SlideShare ist ein Scribd-Unternehmen logo
1 von 36
© 2017 VMware Inc. All rights reserved.
Partner Leadership
Summit 2017
Pat Gelsinger
CEO
© 2017 VMware Inc. All rights reserved.
Welcome!
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Tension Points for Public Sector IT Leaders
3
Invest Strategically to
Modernize Government IT
Reduce Spending
on Government IT
Improve Cyber Security to
Protect Against All Threats
Meet Citizen Demand
for Open Access
Embrace Cloud, IoT, Mobile,
and New Apps
Streamline Operations
Across the Board
Our Promise to
Federal Government
A portfolio of technology solutions that
enables your agency to better harness
the resources you need to power
smarter government and improve
security from your users to wherever
your data resides.
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Moving Up the Value Chain
Addressing Our Joint Customers’ Most Complex Challenges
Virtualization
Leader
Conquering Silos
of Compute
2007
SDDC
Leader
Conquering Silos
Across the Data
Center
2012
Mobile-Cloud
Leader
Conquering Silos
Across:
• Cloud
• Mobile
• Security
2017
5
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
It’s In Our DNA
Fearless
Innovators
Challenging
Conventional
Wisdom
Making the
Impossible
Possible
6
Challenging the Conventional Wisdom:
5 Myths of IT
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #1
“Bi-modal IT is the best strategy:
One team moves fast and
innovates, the other keeps
the lights on.”
8
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
ExploratoryPredictable “New & Cool Team”“Old & Slow Team”
Translation?
IT Ops Developers
9
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Discord
Budget
Battles
A Management
Nightmare
Real-World Result?
“New & Cool Team”“Old & Slow Team”
IT Ops Developers
10
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
The Real Challenge: Innovate Everywhere
Intrinsic Security
Traditional Apps Cloud-Native Apps
Agile Infrastructure
11
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #2
“It’s time to take everything to
the Public Cloud. Simply close
the doors on-prem ASAP.”
12
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Why not?
Private Cloud Public Cloud
13
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Why Not:
14
C PC P
2
ost
erformance
ompliance
rivacy
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
vCloud Air Network
Best-in-Class
Private Cloud
VMware Cross-Cloud Architecture
Freedom and Control
15
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
State of the Cloud 2030
Traditional IT Public CloudPrivate Cloud
52%19% 29%
596 Million
Total Global IT Workloads
Source: VMware Analysis
16
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Making Private Cloud Easy
17
vRealize Cloud
Management
VMware Cloud
Foundation™
Hyper-Converged
Infrastructure
…increasingly delivered as a service
…as Easy as Public Cloud
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
We will be living in a hybrid
world for decades to come.
Bottom Line
18
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #3
“With cyber security,
government IT must run
faster just to stay in place.”
19
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Y/Y Growth in
Security Budget
Y/Y Growth
in IT Budget
4%
24%
Source: IDC Worldwide Black Book 2016 , Version 2.1, August 2016
security grows…
As spend on
20
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
20152014
43M
59M
Security Incidents
are on the rise.
Security breaches
21
Source: PWC: The State of Global Information Security Survey 2016
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Source: Momentum Partners
Infrastructure Security
Security Operations & Incident Response
Endpoint Security Application Security
Messaging Security Web Security
IoT Security Threat Intelligence Mobile Security Data Security
Cloud Security
Specialized Threat Analysis & Protection Identity & Access ManagementTransaction Security
Risk & Compliance
Security Challenge Today:
Too Many Point Solutions
22
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
What Really Matters:
Secure Users, Apps & Data…Simplify Compliance
Secure User Identity
& Endpoints
Secure Application
Infrastructure
Streamline Governance & Compliance
Users DataApps
23
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Secure User Identity & Endpoints Secure Application Infrastructure
Streamline Governance & Compliance
Users DataApps
VMware Strategy: Transform Security
Secure Infrastructure
Cyber Hygiene
Foundational Products
Secure User Identity
& Endpoints
Secure Application
Infrastructure
Streamline Governance & Compliance
Users DataApps
24
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #4
“My mobile experience as a
citizen is fragmented, insecure,
and my user experience sucks.”
25
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
My Personal Life My Work Life
“Consumer Tech” “Government Tech”
26
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Next-Gen
User Experience
True Stateless
Desktops
Real-Time
App Delivery
Desktop
as-a-Service
Hybrid Cloud
Architecture
Core Challenge
27
Stitch Together Silos of Innovation
Identity
Management
Device
Management
Application
Management
Content
Management
Personal
Productivity
Mobile
Security
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Once Again:
Too Many Point Solutions to Manage
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Myth #5
“All apps will be built via
containers and…VMware
will be irrelevant.”
ONE WAY
30
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 31
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
10X
2020
Emerging Challenge for IT:
Container Proliferation
32
70% of Containers in 2020 will be in VMs
Source: IDC Worldwide Cloud Predictions 2017
2015
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Q: Which Container Technology Will Win?
33
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
vRealize Cloud Management, VMware Integrated OpenStack
NSX and vSAN
VMware Cloud on AWS / vCloud Air™ Network
vRealize Cloud Management, VMware Integrated OpenStack
NSX and vSAN
VMware Cloud on AWS / vCloud Air™ Network
Developer Ready Infrastructure
VMware Strategy
Delivering Today’s Platform to Meet Tomorrow’s Needs
34
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Aligning To Your Strategic Priorities
VMware’s Vision
Any Cloud
Any Device
VMware Workspace ONE™
Desktop Mobile Identity
Any Application
Traditional Apps Cloud-Native Apps SaaS Apps
Software-Defined Data Center
VMware Cross-Cloud Architecture™
Private Cloud Hybrid Cloud Public Cloud
VMware Cloud Foundation™
VMware vRealize® Cloud Management
VMware vCloud
®
Air™
Network
F
VMware Cross-Cloud Services™
Government IT
Strategic Priorities
Integrate
Public
Clouds
Modernize
Data
Centers
Transform
Security
Empower
Digital
Workspaces
Government IT Strategic Priorities
Empower
Digital
Workspaces
Transform
Security
Modernize
Data
Centers
Integrate
Public
Clouds
35
Our Commitment
to You

