Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Digital Enterprise 2019

869 views

Published on

MobiCom and the Business Council of Mongolia jointly organized the Digital Enterprise 2019 forum on June 18, 2019.

Published in: Technology
  • Get Instant Access to 12000 SHED PLANS, Download plans now. ➤➤ https://url.cn/sIEM11KJ
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Free Shed Plans, 12000 SHED PLANS. FREE SHED PLANS CLICK HERE ★★★ https://url.cn/B7NWTgCr
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Essay writing is really very hard for students and many students are really stressed to write it. So finding a best essay writing format is not easy. Anyway you can check any essay writing services and they can help you to find a good format to write the essay. I can recommend a site that has helped me. It's called HelpWriting.net Good luck!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Unlock The Universe & Get Answers You Seek Today In Your FREE Tarot Reading. DO THIS FIRST... To get the most out of your tarot reading, I first need you to focus your intention - this concentrates the energy on the universe to answer the questions that you most desire the answers for. Take 10 seconds to think of your #1 single biggest CHALLENGE right now. (Yes, stop for 10 seconds, close your eyes, and focus your energy on ONE key problem) Ready? Okay, let's proceed. ➣➣➣ https://url.cn/gb1VYtIO
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD THE BOOK INTO AVAILABLE FORMAT (New Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { https://soo.gd/irt2 } ......................................................................................................................... Download Full EPUB Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download Full doc Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download PDF EBOOK here { https://soo.gd/irt2 } ......................................................................................................................... Download EPUB Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download doc Ebook here { https://soo.gd/irt2 } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book THE can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer THE is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBOOK .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookBOOK, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, EBOOK, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story THE Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money THE the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths THE Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Digital Enterprise 2019

  1. 1. Promoting growth through innovation Jon Lyons Board Director Business Council of Mongolia Since June 18, 2019 DIGITAL ENTERPRISE 2019
  2. 2. WHAT IS THE BUSINESS COUNCIL OF MONGOLIA? DIGITAL ENTERPRISE 2019 Independent member-based, self-governing, non-profit, non-governmental organization (NGO) – Established in 2007.
  3. 3. DIGITAL ENTERPRISE 2019 BCM PURPOSE Vision To deliver value for the public, the members, and the employees by advocating economic freedom and property rights provided by the Constitution of Mongolia and protecting and promoting the common lawful interests of members for a fair, stable, and internationally competitive business environment. Mission • To equip members with an information platform that provides up-to-date policy and business research, training and knowledge sharing. • To develop and promote economic and sector policy recommendations through engagement with the BCM members, the government and the wider public. • To provide networking and other services that support doing business in Mongolia.
  4. 4. DIGITAL ENTERPRISE 2019 Media / Printing, 9, 4% IFIs and Ios, 12, 5% Tax / Legal / Ethics, 11, 5%Growth & Innovation, 16, 7% Education / Training, 14, 6% Food & Beverages / Hospitality / Light Industry / Rretail / Real Estate, 20, 8%Resources / Environment, 50, 21%Associations & NGOs, 18, 8% Embassies, 25, 11% Government Entities, 10, 4% Energy / Infrastructure / Connectivity / Logistics, 13, 5% Banking / Finance / Capital Market / Insurance, 37, 16% BCM MEMBERS BY SECTOR
  5. 5. DIGITAL ENTERPRISE 2019 BCM ORGANIZATIONAL STRUCTURE & BENEFITS • The highest governing body of the Organization is the Board of Directors (BoD) which consists of 15 member. • Executive Committee (ExCo) is the main operational and monitoring body of the Organization and has 9 members. • 6 Working Groups are functional bodies that optimize the implementation of BCM objectives. 1. POLICY & ADVOCACY 2. NETWORKING & CONNECTIVITY 3. KNOWLEDGE SHARING 4. TIMELY & RELEVANT INFORMATION SHARING 5. MEMBER BUSINESS PROMOTION 6. DISCOUNTS
  6. 6. DIGITAL ENTERPRISE 2019 BCM WORKING GROUPS 2. Economic Freedom and Competitiveness - Chair: Gund Investment/TUSS Solution - Vice Chair: Clean Energy Asia 3. Energy, Infrastructure and Connectivity - Chair: PwC Mongolia - Vice Chair: Erdenes Oyu Tolgoi 1. Banking, Finance and Capital Markets - Chair: Trade and Development Bank - Vice Chair: Tavan Bogd Group 4. Growth and Innovation - Chair: Mobicom Corporation - Vice Chair: Erdene Resource Development Corp. 5. Resources and Environment - Chair: Oyu Tolgoi LLC - Vice Chair: Erdenes Mongol 6. Tax, Legal and Ethics - Chair: Avinex LLP - Vice Chair: Rio Tinto Mongolia Chaired by senior executives and thought leaders from key economic sectors
  7. 7. DIGITAL ENTERPRISE 2019 BCM WORKING GROUPS FOCUS AND COMPOSITION Working Group Composition Chairs / Vice-Chairs / Non-Board Vice-Chairs Members (BCM Members) BCM Secretariat (support) Sector-focused advocacy Policy and regulatory engagement Partnership development Public education & media engagement Improve sector competitiveness & attractiveness to investors Policy positions / papers
  8. 8. DIGITAL ENTERPRISE 2019 BCM Growth & Innovation Working Group Events Practice sharing Government engagement Raising awareness about Digital Transformation and its potential benefits to business and society.
  9. 9. DIGITAL ENTERPRISE 2019 BCM by the NUMBERS • 1 Annual Summit per year to showcase key business issues • 18 major policy items were advocated in last 18 months • More than 80 Knowledge Sharing Sessions since 2007 • More than 100 Monthly Meetings since 2007 • Over 550 issues of NewsWire since 2007 • More than 1,400 active subscribers to BCM Mailing list • Social media presence: 17,000+ followers on Facebook, 3,000+ on Twitter
  10. 10. DIGITAL ENTERPRISE 2019 CONTACT US bcmongolia.org @bcmongolia @bcmongolia Address: Suite 1103, Floor 11, Suite 1202, Floor 12, Express tower, Peace Avenue, Khoroo 1, Chingeltei District, Ulaanbaatar Phone: 976-11-317027
  11. 11. THANK YOU DIGITAL ENTERPRISE 2019
  12. 12. Digital Literacy for Mongolia Byambajargal Ayushjav Founder and CEO Faro Foundation Mongolia NGO DIGITAL ENTERPRISE 2019
