovery as a Service solutions for automatic failover.
Disaster Recovery as a Service works by first securely safeguarding your data in our Cloud. Our recovery and de-duplication testing allows us to have the fastest Recovery Time Objective (RTO) in the industry, Our Disaster Recovery and Business Continuity solutions will secure your business data and ensure minimal downtime in the event of a disaster. Keep your business applications and data safe and accessible at all times with RapidScale's CloudRecovery.
RapidScale's Tier 3, Class 1 data centers feature on-premises security guards, an exterior security system, biometric systems, and continuous digital surveillance and recording. We meet and exceed standards such as HIPAA, PCI compliance, and the majority of other government security standards.
Replication to cloud virtual machines can be used to protect both cloud and on-premises production instances. In other words, replication is suitable for both cloud-VM-to-cloud-VM and on-premises-to-cloud-VM data protection. For applications that require aggressive RTO and recovery point objectives (RPOs), as well as application awareness, replication is the data movement option of choice.
Traditional disaster recovery solutions are expensive and inefficient. With the lowest total cost of ownership in the industry, you do not need to let a low budget get in the way of safeguarding and recovering your data. You do not have to be an enterprise-size business to receive the cloud’s protection effectively.
RapidScale helps to eliminate upfront costs while saving money on pricey equipment and maintenance with CloudRecovery. With our pay-as-you-go plan, pay for what you use and experience a service that is scalable according to your needs.
RapidScale's CloudIntelligence team will listen to your business needs and design the right Disaster Recovery as a Service plan for your business. RapidScale offers a 100% uptime guarantee.
Our Cloud Recovery product set is backed by one of the most advanced Storage Area Network systems in the industry, NetApp. With its own proprietary file system and fiber channel network, our SAN’s offer some of the best performance and redundancy available. Our RAID configurations ensure a fault tolerance of no less than two disks which offers one of the highest levels of availability while still offering blazing performance. After failing over to the cloud, you will wonder why you hadn't migrated sooner.
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...Dell EMC World
Separate the hype from the reality of Cloud in HPC.
Building upon our Dell EMC HPC Portfolio, come deep dive into Dell’s hybrid cloud model for HPC. Built on private and public cloud models, Dell EMC's Hybrid HPC Cloud Solutions can help you optimize your CapEx and OpEx costs, while creating a flexible computing environment that adapts to dynamic HPC workloads, while ensuring resource availability. Maximize your RoI through a Hybrid HPC Cloud that enables your innovation and competitiveness.
The complexity of the digital ecosystem is taxing your web publishing
department. As websites evolve to support business-critical
applications, and content becomes richer, you’re being asked to
publish on more digital devices, platforms, and channels, in more
geographies and languages, on behalf of ever-more demanding
Marketers and other corporate stakeholders.
The requests are unpredictable and complex, the timeframes unrealistic,
the production volumes erratic, and some of the work requires
very specific technology your team isn’t trained on.
Customer-First Focus: The Path to Hypergrowthsaastr
Join Sarika Khanna, CPO of Medallia Strikedeck and Ash Nangia, VP of Customer Success of Hashi Corp to learn how following your customers' journeys and leading with customer success can pave the path to hyper scaling.
Workload Experience Manager (XM) gives you the visibility necessary to efficiently migrate, analyze, optimize, and scale workloads running in a modern data warehouse. In this recorded webinar we discuss common challenges running at scale with modern data warehouse, benefits of end-to-end visibility into workload lifecycles, overview of Workload XM and live demo, real-life customer before/after scenarios, and what's next for Workload XM.
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
Cloudera’s Data Science Workbench (CDSW) is available for Hortonworks Data Platform (HDP) clusters for secure, collaborative data science at scale. During this webinar, we provide an introductory tour of CDSW and a demonstration of a machine learning workflow using CDSW on HDP.
CloudApps is the next generation application purchasing and licensing management
platform for business. CloudApps connects businesses with the applications they want
while eliminating licensing management and application upgrades.
With RapidScale's CloudApps we can implement, manage and support almost any business application in our cloud. This is a growing trend and a proven ROI for businesses looking to stay compliant and up today on their business applications.
