SlideShare a Scribd company logo
Business & IT: From Infrastructure to People
Business and IT Realities Always on communications Confidential communications Global Infrastructures Duplicate systems Complexity is growing Compliance is critical
Green IT Security & Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization  Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
Communications Landscape: The Reality Latency Content/Context Batch Real-Time Bulk Transactional Documents Messages >80% of data movement today is by file exchange  80% of the data movement remains unmanaged The primary method of multi-enterprise integration will continue to be file exchange   Only about one-seventh of all healthcare transactions are processed electronically today. Meta Group / Gartner
The Impact: Communications Chaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
1: MFT Ain’t Just for Technologist MFT requirements don't just come from the data center. They also come from  users  who need to send files in an ad hoc fashion to support  collaboration and compliance .
Where’s your data? FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to  responsibly conduct business . iPhone's  problems concerns a new  SMS vulnerability  that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and  virtual eavesdropping . Current industry  standards do not place emphasis on security ; information is transferred in  plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
2. Modernization isn’t Only a Platform Decision IT modernization initiatives and the underlying  scheduling and communication foundations  should also be modernized.
Modernization is about Extending Value
The modernizing automating communication improves… Customers service Project document reviews Contracts and agreements Personal Healthcare Info Strategic planning Product Design timelines Governmental filings Insurance claims Operations Processes Integration Visibility Compliance Reporting Workflows Service Levels Costs Revenue
3. IT is the bottleneck! The speed of business requires business focused solutions which require less  IT assistance for provisioning and ongoing demand management
One size does not fit all Business processes and people have different requirements and capabilities
Users Think Out of the IT Box For Communications and File Exchange
Users have Options that don’t require IT or Budget authorization!
 
It won’t happen to me….  The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999.  2.1M  patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006.  Hospital employee sells  50K  patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet.  Insurer leaves  130K  records unsecured
4. Compliance drives Value IT and business compliance are rapidly merging. The  impact of audits  and operations require effective governance & security for file transfer
Changing Processes It’s about continued compliance and improved agility, not technology
Changing Healthcare Compliance Security Rules Apply Directly to Business Associates Stricter PHI Management Requirements Electronic Healthcare records Required HSS Audits
TARP
5. Process is as Process Does Centralized secure file transfer disciplines and technologies to manage  end-to-end business processes  is required on-premises, for software as a service, outsourcing or in the cloud.
Where’s your file? Multiple Platforms & Tools = Complexity
Connections are EVERYWHERE! Infrastructure, Files and People
Securing Business: Strategic Enablement of Users
Unified Communications: Processes, Payloads & People
A Single Platform for Platforms Payload and People Processes Data Centers Application Integration Expert Systems People Messaging Ad-hoc Exchange Flexible Deployment Payload Security Encryption Data exchange Expert Data Management INDESCA INFITRAN Scribbos
So what are you going to do?
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of Users
One size does not fit all Different capabilities, scale and value
Benefits of Strategic MFT Approach Secure Communications Customers, Outsourced Services, Partners Improved Service Levels Automated workflows Improved compliance Corporate (Internal controls/audits, security, sustainability) Governmental (SOX, Basel II, HIPAA…) Security Enforcement Process level governance Content and session encryption Improved visibility and control Process status Exceptions Transactions and Trends
Benefits of a Centralized Solution Legacy Emerging Single Operational Environment Policy Definition Run-time Enforcement Single Governance Environment Single Repository Rules based notifications Better  Audit Capability User access Encryption Better Corporate Security
Questions? Please use the chat features of the webinar

More Related Content

What's hot

Task 3
Task 3Task 3
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
Corporate presentation emea slideshare
Corporate presentation emea slideshareCorporate presentation emea slideshare
Corporate presentation emea slideshare
Lembit
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule Playbook
Lumension
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
SHANTO-MARIAM UNIVERSITY OF CREATIVE AND TECHNOLOGY
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
Anne ndolo
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
Parshant Tyagi
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
 
Intranet,extranet& edi mdims
Intranet,extranet& edi mdimsIntranet,extranet& edi mdims
Intranet,extranet& edi mdims
Shafeeq Maipady
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
satyakam_biswas
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
Cloudbells.com
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
gbroadbent67
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
Freeform Dynamics
 
Task 2
Task 2Task 2
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
pabatan
 

What's hot (18)

Task 3
Task 3Task 3
Task 3
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Corporate presentation emea slideshare
Corporate presentation emea slideshareCorporate presentation emea slideshare
Corporate presentation emea slideshare
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule Playbook
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Intranet,extranet& edi mdims
Intranet,extranet& edi mdimsIntranet,extranet& edi mdims
Intranet,extranet& edi mdims
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
 