  13. 13. FARO Foundation Mongolia Faro Foundation Mongolia (FFM) is a non- governmental organization that has focused on promoting adequate and accessible use of social media and digital literacy in Mongolia. FFM’s work includes but are not limited to, promoting online safety, digital literacy, child protection programs, proper use of social media, public awareness regarding cyber bullying and such. The primary goal of FFM is to implement positive change in the community through the use of social media. DIGITAL ENTERPRISE 2019
  14. 14. THE FOUR INDUSTRIAL REVOLUTIONS DIGITAL ENTERPRISE 2019
  15. 15. BRIEF HISTORY OF THE DIGITAL REVOLUTION DIGITAL ENTERPRISE 2019
  16. 16. Social Media Stats Mongolia (May 2018 – May 2019) DIGITAL ENTERPRISE 2019
  17. 17. Digital Literacy Digital literacy refers to an individual's ability to find, evaluate, and compose clear information through writing and other mediums on various digital platforms. Five Essential digital skills: • Communicating • Handling information and content • Transacting • Problem solving • Being safe and Legal Online DIGITAL ENTERPRISE 2019
  18. 18. Digital Literacy Library (Facebook) DIGITAL ENTERPRISE 2019
  19. 19. Digital Literacy Library Developed: Youth and Media at the Berkman Klein Center for Internet & Society at Harvard University License: Creative Commons Attribution-ShareAlike 4.0 International license DIGITAL ENTERPRISE 2019
  20. 20. Digital Literacy Digital Literacy Curriculum is designed for: Students – 18 Lessons Teachers – 18 Lessons Parents – 6 Lessons DIGITAL ENTERPRISE 2019
  21. 21. Digital Literacy Skills DIGITAL ENTERPRISE 2019
  22. 22. Digital Literacy DIGITAL ENTERPRISE 2019
  23. 23. Digital Literacy DIGITAL ENTERPRISE 2019
  24. 24. Digital Literacy DIGITAL ENTERPRISE 2019
  25. 25. Digital Literacy DIGITAL ENTERPRISE 2019
  26. 26. Digital Literacy DIGITAL ENTERPRISE 2019
  27. 27. Digital Literacy DIGITAL ENTERPRISE 2019
  28. 28. Digital Literacy DIGITAL ENTERPRISE 2019
  29. 29. THANK YOU DIGITAL ENTERPRISE 2019
  30. 30. Future of Internet IDERMUNKH.TS CEO of MobiNet Director of Enterprise Business Division, MobiCom DIGITAL ENTERPRISE 2019
  31. 31. Internet today DIGITAL ENTERPRISE 2019 Source: crc.gov.mn Total ISP contract - 68.03 Gbps Internet customers by connection type
  32. 32. Internet today DIGITAL ENTERPRISE 2019 Source: crc.gov.mn Нийт гэрээт интернет хэрэглэгчийн 70% нь 2-5 Mbps-н хурдтай гадаад интернет үйлчилгээ ашиглаж байна
  33. 33. Internet today DIGITAL ENTERPRISE 2019 Mongolian Internet Penetration is 65% in 2018, but! Global Speeds - April 2019 Source: https://www.speedtest.net Mongolian Speeds - April 2019
  34. 34. Internet today DIGITAL ENTERPRISE 2019 Source: www.atlasandboots.com
  35. 35. - Global Forecast and Trends of Internet DIGITAL ENTERPRISE 2019 Source: www.cisco.com Content Delivery Networks (CDNs) will carry 72% percent of Internet traffic by 2022 up from 56 percent in 2017. By 2022, global mobile devices will grow from 8.6 billion in 2017 to 12.3 billion by 2022 - over 422 million of those will be 5G capable. Fixed IP traffic will grow at a CAGR of 24 percent between 2017 and 2022, while mobile traffic grows at a CAGR of 46 percent. Global mobile data traffic was 9 percent of total IP traffic in 2017 and will be 20 percent of total IP traffic by 2022.
  36. 36. - Global Forecast and Trends of Internet DIGITAL ENTERPRISE 2019 Source: www.cisco.com Интернетэд холбогдох төхөөрөмжийн өсөлт IP Video дамжуулалтын өсөлт M2M интернетийн холболтын тоо
  37. 37. - Global Forecast and Trends of Internet DIGITAL ENTERPRISE 2019 Source: www.gartner.com 2018 2019 2020 2021 2022 Cloud Business Process Services (BPaaS) 45.8 49.3 53.1 57.0 61.1 Cloud Application Infrastructure Services (PaaS) 15.6 19.0 23.0 27.5 31.8 Cloud Application Services (SaaS) 80.0 94.8 110.5 126.7 143.7 Cloud Management and Security Services 10.5 12.2 14.1 16.0 17.9 Cloud System Infrastructure Services (IaaS) 30.5 38.9 49.1 61.9 76.6 Total Market 182.4 214.3 249.8 289.1 331.2 Public Cloud үйлчилгээний орлогын төлөв (Billions of U.S. Dollars) DDoS attacks-н төлөв
  38. 38. - Conclusion of Forecast DIGITAL ENTERPRISE 2019 Source: www.cisco.com IoTCDN Cloud Services IP Video Big data Security - What should do ISP’s for Future demand?
  39. 39. - Future of Internet service DIGITAL ENTERPRISE 2019 Source: www.cisco.com - More internet cache systems (CDN) - Most affordable M2M service packages
  40. 40. - Future of Internet service DIGITAL ENTERPRISE 2019 Source: www.cisco.com - More reliable and stable internet peering - More secure network, system and operation Ping - 50ms Layer - 3
  41. 41. - Future of Internet service DIGITAL ENTERPRISE 2019 Source: www.cisco.com - More speed in Fixed broadband - And key is good support and service 50Mbps, 100Mbps
  42. 42. THANK YOU DIGITAL ENTERPRISE 2019
  43. 43. Contact Center & Customer Experience B.BAYARMAA CXO MobiCom Corporation LLC DIGITAL ENTERPRISE 2019
  44. 44. DIGITAL ENTERPRISE 2019 CC Agents ~300 Daily 37k Monthly 1.1 mln
  45. 45. DIGITAL ENTERPRISE 2019 CONTACT CENTER 2018-2019 2016-2017 2222 1800-2222 1800-1199 2014-2015 7577-2222 2013-2014 Integrated Customer Service Center 2011-2012 333311 2288 2009-2011 2299 2277 Most PSP 2233 2004-2008 2244 2002-2003 11-312222 2222 OUTSOURCING Business FACILITY RENT Business 1800-1917 7555-5555 1800-1937 11-315757 1800-1200 1800-1289 1800-1883 1900-2103 7575-2000 1800-1200 1800-1801 1800-1289 1900-1199 1900-1199 1900-1199 1800-1200 1900-1199 1800-1200 7575-3636 1900-1199 11-327575 11-312234 7711-7711 11-315757
  46. 46. 2005 2010 2011-2013 2014 2014-2017 2018 DIGITAL ENTERPRISE 2019 16 years experience Know How IVR  Self–Service  Self–Sales INTRODUCED FIRST TIME IN MONGOLIA  Call center 2222 (toll-free)  Telemarketing  24/7 Service  Call distribution  Smart call distribution  Customer Segment  Implemented 25 KPI's for Call Center  Workforce management (WFM)
  47. 47. DIGITAL ENTERPRISE 2019 CONTACT CENTER SYSTEM Since 2017 Advanced Contact Center Technology  Channel based architecture  Skilled HR base, training & monitoring complex system 2005-2016 Customer Experience Omni channel High integration possibility Smart feature / Smart routing Workforce Optimization Self - Service IVR
  48. 48. DIGITAL ENTERPRISE 2019 TO IMPROVE CUSTOMER EXPERIENCE  To provide personalized & prompt customer service to MobiCom customers and partners, through Omni- channel, resolve their issues  To deliver customer voice & request to the top management team  To support company’s sales by up & cross sales  To care MobiCom customers, increase satisfaction
  49. 49. SMART DISTRIBUTION DIGITAL ENTERPRISE 2019
  50. 50. DIGITAL ENTERPRISE 2019  Easy  Prompt IVR Self-sales Data package MCA HiTone Data gift Unitloan Hybrid Payment Surprise - 596 ~800k Self-sales 7 types self-sales IVR Self-Service Bill info Handset configuration Candy balance Bank account Data package balance Handset Leasing condition Get puk code IVR SMS loan amount by sms SMS loan payment by sms ~1mln Service activation 9 types self-service DIGITAL SERVICE
  51. 51. DIGITAL ENTERPRISE 2019 я  Call forecast, HR forecast  WFM is powerful tool which can organize time management & HR Work Force Management program WORK FORCE MANAGEMENT (WFM)