Weitere ähnliche Inhalte

Was ist angesagt?

Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewSkybox Security
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynoteNetworkCollaborators
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021Khairil Effendy
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...FaithWestdorp
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesNetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 

Was ist angesagt? (20)

Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 

Ähnlich wie Pat Gelsinger - Welcome

Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
Keeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand CurveKeeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand CurveAmazon Web Services
 
Keeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveKeeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveAmazon Web Services
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM
 
Escape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonEscape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonVeritas Technologies LLC
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomwaremarketingunitrends
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...Capgemini
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Digital Transformation EXPO Event Series
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...Veritas Technologies LLC
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021Marius Sandbu
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentAnyPresence
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Addressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorAddressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorThousandEyes
 
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...Josef Adersberger
 

Ähnlich wie Pat Gelsinger - Welcome (20)

Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Keeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand CurveKeeping Security In-Step with Your Application Demand Curve
Keeping Security In-Step with Your Application Demand Curve
 
Keeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveKeeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand Curve
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
 
Escape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonEscape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prison
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Addressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorAddressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public Sector
 
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...The good, the bad, and the ugly of migrating hundreds of legacy applications ...
The good, the bad, and the ugly of migrating hundreds of legacy applications ...
 

Mehr von scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMAscoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choicescoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernizationscoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecturescoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformationscoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happyscoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linuxscoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Agescoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Governmentscoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factoryscoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurityscoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summitscoopnewsgroup
 

Mehr von scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Kürzlich hochgeladen

Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfAmir Saranga
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 

Kürzlich hochgeladen (20)

Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdf
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 