Let RapidScale’s CloudIntelligence team to design the right application business flow for your business. Today we offer some of the most commonly used business applications like QuickBooks, Microsoft Office, Mozilla Firefox, Microsoft Visio, Google Chrome and many more commonly used business applications.
MT155 Analytics and Cloud Native Apps – Your Business Game ChangerDell EMC World
Data analytics provides the opportunity for organizations to digitally transform their business and outperform their rivals. However, many organizations struggle with deriving value from data insights and operationalizing them back into the business. Pairing data analytics with cloud native apps development offers the potential to take the customer experience and your business to new levels. Cloud native apps are built on the concept of a continuous delivery of micro-services, allowing updates to be made quickly and often, for constant refinement of the customer experience. In this session, we will discuss how we can help you radically transform your organization into an insights-driven business.
RapidScale recognizes the need for compliance with the various laws and regulations across different industries. We have established our data encryption, protocols, and procedures to follow the top compliances and ensure that customer data remains secure and confidential.
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud InfrastructureNetApp
The hyper converged infrastructure (HCI) market is entering a new phase of maturity. A modern HCI solution requires a private cloud platform that integrates with public clouds to create a consistent hybrid multi-cloud experience.
During this webinar, NetApp and an IDC guest speaker covered what led to the next generation of hyper converged infrastructure and which five capabilities are required to go from hyper converged to hybrid cloud infrastructure.
EZ Cloud Connect from Tata Tele Business Services (TTBS) is designed to address these concerns and offers businesses a one-stop solution that, along with eliminating multiple-entry interaction is SLA-compliant and easily operable.
Are you actively using or moving to Office 365, G-Suite, or other popular cloud applications? If so, how confident are you that you can keep all of that critical data protected? Attend this session to learn how Veritas can help protect data across all of your different cloud applications--using the same solution you use to protect your existing non-cloud applications. Don't miss this opportunity to explore the advantages of using one unified solution to protect all of your data--across all of your physical, virtual, and cloud environments.
January 2015 Webinar - Wins and Successes from 2014RapidScale
RapidScale shares some of its biggest cloud wins and successes from 2014. RapidScale identifies the core problems and presents a solution to see winning business results for businesses.
According to IDC “By 2020, consumption-based procurement in data centers will have eclipsed traditional procurement. Reducing waste, risk, and cost are goals of every IT organization. But because it’s hard to predict how much capacity you might need, the traditional model of purchasing infrastructure upfront often results in provisioning capacity that’s too high or too low. By moving to a consumption-based Infrastructure as a Service (IaaS) model and eliminating over provisioning, Forrester found that HPE customers experienced a 30% savings. At this dinner you'll hear how you can utilize HPE GreenLake consumption services to save IT costs while maintaining in-house control of mission-critical workloads and creating a usage based on-site compelling on-premises cloud experience.
RapidScale's CloudRecovery service is about planning and designing your business’ Recovery Time Objectives (RTO) around each application. We provide cost effective high density and low density storage and complete Disaster Recovery as a Service solutions for automatic failover.
Disaster Recovery as a Service works by first securely safeguarding your data in our Cloud. Our recovery and de-duplication testing allows us to have the fastest Recovery Time Objective (RTO) in the industry, Our Disaster Recovery and Business Continuity solutions will secure your business data and ensure minimal downtime in the event of a disaster. Keep your business applications and data safe and accessible at all times with RapidScale's CloudRecovery.
RapidScale's Tier 3, Class 1 data centers feature on-premises security guards, an exterior security system, biometric systems, and continuous digital surveillance and recording. We meet and exceed standards such as HIPAA, PCI compliance, and the majority of other government security standards.
Replication to cloud virtual machines can be used to protect both cloud and on-premises production instances. In other words, replication is suitable for both cloud-VM-to-cloud-VM and on-premises-to-cloud-VM data protection. For applications that require aggressive RTO and recovery point objectives (RPOs), as well as application awareness, replication is the data movement option of choice.