  52. 52. DIGITAL ENTERPRISE 2019 SERVICE QUALITY
  53. 53. DIGITAL ENTERPRISE 2019 Customer Journey Analytics ALL CHANNEL’S INFORMATION PAST NOW FUTURE SAME BEHAVIOR CUSTOMER EXPERIENCE ONE PLATFORM SINGLE CUSTOMER VIEW
  54. 54. DIGITAL ENTERPRISE 2019 Hybrid line Status: Active Package: Hybrid - 19,900 Segment: Business USINESS BOLD Gansukh 26 ages KHAN-UUL, 3 KHOROO TELMUUN SINGLE CUSTOMER VIEW 9933**** By month CUSTOMER’S SERVICE: HITONE MCA LEASING DAILY VAS CLIR CUSTOMER’S HISTORY: 09:15 – 2222 – about data package 10:00 – NPS – 4 point 17:20 – 592 – 1 day data 19:03 – 2222 – data complaint 19:00 – Mobile bank - 19,900₮ payed UNIT – Dealer PAYMENT- Mobile bank CHANNEL: Now uses IPHONE 6S Web SPOS Candy app Internet CARE Usage Data 7.5GB NPS -15.5% OFFER CUSTOMER JOURNEY
  55. 55. DIGITAL ENTERPRISE 2019 Human-Assisted Reach Channels Coverage SMS • Single Channel • Interaction Focus • Next up staff • Work Mix is Broad • Siloed Multi-Channel • Interaction focus • Skill based Routing • Manual Quality Management • Work Mix Complex • Touchpoints Siloed • WFO siloed • Analytics by Channel • Journey Orchestration • Multi-modal, Cross-Channel • Predictive and Proactive • Journey Intent Routing • Soft Switching (egWebRTC) • Continuous WFO • Journey Analytics & Insights • CX Work Item SLAs Enforced CUSTOMER EXPERIENCE CENTER 1960-2005 2006-2016 Since 2017 CONTACT CENTERCALL CENTER Enterprise-Wide CC MILESTONE
  56. 56. DIGITAL ENTERPRISE 2019 CUSTOMER ENGAGEMENT CYCLE CUSTOMER EXPERIENCE PLATFORM IVR voice Social Contact Center Chat Web site Shop/ BranchE-mail Mobile App SELF-SERVICE PAYMENT CUSTOMER SERVICE DEALER SERVICE IVR SALES MARKETING SUPPORT CUSTOMER JOURNEY SINGLE CUSTOMER VIEW WFM SERVICE QUALITY
  57. 57. THANK YOU DIGITAL ENTERPRISE 2019
  58. 58. The Game Changer of Digital Enterprise Juniper Network Strategy and Solution Norman Lam CEO VP & GM – Greater China Juniper Networks DIGITAL ENTERPRISE 2019
  59. 59. At A Glance Sunnyvale, CA HEADQUARTERED 1996 FOUNDED $4.648B 2018 REVENUE 9,300 EMPLOYEES 88 Locations 43 COUNTRIES 24/7 AVAILABILITY TO ADDRESS ALL CUSTOMER NEEDS GLOBAL REACH ++ + 17 out of 20 WORLD’S LARGEST BANKS 7 out of 10 TOP GLOBAL UNIVERSITIES More than 1,400 LOCATIONS FOR NATIONAL GOVERNMENTS 10 out of 12 TOP TECHNOLOGY COMPANIES 9 out of 10 TOP GLOBAL WEB SERVICE PROVIDERS 10 out of 10 WORLD’S LARGEST WIRELESS & WIRELINE TELECOM COMPANIES REACHING THE HIGHEST STANDARDS ENCOURAGING FUTURE INNOVATORS OUR MISSION Connect Everything. Empower Everyone. OUR VISION Engineering Simplicity WHO TRUSTS US DIGITAL ENTERPRISE 2019
  60. 60. THE INTERNET OF THINGS – EVERYTHING IS CONNECTED connected devices by 202575B 5G WILL ENABLE A NEW BREED OF MOBILE APPS Is how much faster 5G is estimated to be over 4G60x A.I. HAS EMERGED of business leaders say A.I. will be a business advantage % 80 THE CLOUD IS EATING THE WORLD % 50 of enterprise applications in the cloud by 2020 FIGHTING CYBER-CRIME AND LOSING will be spent on fighting cybercrime in 2022$8T THE WORLD IS CHANGING FAST DIGITAL ENTERPRISE 2019
  61. 61. AND OUR OPPORTUNITY IS IMMENSE TO… DISTRIBUTE CLOUDS TO ENABLE 5GAND IoT DELIVER THE SOFTWARE DEFINED NETWORK HELP COMPANIES BUILD CLOUDS CONNECT PEOPLE TO CLOUDS Our intelligent SDN solution enables customers to achieve open, intelligent and flexible business objectives from cloud design to implementation and post- operation management. We help our customers build and run their cloud environments with world- class infrastructure We build the best core, edge, metro, and enterprise networks to allow our customers and their customers to connect to the cloud We help our customers transform their infrastructure to scale-out distributed clouds to help unleash the promise of 5G & IoT DIGITAL ENTERPRISE 2019
  62. 62. We're recognized As A leader in Data Center 127 GARTNER MAGIC QUADRANT FOR DATA CENTER NETWORKING FORRESTER WAVE TM HARDWARE PLATFORMS FOR SOFTWARE DEFINED NETWORKING JUNOS Contrail Automation High performance Open standard automation DIGITAL ENTERPRISE 2019
  63. 63. WE ARE LEADING THE TELCO TRANSFORMATION SERVICE & SUPPORT TECHNOLOGY INNOVATION Least Important Source: IHS Markit, December 2017 SP VENDOR RANKING FOR BUYING CORE/EDGE ROUTERS Product Reliability Service & Support Technology Innovation Security TOP SP SELECTION CRITERIA #1 PRODUCT RELIABILITY SECURITY #1 #1 #1
  64. 64. More interesting information DIGITAL ENTERPRISE 2019 Mary Meeker Queen of the Internet The Internet Trends report
  65. 65. Secure and automated multicloud DIGITAL ENTERPRISE 2019 Enable Digital Enterprise journey
  66. 66. DESTINATION: SECURE & AUTOMATED MULTICLOUD New IT platform is hybrid & multicloud because it’s the best: • Venue • Resilience • Agility • Flexibility • Economics …MULTICLOUDSECURE & AUTOMATED… Top 2 priorities: • Security: Failing security can take you from hero to zero immediately • Automation: Reliability engineering precedes moving faster for business It’s no longer only about TCO DIGITAL ENTERPRISE 2019
  67. 67. SECURE AND AUTOMATED MULTICLOUD – NOT JUST ABOUT CLOUDS Branch / Remote Office Campus / HQ SaaS Public Cloud Public Cloud Data Centers / Private Cloud Private / Public WAN DCI ALL PLACES IN NETWORK TOUCH MULTICLOUD APPLICATIONSPEOPLE & IoT SECURE and AUTOMATED MULTICLOUD how what DIGITAL ENTERPRISE 2019
  68. 68. JUNIPER Open PORTFOLIO Connected Security Campus/HQBranch/Remote Office Public CloudData Centers/Private Cloud SaaS Public Cloud AI-Driven Enterprise Enterprise Multicloud WAN JUNIPER ENTERPRISE Secure and Automate Multicloud Switching SecurityRouting Juniper Portfolio Software Contrail MistJunos Wi-Fi and BLE Services DIGITAL ENTERPRISE 2019 Connect SEE Secure Deliver
  69. 69. 5-STEP Migration to Digital Enterprise Device Led Business Led Operations Led Architecture Led Customer Led DIGITAL ENTERPRISE 2019
  70. 70. We Help our customers Deliver the Amazing IMPROVE HEALTHCARE TRANSFORM COMMERCE BUILD APPLICATIONS RETHINK EDUCATION POWER SOCIAL CHANGE EXPLORE NATURE ENCOURAGE DISCOVERY ENABLE CLEAN ENERGY DIGITAL ENTERPRISE 2019
  71. 71. Summer everything grown up DIGITAL ENTERPRISE 2019
  72. 72. THANK YOU DIGITAL ENTERPRISE 2019
  73. 73. Sophos Solution and How We Deal With Next-Generation Attack DIGITAL ENTERPRISE 2019 Stan Ho SE Manager of China and Mongolia Sophos Group. since Nov, 2007
  74. 74. Sophos Snapshot • Founded in Oxford in 1985 • 3,500 employees • 327,000 customers • 100 million users in 150 countries • 45,000 channel partners • SophosLabs threat research facility • “Channel First” go-to-market model Sophos Headquarters, Abingdon, UK
  75. 75. Sophos History Evolution to complete security 1985 Founded in Abingdon (Oxford), UK Peter Lammer c1985 Jan Hruska c1985 Acquired DIALOGS Acquired Astaro 2011 2012 2013 Acquired Utimaco Safeware AG 20081988 First checksum- based antivirus software 1989 First signature- based antivirus software 1996 US presence established in Boston Voted best small/medium sized company in UK Acquired ENDFORCE 2014 Acquired Cyberoam Acquired Mojave Networks Acquired Barricade IPO London Stock Exchange Launched Synchronized Security 2007 2015 Acquired Surfright 2017 Acquired Invincea 2016 Acquired PhishThreat Acquired Reflexion 2019 Acquired Avid Secure Acquired DarkBytes Acquired Rook Security