Pat Gelsinger - Welcome

  • 1. © 2017 VMware Inc. All rights reserved. Partner Leadership Summit 2017 Pat Gelsinger CEO © 2017 VMware Inc. All rights reserved.
  • 3. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Tension Points for Public Sector IT Leaders 3 Invest Strategically to Modernize Government IT Reduce Spending on Government IT Improve Cyber Security to Protect Against All Threats Meet Citizen Demand for Open Access Embrace Cloud, IoT, Mobile, and New Apps Streamline Operations Across the Board
  • 4. Our Promise to Federal Government A portfolio of technology solutions that enables your agency to better harness the resources you need to power smarter government and improve security from your users to wherever your data resides.
  • 5. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Moving Up the Value Chain Addressing Our Joint Customers’ Most Complex Challenges Virtualization Leader Conquering Silos of Compute 2007 SDDC Leader Conquering Silos Across the Data Center 2012 Mobile-Cloud Leader Conquering Silos Across: • Cloud • Mobile • Security 2017 5
  • 6. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution It’s In Our DNA Fearless Innovators Challenging Conventional Wisdom Making the Impossible Possible 6
  • 7. Challenging the Conventional Wisdom: 5 Myths of IT
  • 8. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #1 “Bi-modal IT is the best strategy: One team moves fast and innovates, the other keeps the lights on.” 8
  • 9. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution ExploratoryPredictable “New & Cool Team”“Old & Slow Team” Translation? IT Ops Developers 9
  • 10. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Discord Budget Battles A Management Nightmare Real-World Result? “New & Cool Team”“Old & Slow Team” IT Ops Developers 10
  • 11. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution The Real Challenge: Innovate Everywhere Intrinsic Security Traditional Apps Cloud-Native Apps Agile Infrastructure 11
  • 12. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #2 “It’s time to take everything to the Public Cloud. Simply close the doors on-prem ASAP.” 12
  • 13. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Why not? Private Cloud Public Cloud 13
  • 14. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Why Not: 14 C PC P 2 ost erformance ompliance rivacy
  • 15. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution vCloud Air Network Best-in-Class Private Cloud VMware Cross-Cloud Architecture Freedom and Control 15
  • 16. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution State of the Cloud 2030 Traditional IT Public CloudPrivate Cloud 52%19% 29% 596 Million Total Global IT Workloads Source: VMware Analysis 16
  • 17. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Making Private Cloud Easy 17 vRealize Cloud Management VMware Cloud Foundation™ Hyper-Converged Infrastructure …increasingly delivered as a service …as Easy as Public Cloud
  • 18. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution We will be living in a hybrid world for decades to come. Bottom Line 18
  • 19. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #3 “With cyber security, government IT must run faster just to stay in place.” 19
  • 20. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Y/Y Growth in Security Budget Y/Y Growth in IT Budget 4% 24% Source: IDC Worldwide Black Book 2016 , Version 2.1, August 2016 security grows… As spend on 20
  • 21. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 20152014 43M 59M Security Incidents are on the rise. Security breaches 21 Source: PWC: The State of Global Information Security Survey 2016
  • 22. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Source: Momentum Partners Infrastructure Security Security Operations & Incident Response Endpoint Security Application Security Messaging Security Web Security IoT Security Threat Intelligence Mobile Security Data Security Cloud Security Specialized Threat Analysis & Protection Identity & Access ManagementTransaction Security Risk & Compliance Security Challenge Today: Too Many Point Solutions 22
  • 23. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution What Really Matters: Secure Users, Apps & Data…Simplify Compliance Secure User Identity & Endpoints Secure Application Infrastructure Streamline Governance & Compliance Users DataApps 23
  • 24. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Secure User Identity & Endpoints Secure Application Infrastructure Streamline Governance & Compliance Users DataApps VMware Strategy: Transform Security Secure Infrastructure Cyber Hygiene Foundational Products Secure User Identity & Endpoints Secure Application Infrastructure Streamline Governance & Compliance Users DataApps 24
  • 25. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #4 “My mobile experience as a citizen is fragmented, insecure, and my user experience sucks.” 25
  • 26. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution My Personal Life My Work Life “Consumer Tech” “Government Tech” 26
  • 27. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Next-Gen User Experience True Stateless Desktops Real-Time App Delivery Desktop as-a-Service Hybrid Cloud Architecture Core Challenge 27 Stitch Together Silos of Innovation Identity Management Device Management Application Management Content Management Personal Productivity Mobile Security
  • 28. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Once Again: Too Many Point Solutions to Manage
  • 29. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
  • 30. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Myth #5 “All apps will be built via containers and…VMware will be irrelevant.” ONE WAY 30
  • 31. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 31
  • 32. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution 10X 2020 Emerging Challenge for IT: Container Proliferation 32 70% of Containers in 2020 will be in VMs Source: IDC Worldwide Cloud Predictions 2017 2015
  • 33. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Q: Which Container Technology Will Win? 33
  • 34. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution vRealize Cloud Management, VMware Integrated OpenStack NSX and vSAN VMware Cloud on AWS / vCloud Air™ Network vRealize Cloud Management, VMware Integrated OpenStack NSX and vSAN VMware Cloud on AWS / vCloud Air™ Network Developer Ready Infrastructure VMware Strategy Delivering Today’s Platform to Meet Tomorrow’s Needs 34
  • 35. © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Aligning To Your Strategic Priorities VMware’s Vision Any Cloud Any Device VMware Workspace ONE™ Desktop Mobile Identity Any Application Traditional Apps Cloud-Native Apps SaaS Apps Software-Defined Data Center VMware Cross-Cloud Architecture™ Private Cloud Hybrid Cloud Public Cloud VMware Cloud Foundation™ VMware vRealize® Cloud Management VMware vCloud ® Air™ Network F VMware Cross-Cloud Services™ Government IT Strategic Priorities Integrate Public Clouds Modernize Data Centers Transform Security Empower Digital Workspaces Government IT Strategic Priorities Empower Digital Workspaces Transform Security Modernize Data Centers Integrate Public Clouds 35