Traditional disaster recovery solutions are expensive and inefficient. With the lowest total cost of ownership in the industry, you do not need to let a low budget get in the way of safeguarding and recovering your data. You do not have to be an enterprise-size business to receive the cloud’s protection effectively.
RapidScale helps to eliminate upfront costs while saving money on pricey equipment and maintenance with CloudRecovery. With our pay-as-you-go plan, pay for what you use and experience a service that is scalable according to your needs.
RapidScale's CloudIntelligence team will listen to your business needs and design the right Disaster Recovery as a Service plan for your business. RapidScale offers a 100% uptime guarantee.
Our Cloud Recovery product set is backed by one of the most advanced Storage Area Network systems in the industry, NetApp. With its own proprietary file system and fiber channel network, our SAN’s offer some of the best performance and redundancy available. Our RAID configurations ensure a fault tolerance of no less than two disks which offers one of the highest levels of availability while still offering blazing performance. After failing over to the cloud, you will wonder why you hadn't migrated sooner.
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...Dell EMC World
Separate the hype from the reality of Cloud in HPC.
Building upon our Dell EMC HPC Portfolio, come deep dive into Dell’s hybrid cloud model for HPC. Built on private and public cloud models, Dell EMC's Hybrid HPC Cloud Solutions can help you optimize your CapEx and OpEx costs, while creating a flexible computing environment that adapts to dynamic HPC workloads, while ensuring resource availability. Maximize your RoI through a Hybrid HPC Cloud that enables your innovation and competitiveness.
The complexity of the digital ecosystem is taxing your web publishing
department. As websites evolve to support business-critical
applications, and content becomes richer, you’re being asked to
publish on more digital devices, platforms, and channels, in more
geographies and languages, on behalf of ever-more demanding
Marketers and other corporate stakeholders.
The requests are unpredictable and complex, the timeframes unrealistic,
the production volumes erratic, and some of the work requires
very specific technology your team isn’t trained on.
Customer-First Focus: The Path to Hypergrowthsaastr
Join Sarika Khanna, CPO of Medallia Strikedeck and Ash Nangia, VP of Customer Success of Hashi Corp to learn how following your customers' journeys and leading with customer success can pave the path to hyper scaling.
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
Delivering IT services that keep the business running from day to day is always challenging. Delivering these services while simultaneously moving your IT infrastructure to the cloud can be almost impossible without the right tools and support. Attend this session to hear directly from leaders at Dell who specialize in application management and learn how Dell migration tools and services accelerate your move to the cloud while maintaining the high quality access to web and mobile services that your users demand.
The Digital Group (T/DG), is a Global Information Technology, Services and Consulting Company. We deliver solutions that enable our clients to run their business efficiently.
We are a niche organization providing IT and IT enabled Business Transformation & Consulting services in Analytics, Enterprise Applications, Engineering Services with future focus on Cognitive Systems, Smart Devices, Man-Machine Interface, Next-Generation Application Architecture and Software Defined Everything for our local, regional and global companies
It’s not Magic we lead the Transformation Movement, its by Design. | Scott Wells – Dell EMC Systems Consultant | Ivan Levendyan – Titanium Partner Systems Engineer
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
#PCMVision Customer Day Presentation Slides
1. WELCOME TO PCM’s
Alan Lawrence
President – PCMG-G
Public Sector
Bob Bogle
Senior Vice President
Field Sales West
2. INVESTMENTS TO SUPPORT ACCOUNT MANAGER AND CUSTOMERS
CUSTOMER
Face to Face
Phone
Digital
Mobile
ACCOUNT
MANAGER
Business
Development
Managers
Engineers &
Pre-Sales
Support
Professional
Services
Managed Services
Microsoft &
Software
Service Delivery
Advanced & Field
STRATIFORM
(Security & Cloud)
3. MISSION FIRST
• Serving the needs of Public Sector
Customers Worldwide for Nearly 30 Years
• Federal Government (DoD, Civilian,
Advanced Programs)
• State and Local
• Education (K-12 and Higher Ed)
• System Integrators
• Combine Commercial Products from leading
Technology Manufacturers with Certified
Engineer and Integration Service to Tailor
Solutions for Each Customer
• Wide Range of Federal, State and Local, and
Contract Vehicles
• Dedicated, Certified Acquisition and
Program Management Team
4. 2017 marked a major milestone for PCM
We're celebrating 30 years as a trusted IT solutions provider!