  76. 76. Sophos Global Sites San Francisco Bay Area Vancouver Canada Abingdon UK Budapest Hungary Singapore Sydney Australia Manila Philippines Tokyo Japan Milan Italy Karlsruhe Germany Wiesbaden Germany Dortmund Germany Paris France Ahmedabad India Dubai UAE Hengelo Netherlands Linz Austria Bangalore India New Delhi India Ottawa Canada São Paulo Brazil Buenos Aires Argentina Bogotá Colombia Ciudad de México Mexico Boston MA TW/HK/China
  77. 77. A Leader in Endpoint Protection “The Sophos Intercept X product, designed to protect against and recover from the malicious actions related to ransomware and exploits, proved popular with both existing Sophos Endpoint Protection customers and as an augmentation to an incumbent EPP. This momentum continued its increased brand awareness in the enterprise space. Also included in the Intercept X purchase are Sophos' EDR-like capabilities — called Root Cause Analysis — and the ML malware detection technology from the acquisition of Invincea was added in late 2017. Sophos' cloud-based EPP with the Intercept-X platform is a good fit for organizations that can take advantage of a cloud-based administration platform, and that value strong protection against ransomware and exploit-based attacks over advanced forensic investigation capabilities.” Gartner Magic Quadrant ENDPOINT PROTECTION Source: Gartner (February 2016) This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. Magic Quadrant for Endpoint Protection Platforms, Ian McShane, Avivah Litan, Eric Ouellet, Prajeet Bhajanka; 24 January, 2018
  78. 78. A Leader in Unified Threat Management Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. Magic Quadrant for Unified Threat Management, Rajpreet Kaur, Claudio Neiva, 20 September, 2018 Sophos first entered into this MQ publication in March 2012, positioned in the Leader quadrant – and has retained this position for 6 consecutive publications “Sophos is a Leader in the UTM Magic Quadrant. It continues to gain market share due to ease of use, security feature richness and successful integration with its endpoint product. It demonstrates strength in its product vision and roadmap execution, relative to those of some competitors.”
  79. 79. THREAT LANDSCAPE
  80. 80. Continued rapid growth in new malware By the end of 2019 over 1 Billion unique malware samples will exist Total Malware collected over time (AV-Test) 0 100,000,000 200,000,000 300,000,000 400,000,000 500,000,000 600,000,000 700,000,000 800,000,000 900,000,000 The Volume of malware is staggering 1990’s - Signature based Anti-Virus o 1-1 map of ‘checksums’ to malware o String Scanning Requires a Victim to report the malware so a new signature can be built
  81. 81. The age of single-use disposable malware 75% 75% of the malicious files SophosLabs detects are found only within a single organization. 400,000 Sophos Labs receives and processes 400,000 previously unseen malware samples each day.
  82. 82. The Challenge Of Addressing New Threats Software Vulnerabilities Reported By Year Source information NIST National Vulnerability Database as of 1 May 2018 https://beta.nvd.nist.gov/vuln-metrics/visualizations/cvss-severity-distribution-over-time 4639 4150 5286 5186 7937 6487 6446 14647 16517 2010 2011 2012 2013 2014 2015 2016 2017 2018
  83. 83. Top Threats Worldwide • Active Adversary • Privilege escalation, cred theft, lateral movement, exploits, process injection • Advanced Malware • Zero-day attacks w/multiple stages • Worms, Trojans, VB script, PDF, File-less attacks (cryptominers, powershell, etc…), bots, rats • Cryptomining/Cryptojacking • Legitimate and malicious use of CPU cycles to generate digital currency 38%21% 33% 5% Advanced Malware Active Adversary Ransomware Cryptojacking 3% Generic Malware
  84. 84. How we deal with Next-Gen attack Endpoint and Network Security
  85. 85. Predictive Security Harness The Power of Data Science to Protect Against Future Attacks SEEING THE FUTURE IS THE FUTURE OF SECURITY
  86. 86. Deep Learning Neural Network SMARTER FASTER SMALLER DEEP LEARNING • High Detection Rates • Gets Better with More Data 20 – 100 ms Detection 10 – 20 MB Model Size TRADITIONAL MACHINE LEARNING • Low Detection Rates • Diminishing Returns with More Data 100 – 500 ms Detection 500 MB to 1 GB Model Size
  87. 87. Intercept X with EDR for Endpoints and Servers ANTI-EXPLOIT MACHINE LEARNING ANTI-RANSOMWARE MALWARE REMOVAL ROOT CAUSE ANALYSIS STOP UNKNOWN THREATS PREVENT RANSOMWARE DENY THE ATTACKER
  88. 88. Sophos Intercept X: Intelligent EDR Data Correlated, Contextualized, and Organized Insights Humanized, Prioritized, and Actionable Explore Search, Investigate, and Hunt IT Generalists Analysts, IR, and SoC Specialists and Products Cybersecurity Experts-in-a-Box AI Expert Insights • EDR Starts with the Strongest Protection Stop Breaches before they Start • Add Expertise, Not Headcount “Experts in a Box” • Guided Incident Response Respond with the Click of the Button
  89. 89. Next-Gen Firewall –Essential Protection Tasks STEALTH MALWARE SOFTWARE EXPLOITS CRYPTO RANSOMWARE CREDENTIAL HARVESTING PROCESS ATTACKS UNKNOWn THREATS Block Attacks ? Contain Threats ? Visibility and Control (over users/apps/data)
  90. 90. XG Series Winning Advantages Industry leading performance with unique connectivity, reliability, and management 1. Flexible Connectivity 3. Easy Management  Modular desktop options for LTE, DSL, WiFi  Built-in bypass ports  Full line of copper and fiber FleXi Port modules  Unique RED devices Micro USB Management Ports USB and HDMI Ports 2. Business Continuity Redundant Power Supplies across the entire line Hot swap drives and PSUs on high-end models 4. Industry Leading Performance Among the highest rated price-performance by NSSLabs High-performance solid-state storage on every model
  91. 91. Next-Gen XG Firewall NEW HARDWAREDEEP LEARNING VISIBILITY • Boosts performance 20+% • Adds unmatched connectivity • Best in class business continuity • Identifies 100% of applications • Uncovers shadow IT, data at risk • Unmasks top risky users • Unparalleled malware detection • 3,500 new files convicted weekly • Pre-emptive detection reduces risk
  92. 92. Sophos XG Firewall The world’s best visibility, protection, and response 1. Exposes Hidden Risks 3. Automatically Responds to Incidents  Visual dashboard & rich on-box reporting  Identify risky users and suspicious payloads  Identify unknown cloud & evasive apps Unique Security Heartbeat™ Integrates EP Health into rules Automatically isolate infected systems 2. Blocks Unknown Threats Full suite of protection – easy to manage Deep learning Top performing IPS Engine
  93. 93. XG Firewall + Intercept X = Stop Ransomware and NextGen Attack Exposes Hidden Risks Blocks Unknown Threats Automatically Responds to Incidents