Hinweis der Redaktion

  1. How many of you all have heard of this idea that bi-modal IT is the best strategy today? You’ve heard that? What do you think? Our thinking? Not true!
  2. IT Operations—predictable, and you need these new developers and the exploratory folks of the future. Now, that means—How many of you want a part of the “old and slow” team? Not so much! None of us wants to be in the “old, slow, cranky” team. All of us want to be a part of the cool new team. . . These associations need to be cast aside with the two teams working in harmony toward a single purpose – to drive speed and innovation.
  3. Fragmenting IT into "old & slow vs new & fast" is a false binary and a fundamentally flawed strategy The person who came up with this obviously never ran an organization. We need to bring innovation to every aspect of the business. This model results in discord, budget battles, and a management nightmare. The real challenge is enabling innovation across IT, at the app level, infrastructure that is agile and can respond and security that is built in and enabling that pace of innovation
  4. This is what we do. We’re going to create agile, scalable infrastructure that allows innovation and scale across the entire business. Make the infra easy, automated, and scalable so that the business can innovate everywhere—in existing apps and in new apps as well.
  5. Myth #2: “It’s time to take everything to the Public Cloud. Close the doors ASAP.”
  6. And why not? There’s a certain appeal to this thought process where I can get out of running capital; I don’t need to manage those data centers myself, running that depreciation. Sounds pretty conducive, doesn’t it?
  7. Well– Why not? A little acronym for you: CP2. So the reason “why not” is, if you don’t care about Cost, Performance, Compliance, or Privacy, just move it all to the cloud. What do you think—Do you care about any of those things? Do you care about a well-performing private cloud being dramatically cheaper than a public cloud? Performance—you know, you still have this problem called speed of light and latency. Compliance and regulation. Privacy requirements are going to increase and become more acute in the context of EU and GDPR. And our industry has this pendulum swing that goes side to side, going from the mainframe era to the distributed era. When we think about things like IoT, more will move back to the edge and on-premise as well.
  8. And this is what cross-cloud is all about, enabling the best of both worlds. In the past, VMware provided compute and server freedom. In the future, VMware will provide cloud freedom and cloud control. The cloud has become the new hardware and we are uniquely positioned to enable that new future.
  9. And if you look back at my VMworld speech this year, what did we say? 50/50 by 2030. The math simply doesn’t work for an all public-cloud environment.
  10. The result is, there will be decades of a hybrid world in front of us. But we have some responsibility here. Because we have not made the private cloud nearly as easy and consumable as it needs to be. We need to make it simpler, easier, more efficient. And three ways that we’re going to do that? This is what VMware Cloud Foundation is all about—putting all the pieces together. And I expect by FY19, this becomes our primary selling notion—Cloud Foundation. All hardware becomes hyper-converged hardware in the future. We have to drive that agenda with our vSAN, VxRack, vXRAIL products, much more aggressively. And the rule of the cloud—ruthlessly automate everything. That’s what vRealize is all about. We have to drive these agendas and make private cloud much easier.
  11. And uniquely enable the hybrid cloud world. This is our opportunity.
  12. Myth #3 – Cybersecurity, IT is running faster just to stay in place. And if you’re an IT security pro, you know the gerbil is a pretty good picture. You’re running like crazy and guess what–
  13. You’re not getting ahead. And in fact, if you look at the data, you’re spending more of your IT budget on security—4% growth in IT spending overall, 25% growth in security spending. And the result is, that increase in spending on cyber security, how are you doing?
  14. Security breaches are on the rise. So we’re spending more and our breaches are increasing. Something is fundamentally wrong.
  15. Now this to me is just an awesome picture. This is the security industry. This is what our industry is presenting to our customers as saying, “Here’s the solution.” Can you believe this collection of logos? Isn’t this overwhelming? I just love this slide. Now, how can IT possibly put all of these together and make them work. Integrate them all, update them all, keep them all current. We have delivered a menagerie of point products.