Task 2
Task 2Task 2
Task 2
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 

Viewers also liked

Slovakia Powerpoint Country
Slovakia Powerpoint CountrySlovakia Powerpoint Country
Slovakia Powerpoint Country
Andrew Schwartz
 
The future of the Adobe Flash platform
The future of the Adobe Flash platformThe future of the Adobe Flash platform
The future of the Adobe Flash platform
Michael Chaize
 
онтологии верхнего уровня
онтологии верхнего уровняонтологии верхнего уровня
онтологии верхнего уровня
Lidia Pivovarova
 
Lou Tulga Transaction Brokerage in NM real estate
Lou Tulga Transaction Brokerage in NM real estateLou Tulga Transaction Brokerage in NM real estate
Lou Tulga Transaction Brokerage in NM real estate
Professional Education Services
 
Back From MAX in London for CQ5 users
Back From MAX in London for CQ5 usersBack From MAX in London for CQ5 users
Back From MAX in London for CQ5 users
Michael Chaize
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the Market
Jon Gatrell
 
Banca Long Tail I Noves TendèNcies
Banca   Long Tail I Noves TendèNciesBanca   Long Tail I Noves TendèNcies
Banca Long Tail I Noves TendèNcies
jalicarte
 
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatokValos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
Daniel Sef
 
Martin karlssons vykortssamling munken och prästgatan
Martin karlssons vykortssamling   munken och prästgatanMartin karlssons vykortssamling   munken och prästgatan
Martin karlssons vykortssamling munken och prästgatan
hembygdsigtuna
 
La3 Computer Network
La3 Computer NetworkLa3 Computer Network
La3 Computer Network
Cma Mohd
 
Knocknarea
KnocknareaKnocknarea
Knocknarea
ichbindanu
 
مناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العموميمناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العمومي
Slim Hmaied
 
AIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 YearsAIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 Years
John Newton
 
Graphics Of The 509
Graphics Of The 509Graphics Of The 509
Graphics Of The 509
guestd37bca
 
你的桶子有多滿
你的桶子有多滿你的桶子有多滿
你的桶子有多滿
nonnon
 
Flex et Php Afup
Flex et Php AfupFlex et Php Afup
Flex et Php Afup
Michael Chaize
 
Ch01
Ch01Ch01
Baker Wedding Slideshow Review
Baker Wedding Slideshow ReviewBaker Wedding Slideshow Review
Baker Wedding Slideshow Review
mattwjohnson
 
LOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/WinterLOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/Winter
Atsushi Nakatsugawa
 

Viewers also liked (20)

Milieu
MilieuMilieu
Milieu
 
Slovakia Powerpoint Country
Slovakia Powerpoint CountrySlovakia Powerpoint Country
Slovakia Powerpoint Country
 
The future of the Adobe Flash platform
The future of the Adobe Flash platformThe future of the Adobe Flash platform
The future of the Adobe Flash platform
 
онтологии верхнего уровня
онтологии верхнего уровняонтологии верхнего уровня
онтологии верхнего уровня
 
Lou Tulga Transaction Brokerage in NM real estate
Lou Tulga Transaction Brokerage in NM real estateLou Tulga Transaction Brokerage in NM real estate
Lou Tulga Transaction Brokerage in NM real estate
 
Back From MAX in London for CQ5 users
Back From MAX in London for CQ5 usersBack From MAX in London for CQ5 users
Back From MAX in London for CQ5 users
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the Market
 
Banca Long Tail I Noves TendèNcies
Banca   Long Tail I Noves TendèNciesBanca   Long Tail I Noves TendèNcies
Banca Long Tail I Noves TendèNcies
 
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatokValos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
 
Martin karlssons vykortssamling munken och prästgatan
Martin karlssons vykortssamling   munken och prästgatanMartin karlssons vykortssamling   munken och prästgatan
Martin karlssons vykortssamling munken och prästgatan
 
La3 Computer Network
La3 Computer NetworkLa3 Computer Network
La3 Computer Network
 
Knocknarea
KnocknareaKnocknarea
Knocknarea
 
مناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العموميمناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العمومي
 
AIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 YearsAIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 Years
 
Graphics Of The 509
Graphics Of The 509Graphics Of The 509
Graphics Of The 509
 
你的桶子有多滿
你的桶子有多滿你的桶子有多滿
你的桶子有多滿
 
Flex et Php Afup
Flex et Php AfupFlex et Php Afup
Flex et Php Afup
 
Ch01
Ch01Ch01
Ch01
 
Baker Wedding Slideshow Review
Baker Wedding Slideshow ReviewBaker Wedding Slideshow Review
Baker Wedding Slideshow Review
 
LOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/WinterLOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/Winter
 

Similar to Securing Business: Strategic Enablement of Users

Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
Jon Gatrell
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Management
jgatrell
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
Luke Arrington
 
Chap001
Chap001Chap001
Chap001
rpvgb
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Zia Consulting
 
Evolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance RegulationsEvolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance Regulations
ISI Telemanagement Solutions Inc.
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture Roadmap
Tamim Rahman
 
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesTurn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Perficient, Inc.
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
Jorge Sebastiao
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
OpenText Information Exchange
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015
ExtraHop Networks
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
Echoworx
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
EstelaJeffery653
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
cravennichole326
 
ePlus Healthcare
ePlus HealthcareePlus Healthcare
ePlus Healthcare
Willie Foerstner
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
Intro.Linkedin.Mar09
Intro.Linkedin.Mar09Intro.Linkedin.Mar09
Intro.Linkedin.Mar09
nlumwilson
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptx
AhimsaBhardwaj
 

Similar to Securing Business: Strategic Enablement of Users (20)

Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Management
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 
Chap001
Chap001Chap001
Chap001
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Evolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance RegulationsEvolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance Regulations
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture Roadmap
 
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesTurn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive Opportunities
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
 
ePlus Healthcare
ePlus HealthcareePlus Healthcare
ePlus Healthcare
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Intro.Linkedin.Mar09
Intro.Linkedin.Mar09Intro.Linkedin.Mar09
Intro.Linkedin.Mar09
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptx
 

More from Jon Gatrell

What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?
Jon Gatrell
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career Roadmap
Jon Gatrell
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your Path
Jon Gatrell
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?
Jon Gatrell
 
What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?
Jon Gatrell
 
Social Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketSocial Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the Market
Jon Gatrell
 
Social Capital Death Match
Social Capital Death MatchSocial Capital Death Match
Social Capital Death Match
Jon Gatrell
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?
Jon Gatrell
 
Social Insights from the Market
Social Insights from the MarketSocial Insights from the Market
Social Insights from the Market
Jon Gatrell
 
Top 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessTop 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand Awareness
Jon Gatrell
 
Social Products Require Social Marketers.
Social Products Require Social Marketers.Social Products Require Social Marketers.
Social Products Require Social Marketers.
Jon Gatrell
 
Top 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailTop 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar Retail
Jon Gatrell
 
No Such Thing As Social Products
No Such Thing As Social ProductsNo Such Thing As Social Products
No Such Thing As Social Products
Jon Gatrell
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product Management
Jon Gatrell
 
Measuring Social Media For B2B
Measuring Social Media For B2BMeasuring Social Media For B2B
Measuring Social Media For B2B
Jon Gatrell
 
Irrational Loss Aversion
Irrational Loss AversionIrrational Loss Aversion
Irrational Loss Aversion
Jon Gatrell
 
Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?
Jon Gatrell
 
Christmas is for Cookies
Christmas is for CookiesChristmas is for Cookies
Christmas is for Cookies
Jon Gatrell
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data Concerns
Jon Gatrell
 
Gartner Influenced by Marketing
Gartner Influenced by MarketingGartner Influenced by Marketing
Gartner Influenced by Marketing
Jon Gatrell
 

More from Jon Gatrell (20)

What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career Roadmap
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your Path
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?
 
What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?
 
Social Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketSocial Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the Market
 
Social Capital Death Match
Social Capital Death MatchSocial Capital Death Match
Social Capital Death Match
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?
 
Social Insights from the Market
Social Insights from the MarketSocial Insights from the Market
Social Insights from the Market
 
Top 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessTop 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand Awareness
 
Social Products Require Social Marketers.
Social Products Require Social Marketers.Social Products Require Social Marketers.
Social Products Require Social Marketers.
 
Top 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailTop 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar Retail
 
No Such Thing As Social Products
No Such Thing As Social ProductsNo Such Thing As Social Products
No Such Thing As Social Products
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product Management
 
Measuring Social Media For B2B
Measuring Social Media For B2BMeasuring Social Media For B2B
Measuring Social Media For B2B
 
Irrational Loss Aversion
Irrational Loss AversionIrrational Loss Aversion
Irrational Loss Aversion
 
Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?
 