  94. 94. Security Heartbeat™ Sophos Security Heartbeat – Automated Response Sophos is the only vendor to use system health in firewall rules Security Heartbeat™ Servers XG Firewall Sophos Central Security Heartbeat™ links Endpoints with the firewall to monitor health and immediately share the presence of threats. Instant Identification Security Heartbeat can instantly share telemetry about the user, systems and process responsible Automated Response Automatically isolate, or limit network access, and encryption keys for compromised systems until they are cleaned up Internet XG Firewall Endpoints
  95. 95. Sophos Central: Partner Dashboard Partner-Centric Portfolio Mgmt. MSP License Mgmt. Trial to Purchase
  96. 96. Allows partners to manage multiple customer installations Endpoint Protection Email Security Web Gateway Server Protection Encryption Mobile Protection Wireless Allows users to access email, mobile, and encryption features Sophos Central Partner Dashboard Admin Self Service Firewall Management
  97. 97. Synchronized Security Cloud Intelligence Sophos Labs Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions | 24x7x365, multi-continent operation | Malware Identities | URL Database | Machine Learning | Threat Intelligence | Genotypes | Reputation | Behavioral Rules | APT Rules | App Identities | Anti-Spam | DLP | SophosID | Sandboxing | API Everywhere Sophos Central Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations In Cloud On Prem Next-Gen Endpoint Mobile Server Encryption Next-Gen Firewall Wireless Email Web
  98. 98. Kerry Logistics Producer Head office in Hongkong Over 100 Branches across Word Wide。 Quote “Sophos has engineered a simple solution that can help organizations quickly provide secure internet access both locally and remotely.” 30000+ Computers Central Endpoint Advanced, Intercept X, 200+ Servers Sophos Central Server Protection Network 100+ XG Firewalls (XG) Unify and simplify management Improved protection against mail, web, zero-day attack Analytics for better discovery and reporting Chenny Chen, CTO Unparalleled Protection
  99. 99. Construction Company Over 65 years in Taiwan China, Hong Kong, Macau, Gurgaon, Kuala Lumpur Quote 1000 Computers Sophos Central Endpoint Advanced 200 Servers Sophos Central Server Advanced Network 56 XG Firewalls w/Web Protection, 2 iView Appliances Real-time network protection and real-time response across 50 sites in Taiwan and 30 in Hong Kong,China Automation Looking for solution to scale performance and security Automated Incident Response “We use Synchronized Security to protect our users from ransomware attacks and enhance our IT security environment.” Kevin Chueh, CIO
  100. 100. THANK YOU DIGITAL ENTERPRISE 2019
  101. 101. FireEye Protect Defend Innovate Lawrence Li Channel Manager DIGITAL ENTERPRISE 2019
  102. 102. FireEye Lawrence Li
  103. 103. DIGITAL ENTERPRISE 2019
  104. 104. ©2019 FireEye On the Front Lines. Every Day. 700+ THREAT RESEARCHERS, PLATFORM ENGINEERS, MALWARE ANALYSTS, INTELLIGENCE ANALYSTS, AND INVESTIGATORS 35+ NATION-STATE SPONSORED APTs TRACKED 600K – 1M MALWARE SAMPLES COLLECTED DAILY FROM 70+ SOURCES 4 CYBER THREAT OPERATIONS CENTERS WORLDWIDE THOUSANDS OF INCIDENT RESPONSE HOURS EACH YEAR 24,000 INTELLIGENCE REPORTS PUBLISHED IN 2018 FireEye Catches What Others Miss
  105. 105. How We Differ
  106. 106. ©2019 FireEye The FireEye Ecosystem
  107. 107. 7,700 customers worldwide, FireEye is trusted by more than including 50% of the Global 2000.
  108. 108. as a Service Who is ? 5300+ Customers In 67+ Countries 825+ Customers Customers Breach Response $300M Cost CIO resignation CEO resignation $35M Cost Co-Chair resignation $81M Cost Governor Resignation Bangaladesh Bank 孟加拉國的中央銀行 Fedex https://www.cnbc.com/2017/06/29/fedex-cyberattacks-wanted-to-destroy-more-than-just-money-experts-say.html Deloitte https://www2.deloitte.com/content/dam/Deloitte/global/Documents/About-Deloitte/gx-FactsSheetforGlobalWebsite-cyber-attack.pdf Uber https://gizmodo.com/uber-s-new-ceo-was-told-about-the-companys-massive-data-1820722228 Home Depot https://www.consumerreports.org/privacy/home-depot-data-leak-exposes-gap-in-consumer-privacy-protection/ Equifax https://investor.equifax.com/news-and-events/news/2017/10-02-2017-213238821 HBO https://www.vanityfair.com/hollywood/2017/08/hbo-hack-seven-times-larger-sony Ebay https://uk.reuters.com/article/uk-ebay-password/hackers-raid-ebay-in-historic-breach-access-145-million-records-idUKKBN0E10ZL20140522 Yahoo https://www.reuters.com/article/us-yahoo-cyber-idUSKBN1432WZ? VTech https://www.reuters.com/article/vtech-cyberattack-fireeye-idUSL3N13S48G20151203 Premera Blue Cross https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/#more-30380 Freds https://krebsonsecurity.com/2015/06/discount-chain-freds-inc-probes-card-breach/ Arbys https://krebsonsecurity.com/2017/02/fast-food-chain-arbys-acknowledges-breach/#more-38024 Sabre corp hospitality https://krebsonsecurity.com/2017/05/breach-at-sabre-corp-s-hospitality-unit/#more-39249
  109. 109. Leader in Cyber Security Services 177 Leader in Cyber Threat Intelligence Leader in Technology
  110. 110. ©2019 FireEye FireEye Weaker Strategy Stronger Strategy Weaker Current Offering Stronger Current Offering Cyber Incident Response Services Q1 2019 Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte Secureworks KPMG Trustwave PwC EY NCC Group Verizon Booz Allen
  111. 111. ©2019 FireEye External Threat Intelligence Services Q3 2018 FireEye Weaker Strategy Stronger Weaker Current Offering Stronger Current Offering Cyber Incident Response Services Q1 2019 Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte Secureworks KPMG Trustwave PwC EY NCC Group Verizon Booz Allen
  112. 112. ©2019 FireEye FireEye Weaker Strategy Stronger Weaker Current Stronger Current Offering Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte KPMG Trustwave EY NCC Group Verizon Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Secureworks External Threat Intelligence Services Q3 2018
  113. 113. ©2019 FireEye FireEye Weaker Strategy Stronger Strategy Weaker Current Offering Stronger Current Offering Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte KPMG Trustwave EY NCC Group Verizon Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Secureworks External Threat Intelligence Services Q3 2018 Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment Q3 2018 Strategies Capabilities Participants Contenders Major Players Leader
  114. 114. ©2019 FireEye Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment Q3 2018 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Strategies Capabilities Participants Contenders Major Players Leader RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks
  115. 115. ©2019 FireEye 0EnrichmentDetections70 0 Overall Efficacy Score 288 Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment Q3 2018 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Strategies Capabilities Participants Contenders Major Players Leader RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks Forrester Scoring of the MITRE ATT&CK Framework Evaluation (EDR) Q1 2019