We started in garage and now a Global Fortune 1000
IT Solutions and Services Provider
6. MOBILE, CLOUD AND SECURITY
DIGITAL TRANSFORMATION IS NOW AN IMPERATIVE
7. WHO IS PCM?
MOBILE FIRST
We live in a world of mobile technology but it’s not the
technology that’s Mobile it’s the users. We assist customers with
custom solutions in multiple form factors with unique
applications, securely, with a complete managed experience.
CLOUD FIRST
An agnostic cloud approach to understanding a customers unique
business and technical requirements leveraging our assess,
implement, manage and enhance methodology to insure a
seamless journey to the clouds.
SECURITY FIRST
A complete security methodology assessing security requirements,
threat areas, business risk leveraging best of breed security
technologies with the governance and processes to implement a
comprehensive security architecture, identifying controls with the
governance to manage them, and the capacity to remediate
threats as the landscape changes.
A HOLISTIC, COMPREHENSIVE SOLUTION COMPANY
8. MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
Workforce
Anywhere
• Any device – Anywhere
• High, low and no touch
options to transact your
business
• Secure access to data
• Pocket to cloud
enablement
• Fleet and contingent
workforce solutions
Product
Development
• Tailored for customer
experience
• Application accessibility
• Customized solutions
• Custom packaging and
delivery
• Program management
• Data acquisition for
analytics
Support
Everywhere
• Customer experience
driven
• Multi-lingual support
• Global field services
• Warehousing
• Depot options
• Disposal solutions
• Full asset management
9. MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
All Rights Reserved for Customer Owned Images
10. Don't worry about which Cloud partner provides your business with
the best options. PCM partners with all of todays leading public
cloud providers to design a solution that fits your business best.
We also integrate with your premise private cloud solution.
Transformation
Methodology
Ongoing
Customer
Success
Solution
Focused
PCM Cloud
Strategy
FOUNDATION OF THE
PCM CLOUD STRATEGY
Platform and
Partners
FOCUSED ON HYBRID
Your Cloud
11. The PCM Complete for Cloud program gives every customer
access to the Transformational Services, tools and resources
needed at every step of the solution lifecycle.
Assess
• Envisioning Sessions
• Solution Assessments
• Plan & Roadmap
Implement
• Migration Services
• Deployment Services
• Adoption Services
Enhance
• Cloud Advisors
• Cloud Residents
Ongoing
Customer
Success
Solution
Focused
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Manage
• Straticare Support
• Change Management
• 24/7 Operations
FOUNDATION OF THE
PCM CLOUD STRATEGY
12. FOUNDATION OF THE
PCM CLOUD STRATEGY Ongoing
Customer
Success
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Solution Alignment
• Collaboration and Productivity – Modern Workplace
• Data Center Transformation, Business Continuity,
Storage, Application Migration- Modern Infrastructure
• Data Visualization, and usage -Modern Data
• Top ERP solutions available as a Service
Solution
Focused
13. Cloud Resident
For customer deploying cloud based solutions –
90 day Architect on-site to assist select clients with
transitioning to the cloud with multiple disciplines.
Cloud Advisor –Regular monthly engagement with client
to help drive business initiatives with cloud technology.
Cloud Advisor
New Roles | New Focus
Managed Hybrid Cloud Support
FOUNDATION OF THE
PCM CLOUD STRATEGY
Transformational
Methodology
Platforms and
Partners
Solution
Focused
PCM Cloud
Strategy
FOCUSED ON CUSTOMER SUCCESS &
AN ENHANCED EXPERIENCE
Ongoing
Customer
Success
14. SECURITY FIRST
FOCUSED ON HELPING COMPANIES AT EVERY STAGE
Manage Security
Environment
Determine Current &
Target Scale
Assessment Security
Requirements
Communicate & Execute
your Roadmap
Develop Improvement
Plans
15. RIGHT NOW
For more information please contact your Account Representative or
Stephen.Moss@pcm.com Herb.Hogue@pcm.com Robert.Hall@pcm.com
today for Your Right Now solution.