  16. And what the user wants is to secure users, apps, and data. We VMware are going to do that by securing the user identity and the endpoints and by securing the infrastructure. And what we’re going to do in terms of the way we do this is going to be industry-shaping and game-changing.
  17. What we’re going to do is make the infrastructure secure. Literally. We are going to integrate more of those functionalities directly into the infrastructure. Native encryption in vSphere, NSX microsegmentation, AirWatch. These things are going to take more of that functionality and make it that you have to turn it off, not turn it on. We’re simply going to make these things go away. And then we’re going to partner deeply with the key foundational platforms and products and integrate more of those functionalities away. And then finally, enable a world where cyber hygiene is standard and common. This fragmented, insecure environment that we have today—we have to come to a world where we bring those pieces together and enable the basics of encryption, strong identifications, software upgrades and patch. We have a fundamental challenge that we can enable a more secure environment than ever before.
  18. Myth #4 - “Enterprise mobility is fragmented, insecure, and my user experience sucks.” So other than that, what do you think? Sounds pretty good.
  19. Well—this is my car, by the way, I drive an i8. Looks cool, feels good, goes fast. That’s not me in the picture. But this is the kind of Apple store elegance that we want and expect, but when we go to our corporate environments, what we get is what is Complicated. Difficult.
  20. And what we need to enable is that ability to stitch together all of these silos of innovation into an overall solution.
  21. Once again we see way too many logos, way too many customers. And our opportunity is to displace not just one of these, but many or most of these companies. Delivering a compelling user interface. Delivering an integrated solution that brings all of those pieces together. Delivering identity, desktop-mobile management, security, and to make it cool like an i8!
  22. Consumer simple, and enterprise secure. That’s what we will do to address this myth of mobility and the end-user space.
  23. Now, Myth #5 -- All apps will be built via containers and VMware becomes irrelevant in that process.
  24. We were not aggressive in addressing the OpenStack challenge to our business. It has taken us years to navigate on top of that trend with VMware integrated OpenStack. I want you to be very clear today: VMware loves containers. We will not be late in embracing containers. Containers are much more important. They automate the application development, deployment, and lifecycle management. We are grabbing this trend much more aggressively. Let me hear you say it: “VMware loves containers.”
  25. Now, as we think about this — why is it good for our business? Well, the first thing is—analysts expect, as people refactor their applications to containers, there’s a 10x increase in the number of containers. 10x – So that’s 10x the number of ports that need NSX connectivity. That’s 10x the number of storage attach points. 10x the number of elements that need management. What do you think – 10x? This is a huge opportunity for us, and IDC, even before we have even started to really deliver our platform, 70% get wrapped in VMs. 70% of 10x – What an extraordinary opportunity for VMware – to be the company that delivers the infrastructure to create.
  26. Once again, the market is chaotic. Way too many players, nobody’s making money, it’s early in this industry formation. Who’s going to win?
  27. And against that, we’re going to solve the fundamental dilemma. We’re going to allow the infrastructure folks to have an infrastructure that enables a container world. We’re going to solve this dilemma of operations, and to uniquely allow customers to say yes, to containers, to their developer teams. We are uniquely positioned to make containers enterprise-ready. And between VIC (our VMware Integrated Containers) and Photon, an all-in, purpose-built stack, we are the company to bridge those two worlds and deliver an enterprise ready platform for a container-oriented world. We’re going to partner deeply with Pivotal and other key technologies in the space. We love containers.
  28. Driving Alignment: Customer Strategic Priorities and VMW Vision --Always start with the customer strategic IT priorities – 4 areas of priority for the IT teams we serve... --Tight alignment between customer priorities and VMW vision