  116. 116. ©2019 FireEye 0EnrichmentDetections70 0 Overall Efficacy Score 288 Forrester Scoring of the MITRE ATT&CK Framework Evaluation (EDR) Q1 2019 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks CarbonBlack Endgame MicrosoftSentinelOne CounterTack RSA
  117. 117. ©2019 FireEye Advanced Malware Sandbox Market Percent of Revenue Q1 2019 0EnrichmentDetections70 0 Overall Efficacy Score 288 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks CarbonBlack Endgame MicrosoftSentinelOne CounterTack RSA 100 % 0% Forrester Scoring of the MITRE ATT&CK Framework Evaluation (EDR) Q1 2019
  118. 118. ©2019 FireEye Advanced Malware Sandbox Market Percent of Revenue Q1 2019 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks CarbonBlack Endgame Microsoft SentinelOne CounterTack RSA 100 % 0% Company A Company B Company C Company D Company E Company F Company G Company H CheckPoint Cisco ForcePoint Fortinet LastLine McAfee Palo Alto Networks
  119. 119. ©2019 FireEye Winning with FireEye Email Security Best Email Security Solution WINNER: FireEye Email Solution Source : http://www.scawardseurope.com/results-2018/ Source : https://www.crn.com/rankings-and-lists/ti2018.htm Source : https://www.scmagazine.com/2019-trust-awards/ Source : https://www.scmagazine.com/home/security-news/company-news/the-winners-of-the-2019-sc-awards-honored-in-the-u-s/ Jun 2018 Security - Email WINNER: FireEye Email Solution Nov 2018 Best Email Security Solution WINNER : FireEye Email Solution Dec 2018
  120. 120. FireEye Helix FireEye Security Ecosystem Contextual Intelligence Alerts/Case Management Investigative Workbench Orchestration & Automation Central Management FireEye Network Security FireEye Email Security FireEye Endpoint Security 3rd Party Solutions FireEye Threat Analytics Advanced Intelligence Expertise On-Demand 3rd Party Apps Managed Defense Expertise Threat Intelligence Partner Services Community Marketplace Answers Research Tools Ideas Mandiant Services Strategic Advisory Technical Assessment Incident Response DIGITAL ENTERPRISE 2019
  121. 121. DIGITAL ENTERPRISE 2019
  122. 122. THANK YOU DIGITAL ENTERPRISE 2019
  123. 123. Security in the IoT Era: Device Visibility an Control Michael Lafuente Senior Technical Consultant APJ Region FORESCOUT Technology DIGITAL ENTERPRISE 2019
  124. 124. DIGITAL ENTERPRISE 2019 Digital Transformation DIGITAL ENTERPRISE 2019
  125. 125. DIGITAL ENTERPRISE 2019 Confluence of Macro Trends Creating Visibility Challenges Growth of Devices & Platform Diversity 1990s 2020 Innumerable device-specific operating systems (OS) Cannot get agents onto new devices Cannot write agent-based software for every OS DESKTOP LAPTOP MOBILE CLOUD VIRTUAL SERVERS SERVERS DATA CENTER Cloud Adoption Creates New Challenges Multiple Device Locations and Access Points Heterogeneous Environment with Multiple Vendors De-centralized Management OT Convergence With IT Heightens Risk CORPORATE HQ • CRITICAL INFRASTRUCTURE • INDUSTRIAL CONTROL SYSTEMS INFORMATION TECHNOLOGY OPERATIONAL TECHNOLOGY OT networks are no longer physically separated Threats moving between cyber & physical dimensions Assets are highly vulnerable & rarely can be patched
  126. 126. DIGITAL ENTERPRISE 2019 Visibility & Control Gap Vulnerability Increasing Attack Surface
  127. 127. DIGITAL ENTERPRISE 2019 The Hidden Challenges of IoT IDC conducted in-depth interviews of 7 ForeScout customers to understand business value provided by ForeScout’s See, Control and Orchestrate capabilities
  128. 128. DIGITAL ENTERPRISE 2019 Broad Recognition of Growth of IoT on Networks
  129. 129. DIGITAL ENTERPRISE 2019 Despite this seemingly positive emphasis on IoT Security, some disturbing trends emerged 76% are Rethinking their Security Strategy Due to IoT Security Concerns
  130. 130. DIGITAL ENTERPRISE 2019 Accepting a Significant Level of Security Risk
  131. 131. DIGITAL ENTERPRISE 2019 So Who is Addressing IoT Security? SOC or LoB? Disagreement on Security Responsibility
  132. 132. DIGITAL ENTERPRISE 2019 Confident on IoT Security…Until They Are Tested
  133. 133. DIGITAL ENTERPRISE 2019 So Why Don’t They Do Anything About It? Complacency – Respondents & C-level “Tolerance” (for risk) seems to be less about what they are comfortable with, and more about what they are powerless to control.” - Forrester 2017
  134. 134. DIGITAL ENTERPRISE 2019 Considerations to Reduce Risk
  135. 135. DIGITAL ENTERPRISE 2019 Promote a Security Culture
  136. 136. DIGITAL ENTERPRISE 2019 Improve Visibility
  137. 137. DIGITAL ENTERPRISE 2019 Practice Good Cyber Security Hygiene
  138. 138. DIGITAL ENTERPRISE 2019 Segment Accordingly
  139. 139. DIGITAL ENTERPRISE 2019 Boost Strength of Security Investments
  140. 140. DIGITAL ENTERPRISE 2019 How can ForeScout help?
  141. 141. DIGITAL ENTERPRISE 2019 Servers Virtual Servers Network MobileUsers Private Cloud Public Cloud Physical Security Security Building Automation Controller Systems IoT Devices Physical Equipment Laptops / Desktops Badging Campus Data Center Cloud Operational TechnologyIoT THE DEFACTO STANDARD FOR DEVICE VISIBILITY ACROSS THE EXTENDED ENTERPRISE Our Product Vision
  142. 142. DIGITAL ENTERPRISE 2019 DEVICE VISIBILITY ASSET MANAGEMENT DEVICE COMPLIANCE NETWORK ACCESS CONTROL NETWORK SEGMENTATION INCIDENT RESPONSE Campus IoT Data Center Cloud OT Scalable Across Extended Enterprise Networks The ForeScout Platform Addresses The Visibilty Gap
  143. 143. DIGITAL ENTERPRISE 2019 Time-to-Value 65 days – average time for visibility roll out 74 Net Promoter Score (above security industry average) Why Customers Choose FORESCOUT Visibility Across all major industries including Government, Financial Healthcare Discover 30% more devices on average Orchestration Increase value of existing investment Reduce MTTR with automation 2900+ Customers in over 80 countries 2M+ Devices in a single deployment 4.7M+ Device in Device Cloud 57M+ Total Device capacity sold
  144. 144. DIGITAL ENTERPRISE 2019 THANK YOU DIGITAL ENTERPRISE 2019
  145. 145. Huaming Wu DIGITAL ENTERPRISE 2019 Driving the Enterprise Digital Transformation VMware Senior Consultant
  146. 146. Agenda 251  VMware Introduction  Market position and our vision  Enterprise Digital Transformation  Why need to choose digital transformation  How to help our customer make the decision  What ‘s the Benefit for choosing VMware  Success Story DIGITAL ENTERPRISE 2019
  147. 147. 252 Industry-Specific Solutions Global and Local Presence Compatibility and Open Source Integration Industry and Domain Expertise Strategy and Planning Expertise Advanced Technology Capabilities 1,000+ VMware Service Professionals 100+ Consulting Partners 75,000 Solution Partners $8.97B annual revenue of 2019 5,00 Customer include Top 500 enterprises in the world. A Trusted Partner for Your Digital Business Journey VMware is the fourth biggest basic software companies!