Mobile
CloudSecure
43. RIGHT NOW
SVP of Security Practice
Tuesday, November 6, 2017
Gary Miglicco
44.
45. WRAP UP
SVP/GM of Inside Sales
Monday, November 6, 2017
Keith Joseph
46. Platinum & Gold Partner
Breakout sessions
Tech Expo 2:00-5:30
Cocktail Reception &
Attendee Gift Distribution
UP NEXT
Editor's Notes
VIDEO NEXT SLIDE
Describe how your childhood influenced you and set you out on this journey
Often alone due to parents being busy
Obsession with puzzles, games and video games that were challenged.
At the end of the day, you just like solving problems and creating solutions to challenges
Anecdote about his father giving him his first computer
Go into detail about
How many hours you spent on the computer
Talk about your fathers office and entertaining yourself with the computer
What it felt like
Why you liked it so much
What were the first things you did on the computer
Describe your first time on the internet
Who introduced you, where you were, why you went on there in the first place
Your initial thoughts
And how your activities on the internet evolved
Describe your humble beginnings,
Your first exploits, the inspiration the results
Your evolution in skill and the escalation of the severity of the hacking
I was recruited my Russia’s top hacking group… a world reowned group called TNT
Described how you were recruited
What those first conversations were like
Was there an initiation process, what was it?
what happened next
I was recruited my Russia’s top hacking group… a world renound group called TNT
Described how you were recruited
What those first conversations were like
Was there an initiation process, what was it?
what happened next
Here’s the actual code that MafiaBoy used in his attack. Can we put this on an old school computer with some like weird ass coder looking font/treatment?
Tools Used:
Trinoo
IMP.C
TF2k
Stacheldraht
Describe what people are looking at and then in great detail explain the attack
The idea/inspiration
How you picked the targets
How you did it
Who the targets were (name 4-5)
Did anyone in your personal life know you were going to do it
Where you were
How it felt
You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered.
Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety.
People began to sell and my targets scrambled to regain credibility but it was too late.
It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected.
CLICK
You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered.
Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety.
People began to sell and my targets scrambled to regain credibility but it was too late.
It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected.
CLICK
Things to touch on:
Family/friend reaction
Juvenile detention
Being released from Juvenile detention at reintegrating into society
Reference the trailer – As I mentioned in the video a hacker’s arsenal is much more sophisticated today and so are their motivations.
The first is the institutionalization of hacking.
When I was hacking, it was about Exploration, pushing the status quo circumventing preset parameters – those motivations are still there but there is a completely different set of threats impacting organizations like yours.
Today, it’s about Financial Gain, Ideology, Politics and Entertainment and these groups are much different from ones like I was a part of like TNT
Today, they are often state sponsored, numbered businesses, organizations whose reputation is build on their ability to get results.
These grandiose motivations, highly evolved collectives of talent hackers, you gets grandiose and complex attacks.
Although everyone in this room is very cognizant of the threats that exist online – that every email, every link, every attachment is a potential threat – the truth of the matter is, we are the minority.
Everyone organization that is represented in this room is made up almost entirely of employees who don’t think in terms of risk, who don’t see themselves as the target and act first and think later.
65% of all breaches happen from internal – people can’t resist.
I know for a fact that this is what keeps you up at night.
Those are the obvious examples but let me tell you about one of the more sophisticated social engineering tactics I’ve employed as a pen tester:
Tell Car/Train story
Thankfully for that client, this was only a test. But let me tell you about one of the most devastating attacks that came as the result of a simple phishing scam that shook the foundation of a multi-billion dollar company
The internet of things revolution has made devices smarter, it’s made our lives easier but it’s also made us more susceptible than ever before to cyber attacks.
