Business & IT: From Infrastructure to People
Business and IT Realities Always on communications Confidential communications Global Infrastructures Duplicate systems Complexity is growing Compliance is critical
Green IT Security & Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization  Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
Communications Landscape: The Reality Latency Content/Context Batch Real-Time Bulk Transactional Documents Messages >80% of data movement today is by file exchange  80% of the data movement remains unmanaged The primary method of multi-enterprise integration will continue to be file exchange   Only about one-seventh of all healthcare transactions are processed electronically today. Meta Group / Gartner
The Impact: Communications Chaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
1: MFT Ain’t Just for Technologist MFT requirements don't just come from the data center. They also come from  users  who need to send files in an ad hoc fashion to support  collaboration and compliance .
Where’s your data? FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to  responsibly conduct business . iPhone's  problems concerns a new  SMS vulnerability  that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and  virtual eavesdropping . Current industry  standards do not place emphasis on security ; information is transferred in  plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
2. Modernization isn’t Only a Platform Decision IT modernization initiatives and the underlying  scheduling and communication foundations  should also be modernized.
Modernization is about Extending Value
The modernizing automating communication improves… Customers service Project document reviews Contracts and agreements Personal Healthcare Info Strategic planning Product Design timelines Governmental filings Insurance claims Operations Processes Integration Visibility Compliance Reporting Workflows Service Levels Costs Revenue
3. IT is the bottleneck! The speed of business requires business focused solutions which require less  IT assistance for provisioning and ongoing demand management
One size does not fit all Business processes and people have different requirements and capabilities
Users Think Out of the IT Box For Communications and File Exchange
Users have Options that don’t require IT or Budget authorization!
 
It won’t happen to me….  The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999.  2.1M  patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006.  Hospital employee sells  50K  patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet.  Insurer leaves  130K  records unsecured
4. Compliance drives Value IT and business compliance are rapidly merging. The  impact of audits  and operations require effective governance & security for file transfer
Changing Processes It’s about continued compliance and improved agility, not technology
Changing Healthcare Compliance Security Rules Apply Directly to Business Associates Stricter PHI Management Requirements Electronic Healthcare records Required HSS Audits
TARP
5. Process is as Process Does Centralized secure file transfer disciplines and technologies to manage  end-to-end business processes  is required on-premises, for software as a service, outsourcing or in the cloud.
Where’s your file? Multiple Platforms & Tools = Complexity
Connections are EVERYWHERE! Infrastructure, Files and People
Unified Communications: Processes, Payloads & People
A Single Platform for Platforms Payload and People Processes Data Centers Application Integration Expert Systems People Messaging Ad-hoc Exchange Flexible Deployment Payload Security Encryption Data exchange Expert Data Management INDESCA INFITRAN Scribbos
So what are you going to do?
One size does not fit all Different capabilities, scale and value
Benefits of Strategic MFT Approach Secure Communications Customers, Outsourced Services, Partners Improved Service Levels Automated workflows Improved compliance Corporate (Internal controls/audits, security, sustainability) Governmental (SOX, Basel II, HIPAA…) Security Enforcement Process level governance Content and session encryption Improved visibility and control Process status Exceptions Transactions and Trends
Benefits of a Centralized Solution Legacy Emerging Single Operational Environment Policy Definition Run-time Enforcement Single Governance Environment Single Repository Rules based notifications Better  Audit Capability User access Encryption Better Corporate Security
Questions? Please use the chat features of the webinar

Securing Business: Strategic Enablement of Users

  • 1.
    Business & IT:From Infrastructure to People
  • 2.
    Business and ITRealities Always on communications Confidential communications Global Infrastructures Duplicate systems Complexity is growing Compliance is critical
  • 3.
    Green IT Security& Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
  • 4.
    Communications Landscape: TheReality Latency Content/Context Batch Real-Time Bulk Transactional Documents Messages >80% of data movement today is by file exchange 80% of the data movement remains unmanaged The primary method of multi-enterprise integration will continue to be file exchange Only about one-seventh of all healthcare transactions are processed electronically today. Meta Group / Gartner
  • 5.
    The Impact: CommunicationsChaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
  • 6.
    1: MFT Ain’tJust for Technologist MFT requirements don't just come from the data center. They also come from users who need to send files in an ad hoc fashion to support collaboration and compliance .
  • 7.
    Where’s your data?FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to responsibly conduct business . iPhone's problems concerns a new SMS vulnerability that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and virtual eavesdropping . Current industry standards do not place emphasis on security ; information is transferred in plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
  • 8.
    2. Modernization isn’tOnly a Platform Decision IT modernization initiatives and the underlying scheduling and communication foundations should also be modernized.
  • 9.
    Modernization is aboutExtending Value
  • 10.
    The modernizing automatingcommunication improves… Customers service Project document reviews Contracts and agreements Personal Healthcare Info Strategic planning Product Design timelines Governmental filings Insurance claims Operations Processes Integration Visibility Compliance Reporting Workflows Service Levels Costs Revenue
  • 11.
    3. IT isthe bottleneck! The speed of business requires business focused solutions which require less IT assistance for provisioning and ongoing demand management
  • 12.
    One size doesnot fit all Business processes and people have different requirements and capabilities
  • 13.
    Users Think Outof the IT Box For Communications and File Exchange
  • 14.
    Users have Optionsthat don’t require IT or Budget authorization!
  • 15.
  • 16.
    It won’t happento me…. The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999. 2.1M patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006. Hospital employee sells 50K patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet. Insurer leaves 130K records unsecured
  • 17.
    4. Compliance drivesValue IT and business compliance are rapidly merging. The impact of audits and operations require effective governance & security for file transfer
  • 18.
    Changing Processes It’sabout continued compliance and improved agility, not technology
  • 19.
    Changing Healthcare ComplianceSecurity Rules Apply Directly to Business Associates Stricter PHI Management Requirements Electronic Healthcare records Required HSS Audits
  • 20.
  • 21.
    5. Process isas Process Does Centralized secure file transfer disciplines and technologies to manage end-to-end business processes is required on-premises, for software as a service, outsourcing or in the cloud.
  • 22.
    Where’s your file?Multiple Platforms & Tools = Complexity
  • 23.
    Connections are EVERYWHERE!Infrastructure, Files and People
  • 25.
  • 26.
    A Single Platformfor Platforms Payload and People Processes Data Centers Application Integration Expert Systems People Messaging Ad-hoc Exchange Flexible Deployment Payload Security Encryption Data exchange Expert Data Management INDESCA INFITRAN Scribbos
  • 27.
    So what areyou going to do?
  • 30.
    One size doesnot fit all Different capabilities, scale and value
  • 31.
    Benefits of StrategicMFT Approach Secure Communications Customers, Outsourced Services, Partners Improved Service Levels Automated workflows Improved compliance Corporate (Internal controls/audits, security, sustainability) Governmental (SOX, Basel II, HIPAA…) Security Enforcement Process level governance Content and session encryption Improved visibility and control Process status Exceptions Transactions and Trends
  • 32.
    Benefits of aCentralized Solution Legacy Emerging Single Operational Environment Policy Definition Run-time Enforcement Single Governance Environment Single Repository Rules based notifications Better Audit Capability User access Encryption Better Corporate Security
  • 33.
    Questions? Please usethe chat features of the webinar

Editor's Notes

  • #6 Overtime things get implemented as one offs --- these one off solutions create a “hairball” of processes and data exchange across systems, data centers and geographies. Not good.
  • #26 Stonebranch simplifies this
  • #27 Just re-iterate tha with the security, monitoring and support for ad-hoc Stonebranch can be a single platform for securing the enterprise and the “people”.