  148. 148. 253 Wide-Ranging Customer Success EDUCATION FINANCIAL SERVICES GOVERNMENT TECHNOLOGY HEALTHCARE/ PHARMA MANUFACTURING/ OTHER
  149. 149. The Best 100 Ent US #7 Pat Galsinger Fortune Executive Leader #2 Leader of Hybrid Cloud Management Market Scape Leader of Unified Endpoint Management Leader of Hyper Converged Infrastructure Market share Leader of Cloud and IT Automation Leader of HCI and WAN Edge Infrastructure Magic Quadrant The Best Container Platform Management Award by EMA VMware CEO Pat Galsinger CRN 2018 Top 100 Executives #1 VMware Awards and Recognitions in 2018 DIGITAL ENTERPRISE 2019
  150. 150. 255 Our mission We create an experience that makes the cloud invisible and easily to control so that our customers can focus on transforming their business
  151. 151. Agenda 256  VMware Introduction  Market position and our vision  Enterprise Digital Transformation  Why need to choose digital transformation  How to help our customer make the decision  What ‘s the Benefit for choosing VMware  Success Story DIGITAL ENTERPRISE 2019
  152. 152. 257 Transformation goes pragmatic As brands try to connect to customers’ lifestyles and habits, what real purpose do they serve in those moments? RPA and AI technology innovations will combine to create business value Automation is often placed in strategic and operational terms.  Manufacturing  Retail.  Financial services  Transportation. • 20% of brands will refine and revitalize purpose. RPA and AI will join forces to create digital workers for more than 40% of enterprise. 25% of leaders will use automation to address the talent scarcity squeeze. ---- source from : <<Predict 2019 Transformation goes pragmatic>> Investors are looking for the industries top 4 list.
  153. 153. SaaS Replatform Keep app unchanged, move to new environment Refactor Modify app, new environment, on-prem or in the cloud Multi-Tier Hybrid Shift portions of multi-tier app to public cloud Replace Move to SaaS version of packaged app Develop for Cloud New cloud native app deployed on-prem & IaaS Maintain Keep app unchanged, modernize environment Cloud Native Apps Time to market • Innovation • Scale • Differentiation Existing Apps Reduce Costs • Security • Reliability • Control Application needs are driving IT strategies and directions Data Center and Cloud solutions must match the needs of each application
  154. 154. AGILITY Accelerate time to Market Deliver new services that differentiate your business Optimize Costs Apply your IT budget based on ROI and app requirements Maximize Security Unify security from the data center to the cloud and device Manage Across Clouds Manage cost, usage, capacity planning, performance, and security across all clouds and on-prem Scale Seamlessly Seamlessly add resources across private and public clouds, expand globally COMPLEXITY AND RISK Extend to any Cloud everage consistent infrastructure from data center to the cloud The Challenge for IT: Increase IT agility while reducing complexity and risk
  155. 155. All software will run on a cloud Enterprise‘s application to run on a cloud Self-service Scalable Rich services Secure, compliant Self- optimized Resilient
  156. 156. 261 VMware Cloud Management Platform CMP as licensed software (vRealize) Cloud Assembly Service Catalog Code Stream Application Discovery Log Intelligence Wavefront Network Insight CMP as a Service (VMware Cloud Services) Hybrid Cloud Public Cloud CONTAINERSVIRTUAL MACHINES KUBERNETESVM Cloud Health Self-Driving Operations Programmable Provisioning Application Operations Cloud Health Cloud Assembly Service Broker Code Stream Wavefront Log Intelligence Network Insight vRealize Code Stream 2.4.2 vRealize Network Insight 4.1 vRealize Operations 7.5 vRealize Log Insight 4.8 VMware Integrated OpenStack 5.1 vRealize Automation 7.6 vRealize Lifecycle Manager 2.1 vRealize Business for Cloud 7.6 Cloud Management Platform Consistent Developer Experience
  157. 157. 262 Industrializing Private Cloud • DevOps for CMP with vRS Lifecycle Manager • AI/ML-based performance & capacity optimization with integrated automation & cost (vRA- vRBC-vROps) • Native integrations with SDDC technologies, including VMC on AWS • Cloud Agnostic – common approach to hybrid and multi-cloud (AWS, Azure, GCP, VCPP, and more) • Developer-friendly • VMs and Container-based applications • Leader in Forrester Private and Hybrid Cloud Wave • #1 market share in 4 IDC reports • Positioned favorably by Gartner • Leader in Ovum Decision Matrix Why VMware • Best for SDDC and beyond • Most Complete • Trusted Market Leader
  158. 158. 263Confidential │ ©2019 VMware, Inc. Use Case DIGITAL ENTERPRISE 2019
  159. 159. 264 China Mobile China Mobile Communications Corporation(CMCC) is a Chinese state-owned telecommunication corporation that provides mobile voice and multimedia services through its nationwide mobile telecommunications network across mainland China. China Mobile is the largest mobile telecommunications corporation by market capitalization, and also the worlds largest mobile phone operator by total number of subscribers, with over 902 million subscribers as of June 2018. CMCC began to set up its Public Cloud business in Inner Mongolia, because the power supply and the climate, and thus comes the 139 Cloud of CMCC Inner Mongo. Business issues VMware Solution Business Value 1. Construction Size: 62 Million square meters , contains 18 datacenter building. And 52.5 thousand cabinets; 2. Total investment : $2 billion ; 3. Functions • Public Cloud and virtualization Resource pools • Multi -tenants help enterprise migrate application to cloud. • Site Recover services protect enterprise business available . 1. Storage has double protect method, even storage failure doesn’t impact the continuity of the operation; 2. base backup policy , all data are backup in virtual tape device; 3. comprehensive security policy • vvSphere • vSAN. • NSX. Base on VMware SDDC and SDN components build up the public cloud. VMwaer vSphere
  160. 160. China Mobile (cont.)  hotline
  161. 161. 266 Yili Group Yili Group has ranked among the world’s most successful dairy companies( rank 8), It is also the largest dairy company in China. It offers the most comprehensive range of products. In the course of development, Yili has always adhered “internationalization” and “innovation”, and insisted to the two fundamentals of “quality” and “responsibility”. Every day, more than 100 million Yili products are delivered to consumers. Business issues VMware Solution Business Value 1. International operation is an import strategy of Yili,offers the most comprehensive range of products and serve for the more and more people; 2. boost the innovation in the dairy sector, develop the health and suitable dairy products ; 3. updated Yili's global quality and safety management systems ; • Design the IT infra structure in next 3 years to match the the requirement of business growth rapidly • Build up Active-Active Data Center and recovery site, support Seamless data recover in local city or 5 min recovery to another city. • vCloud Suite advance • vSphere、vSAN、NSX • vxRail /DELL 1. build a bridge for the communication and exchange of information that is necessary for production plants, completely present the situation of a real time. 2. Yili uses the digital technology to collect and monitor data, get data value and turn into attractive models, improve the quality of service. 3. Accelerate IT-infra agility, support more management system go live, improve system stability
  162. 162. Thank You DIGITAL ENTERPRISE 2019
  163. 163. Machine Data Insight Into The AI World YANTAO HU Senior Consultant Splunk North Asia DIGITAL ENTERPRISE 2019