And as more and more devices are added to our networks the time, energy and resources you’re able to dedicate to securing them is drawn thinner and thinner.
For the last several years, we’ve been focused on securing the truly mobile devices that scale across our organizations: smart phones, tablets and laptops.
I like to think of the analogy of focusing 90% of your efforts on those devices is like locking the front and back doors.
The problem for organizations though is….
CLICK
Hackers come through the pipes.
While we’re talking about end points within this context, let’s dissect one in particular that is often overlooked but a huge red herring for many organizations.
CLICK
A few questions for the room: how many printers does your organization have in your fleet?
If you asked any of the employees in your organization – do you think they would have a sense of what kind of information flows through your company printer every day? I am willing to bet, because I’ve had these conversations – the general perception is that printers are purely an output device, and aside from rare chance of paper being stolen from the tray – they aren’t a risk.
We all know that if that printer is connected to the company network, that’s not true.
CLICK
What security protocols are currently managing your printer fleet? If you don’t know the answer or if the answer isn’t a robust list. Let me ask you:
if you suffered a breach through one of your printers.. would you know it happened and how long would it take you to find the breach?
CLICK
So we know hackers are looking for entry points to your organization that function more like pipes than front and back doors.
And you have a fleet of printers that may not be overly secure.
Ask yourself, can your organization stand to have a blind spot that large?
I can tell you as someone who has been on both sides of this battleground between IT and cyber criminals that you cannot.
CLICK
Today, I work as a security consultant and penetration tester and as a result, I’ve heard the security spiel from every major technology company.
And, I’ve also seen how exposed many of those companies are leaving their customers.
We all see daily news headlines about data breaches and hacking, so of course technology companies will tout security as a product feature, but are they really bringing it to the core of their offering and bringing it across devices? In my experience, many are not.
As more and more connected PCs, Printers and other devices flood our networks and more and more data goes in transit, IT departments are scrambling to keep up – and the truth us, they can’t do it by themselves – they need help.
And that’s really what inspired me to begin working with HP.
They aren’t just talking the talk, they’re walking the walk. I’ve had the opportunity to work with the HP labs team, and peak underneath the hood and can tell you that whether it’s PC or Print – HP is delivering best in class security solutions, at the device level – the sort of security based-automation and protection that today’s businesses need to ensure they’re protected, at all times.
But what do I mean about building in security technology at the device level?
CLICK
Security at the Firewall level, isn’t enough – because of extremely sophisticated attacks that are now happening below the firmware.
On the PC side of things, let’s look at HPSureStart for example which protects against those attacks below firmware, at the BIOS level. SureStart protects against the attacks targeting the millions of lines of code before your operating system boots up and the firewall has an opportunity to engage and protect you. SureStart ensures that you’re protected from the moment you hit that power button. I can’t tell you how many end-users are being saved on a daily basis by features like this – amazing stuff.
CLICK
In terms of Print, let’s examine just one example of the tremendous enhancements in print security technology HP has championed.
HP Runtime Intrusion Detection which constantly analyzes for malware attacks and any other inconsistencies. Sounds standard right?
Well, what truly sets Runtime Intrusion Detection apart is its ability to identify, delete, self-heal and then reboot, automatically without the need for a service call.
What IT department that you know of wouldn’t benefit from this self-detection and healing technology, it’s precisely to kind of safety nets today’s employees need to ensure they aren’t making mistakes online that could cost a business millions, without even knowing it.
CLICK
Today, we’ve discussed my story, and how much hacking has changed. The motivation, the techniques, the perpetrators and even the targeted devices.
We talked about how IT departments are often being tasked to do more with less – a difficult mandate when you consider the huge proliferation of sophisticated devices that are joining company networks everyday.
And finally, we discussed what HP is doing to help the IT department shore up the defense against cyber-attacks at the device level, to create the layers of security required to protect your devices and provide the modern IT department with the necessary safety nets and detection protocol to act with quickness and efficiency when attacks do happen.
I urge all of you to re-assess what is being done at the organizational, individual employee and device level to protect yourselves, before it’s too late.
Thank you.