2. Dynamically
Controlling
Business
Transac6ons
• We
deliver
systems
that
gives
you
dynamic
control
of
business
transac4ons
on
the
Internet.
• By
dynamically
controlling
business
transac4ons,
you
can
secure
&
manage
your
applica4ons,
systems
&
informa4on
assets
on
the
Internet
in
real
4me.
3. Why
Manage
&
Secure
Business
Transac6ons?
• Good
business
transac4ons
generate
revenue
• Bad
business
transac4ons
destroy
revenue
caused
by:
1. Security
Viola6ons
2. Incorrect
Opera6ons
3. Regulatory
and
Financial
Non-‐Compliance
4. Low
Performance
4. Decision-‐Zone
Systems
Delivery
1. Real
Time
cyber
security
protec4on
system
(process
firewall)
for
detec4ng
anomalous
events
on
the
internet
with
root
cause.
2. Real
Time
cyber
security
retalia4on
system
for
responding
to
anomalous
event.
3. Real
4me
performance
management
system
for
detec4ng
SLA
(Service
Level
Agreement)
viola4ons
4. Real
4me
opera4ons
or
marke4ng
system
for
detec4ng
anomalous
behaviors
or
customer
trends
5. Real
4me
anomaly
dashboard
portal
for
opera4ons
and
management
strategic
analysis
6. Discovery
system
that
validates
enterprise
processes
or
unusual
processes
running
on
the
internet.
5. Decision-‐Zone
Consul6ng
Services
1. Business
Process
Iden4fica4on
Services
2. System
Integra4on
Services
3. SoQware
Design
&
Implementa4on
Services
4. Deployment
and
Support
Services
6. Cost
Comparisons
IBM$STATIC$CONTROL$ DZT$DYNAMIC$CONTROL$
Sta4c
control
solu4ons
do
not
provide
applica4on,
systems
and
informa4on
asset
protec4on
8. Cyber
Security
&
Management
Requirements
• Cyber
security
solu4ons
must
provide
you
with
the
ability
to
dynamically
control
business
transac1ons
on
the
internet.
• Management
solu4ons
must
provide
you
with
the
ability
to
dynamically
control
business
transac1ons
on
the
internet.
9. Cyber
Security
&
Management
Solu6ons
• DPM
soQware
(dzShield)
gives
you
the
dynamic
control
for
securing
and
managing
business
transac4ons
on
the
internet.
US
Patent
7908160
10.
DPM
Provides
Maximum
Cyber
Security
USER
AUTHENTICATION
SYSTEM
ACCESS
ALLLOWED
FOR
THE
RIGHT
USER
PASSWORD
PROCESS
AUTHENTICATION
SYSTEM
ACCESS
ALLOWED
FOR
ONLY
RIGHT
PROCESS
COMBINATIONS
DATA
MINING
NO
AUTHENTICATION
SYSTEM
ACCESSED
MATCHES
ALL
WRONG
PROCESS
COMBINATIONS
TO
IDENTIFY
BREACHES
DIGITAL
PROCESS
MANAGEMENT
11. The
Problem
• We
have
lost
the
control
of
business
transac6ons
on
the
Internet.
• Current
user
authen4ca4on/single
sign-‐on
technologies/methods
are
INEFFECTIVE
in
defea4ng
cyber
security
intrusions
in
systems
and
applica4ons.
• Current
data
mining
technologies/methodologies
provide
only
limited
sta4c
views
for
managing
business
transac4ons
on
the
internet.
12. Business
Transac6ons
-‐
Introduc6on
• Business
Processes
handle
business
transac6ons
• The
lifecycle
of
a
business
transac6on
is
controlled
by
the
state
of
the
process
and
events.
• The
events
represent
informa1on
exchange
between
systems.
• The
states
determine
when
the
exchange
should
take
place
13. How
our
DPM
Technology
Controls
Business
Transac6ons
on
the
Internet?
• We
use
your
business
process
defini6ons
as
a
guide
to
determine
if
previous
linkages
EXIST
with
the
current
business
transac4on
on
the
internet.
• Bad
Business
Transac4ons
are
ad
hoc
Transac6ons
without
Linkages.
“Think
Combina4on
Locks”
• Causal
Inference
Engines
can
automa4cally
Detect
Bad
Transac4ons.
• Causal
Inference
Engines
gives
DPM
the
ability
to
control
business
transac4ons
on
the
internet.
14. Thank
You
Rajeev
Bhargava
rb@decision-‐zone.com
647-‐6280-‐300
Internet