  164. 164. Top Predictions for 2019 by Splunk DIGITAL ENTERPRISE 2019 * Pulling together insights from our thousands of customers and our dedicated research teams, our experts have assembled a shortlist of the top predictions for 2019. - Splunk Predictions 2019
  165. 165. Top Predictions for 2019 by Splunk DIGITAL ENTERPRISE 2019  Artificial Intelligence and Machine Learning as it breaks out of the lab  Security in the wake of heightened compliance regulations and evolving digital environments  IT Operations as it transforms to focus on application mobility  IoT as it claims its stake in the modern organization
  166. 166. Splunk AI Solutions DIGITAL ENTERPRISE 2019 Machine Learning Toolkit (MLTK)
  167. 167. Nasdaq: Keeping Markets Moving DIGITAL ENTERPRISE 2019 “ Splunk UBA gives us insight into internal threats and is a unique data science-driven approach that automatically finds unknown threats that traditional rule-based methods can‘t match. ” - AVP, Nasdaq • Using Splunk Enterprise to monitor potential external security breaches and UBA to detect insider threats • Analyst efficiency to gather data and speed security investigations has increased by more than 50 percent • Provides deep understanding of data and reusable correlation rules across all support engineer levels
  168. 168. Splunk UBA: Active Directory Intelligence DIGITAL ENTERPRISE 2019 Root of All Evil Actual Activities Active Directory Events Remote PowerShell Go to CompB - Login success - Execute UserA SrcComp DstServ PS Admin$ IPC$ 4688 4688 4648 4624 4768 4768 Domain Controller internal auth 4672 5140 5140 target cmd 4688 SC manager 4674 PS 4688 4624 4768 4624 Chaotic world of internal micro interactions
  169. 169. Splunk UBA: Unsupervised ML Analysis DIGITAL ENTERPRISE 2019
  170. 170. Splunk UBA: Unveil the Kill Chain DIGITAL ENTERPRISE 2019
  171. 171. Vodafone Implementation of AI with Splunk DIGITAL ENTERPRISE 2019 • Problem Statement Efficiency and speed of service restoration post planned and unplanned outages to ensure: Application uptime Customer experience Service fulfilment Operation resource utilization 2-3 changes per week • Requires dedicated and coordinated efforts across multiple teams Complex architecture to meet business requirements • 12 core applications & Complex integration to other 80 Long and complex restoration process to: • Avoid dominos affect on applications
  172. 172. Vodafone Implementation of AI with Splunk DIGITAL ENTERPRISE 2019 • Splunk AI Solution  Intelligent decisions based on real time performance resulting in efficient queue throttling  Applied Machine Learning to predict ticket priorities, categories, assignees and resolutions
  173. 173. Vodafone Implementation of AI with Splunk DIGITAL ENTERPRISE 2019 • Benefits realized Cost Savings  Resource reduction  Man Hours Savings / Year  Up to 50% faster queue throttling AI & Machine Learning  Reduced SME dependency Opportunities  Further Artificial Intelligence / ML within Operations space Customer Experience  Reduced issues and time to BAU, enhances Vodafone TNPS
  174. 174. DIGITAL ENTERPRISE 2019 • CBM In The German Public Rail Transportation System • Analyzing train door machine data using Splunk Machine Learning capabilities • Maintenance & repair cost exceed expectations • Cost overruns influence the operational result • Failure of systems cause interruptions of service Condition-Based Maintenance Deutsche Bahn
  175. 175. Condition-Based Maintenance DIGITAL ENTERPRISE 2019 Bombardier TALENT 2 Deutsche Bahn
  176. 176. Detecting Anomalies Using DBSCAN DIGITAL ENTERPRISE 2019 DBSCAN From Splunk Machine Learning Toolkit Anomaly  indicating door-locking malfunction! Energy-consumption (Ampere) over recent opening events Deutsche Bahn
  177. 177. DIGITAL ENTERPRISE 2019 • Reduction of service interruptions • Even distribution of stress to the mechanical components • Foresight in failure-causing effects and when they occur • Alerting and reporting at any moment through live-data • Precise scheduling of maintenance cycles Benefits of Implementing CBM Overall cost reduction! Deutsche Bahn
  178. 178. DIGITAL ENTERPRISE 2019 • Since deploying Splunk Phantom, Blackstone has seen benefits including: • Fast and accurate resolution of malware alerts • Ensuring a repeatable and auditable process for investigating malware alerts Splunk Phantom @ Blackstone “Automation with Splunk Phantom enables us to process malware email alerts in about 40 seconds versus 30 minutes or more.” Adam Fletcher, CISO Blackstone
  179. 179. DIGITAL ENTERPRISE 2019 1. Security Analyst 1. Extract attachments / Detonate in a malware sandbox /Catch the results 2. Extract URLs (from emails & attachments) / Check URL Reputation 3. Collect all IP’s involved (including sender, MTA) / Check IP reputation 4. Summarize Indicators of Compromise / Threat Intel 5. Search for Threat Intel. in your log data (Network Traffic, Proxy, Email, Email Filter, Endpoint data sources) / Identify affected hosts and users 6. Document / The Security Analyst Hands Over to the Threat Responder 2. Response Through the Threat Responder 1. Block IP at the Firewall 2. Block URL at the Proxy 3. Block E-Mail Domain at the Spamfilter 4. Block URL & IP & Hash at the Endpoint Security 3. Malware Containment 1. Create Ticket for Service Desk 2. Service Desk cleanups host 3. Threat Responder validates cleanup was efficient 4. Ticket closed Splunk Phantom @ Blackstone 45m
  180. 180. DIGITAL ENTERPRISE 2019 Splunk Phantom @ Blackstone Time per Play: 30-60 Seconds + human review time
  181. 181. DIGITAL ENTERPRISE 2019 • Previous industrial revolutions • Steam and the first machines that mechanized some work • Electricity, the assembly line and the birth of mass production • Computers and the beginnings of automation • Next stage so called smart factory • Design principles • Interoperability • Information transparency • Decentralized decisions • Technical assistance systems Industry 4.0 at the BMW Group
  182. 182. DIGITAL ENTERPRISE 2019 Technical assistance system for rework process Break Test Battery Test Chassis Test (Re-) Workers Rework Protocols+ Test and Error Events ID 12: Assignment Error at Airbag Control Unit Init-Test ID 23: Operating Voltage too low at Steering Wheel Test defectiveversion wrong unit unlock airbag control changed unit version wrong ID 45: Cannot Read Variable AIRBAG_SENSOR_VA LUE
  183. 183. DIGITAL ENTERPRISE 2019 What to do with Splunk MLTK  Error Patten / Building Clusters  Clustering using Custom Splunk-ML-Algorithm: • Spectral Clustering with a custom affinity function • Determines the group (color) of closely linked errors  Forming the complete hierarchy (all nodes up to the root) of reworking categories
  184. 184. DIGITAL ENTERPRISE 2019 Achievement Provide an assistance system  Support the workers with the "experience" that we can draw from the historic data  Give qualified recommendations for reworks  Fix errors before subsequent errors occur  Optimization of rework logistics Error Classes Error Patterns Mapping Rework Categories Hierarchy of Rework Categories Recommen- dations
  185. 185. DIGITAL ENTERPRISE 2019 • Industry 4.0 – Use Case on the shop floor Splunk @ Porsche
  186. 186. DIGITAL ENTERPRISE 2019 Industry 4.0 – Use Case on the shop floor Industry 4.0 • The 1st Realtime Usage Dashboard of Shop Floor at Porsche • Data from the supply chain and unstructured data get together • End-to-End View of All Production Stations • Station Health Status Monitoring, Deep Dive, and Predictive Analysis
  187. 187. DIGITAL ENTERPRISE 2019 Mission of Splunk Our Mission
  188. 188. DIGITAL ENTERPRISE 2019 .CONF19
  189. 189. THANK YOU DIGITAL ENTERPRISE 2019

×