Christmas is for Cookies
Christmas is for CookiesChristmas is for Cookies
Christmas is for Cookies
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data Concerns
 
Gartner Influenced by Marketing
Gartner Influenced by MarketingGartner Influenced by Marketing
Gartner Influenced by Marketing
 

Recently uploaded

Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
CEPTES Software Inc
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
July Patch Tuesday
July Patch TuesdayJuly Patch Tuesday
July Patch Tuesday
Ivanti
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
HackersList
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
Google Developer Group - Harare
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
313mohammedarshad
 
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
digitalxplive
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
Brian Pichman
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Figma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdfFigma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdf
Management Institute of Skills Development
 

Recently uploaded (20)

Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
July Patch Tuesday
July Patch TuesdayJuly Patch Tuesday
July Patch Tuesday
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
 
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Figma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdfFigma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdf
 

Securing Business: Strategic Enablement of Users

  • 1. Business & IT: From Infrastructure to People
  • 2. Business and IT Realities Always on communications Confidential communications Global Infrastructures Duplicate systems Complexity is growing Compliance is critical
  • 3. Green IT Security & Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
  • 4. Communications Landscape: The Reality Latency Content/Context Batch Real-Time Bulk Transactional Documents Messages >80% of data movement today is by file exchange 80% of the data movement remains unmanaged The primary method of multi-enterprise integration will continue to be file exchange Only about one-seventh of all healthcare transactions are processed electronically today. Meta Group / Gartner
  • 5. The Impact: Communications Chaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
  • 6. 1: MFT Ain’t Just for Technologist MFT requirements don't just come from the data center. They also come from users who need to send files in an ad hoc fashion to support collaboration and compliance .
  • 7. Where’s your data? FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to responsibly conduct business . iPhone's problems concerns a new SMS vulnerability that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and virtual eavesdropping . Current industry standards do not place emphasis on security ; information is transferred in plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
  • 8. 2. Modernization isn’t Only a Platform Decision IT modernization initiatives and the underlying scheduling and communication foundations should also be modernized.
  • 9. Modernization is about Extending Value
  • 10. The modernizing automating communication improves… Customers service Project document reviews Contracts and agreements Personal Healthcare Info Strategic planning Product Design timelines Governmental filings Insurance claims Operations Processes Integration Visibility Compliance Reporting Workflows Service Levels Costs Revenue
  • 11. 3. IT is the bottleneck! The speed of business requires business focused solutions which require less IT assistance for provisioning and ongoing demand management
  • 12. One size does not fit all Business processes and people have different requirements and capabilities
  • 13. Users Think Out of the IT Box For Communications and File Exchange
  • 14. Users have Options that don’t require IT or Budget authorization!
  • 15.  
  • 16. It won’t happen to me…. The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999. 2.1M patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006. Hospital employee sells 50K patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet. Insurer leaves 130K records unsecured
  • 17. 4. Compliance drives Value IT and business compliance are rapidly merging. The impact of audits and operations require effective governance & security for file transfer
  • 18. Changing Processes It’s about continued compliance and improved agility, not technology
  • 19. Changing Healthcare Compliance Security Rules Apply Directly to Business Associates Stricter PHI Management Requirements Electronic Healthcare records Required HSS Audits
  • 20. TARP
  • 21. 5. Process is as Process Does Centralized secure file transfer disciplines and technologies to manage end-to-end business processes is required on-premises, for software as a service, outsourcing or in the cloud.
  • 22. Where’s your file? Multiple Platforms & Tools = Complexity
  • 23. Connections are EVERYWHERE! Infrastructure, Files and People
  • 26. A Single Platform for Platforms Payload and People Processes Data Centers Application Integration Expert Systems People Messaging Ad-hoc Exchange Flexible Deployment Payload Security Encryption Data exchange Expert Data Management INDESCA INFITRAN Scribbos
  • 27. So what are you going to do?
  • 30. One size does not fit all Different capabilities, scale and value
  • 31. Benefits of Strategic MFT Approach Secure Communications Customers, Outsourced Services, Partners Improved Service Levels Automated workflows Improved compliance Corporate (Internal controls/audits, security, sustainability) Governmental (SOX, Basel II, HIPAA…) Security Enforcement Process level governance Content and session encryption Improved visibility and control Process status Exceptions Transactions and Trends
  • 32. Benefits of a Centralized Solution Legacy Emerging Single Operational Environment Policy Definition Run-time Enforcement Single Governance Environment Single Repository Rules based notifications Better Audit Capability User access Encryption Better Corporate Security
  • 33. Questions? Please use the chat features of the webinar

Editor's Notes

  1. Overtime things get implemented as one offs --- these one off solutions create a “hairball” of processes and data exchange across systems, data centers and geographies. Not good.
  2. Stonebranch simplifies this
  3. Just re-iterate tha with the security, monitoring and support for ad-hoc Stonebranch can be a single platform for securing the enterprise and the “people”.