SlideShare une entreprise Scribd logo
1  sur  203
Télécharger pour lire hors ligne
Promoting growth through innovation
Jon Lyons
Board Director
Business Council of Mongolia
Since June 18, 2019
DIGITAL ENTERPRISE 2019
WHAT IS THE BUSINESS COUNCIL OF MONGOLIA?
DIGITAL ENTERPRISE 2019
Independent member-based, self-governing, non-profit, non-governmental organization (NGO)
– Established in 2007.
DIGITAL ENTERPRISE 2019
BCM PURPOSE
Vision
To deliver value for the public, the members, and the employees by
advocating economic freedom and property rights provided by the
Constitution of Mongolia and protecting and promoting the common
lawful interests of members for a fair, stable, and internationally
competitive business environment.
Mission
• To equip members with an information platform that provides up-to-date policy and
business research, training and knowledge sharing.
• To develop and promote economic and sector policy recommendations through
engagement with the BCM members, the government and the wider public.
• To provide networking and other services that support doing business in Mongolia.
DIGITAL ENTERPRISE 2019
Media / Printing,
9, 4%
IFIs and
Ios, 12, 5%
Tax /
Legal /
Ethics,
11, 5%Growth &
Innovation, 16, 7%
Education /
Training, 14, 6%
Food & Beverages
/ Hospitality /
Light Industry /
Rretail / Real
Estate, 20, 8%Resources /
Environment,
50, 21%Associations &
NGOs, 18, 8%
Embassies, 25, 11%
Government
Entities, 10, 4%
Energy /
Infrastructure /
Connectivity /
Logistics, 13, 5%
Banking / Finance
/ Capital Market /
Insurance, 37, 16%
BCM MEMBERS BY SECTOR
DIGITAL ENTERPRISE 2019
BCM ORGANIZATIONAL STRUCTURE & BENEFITS
• The highest governing
body of the Organization is
the Board of Directors
(BoD) which consists of 15
member.
• Executive Committee
(ExCo) is the main
operational and monitoring
body of the Organization
and has 9 members.
• 6 Working Groups are
functional bodies that
optimize the
implementation of BCM
objectives.
1. POLICY & ADVOCACY
2. NETWORKING & CONNECTIVITY
3. KNOWLEDGE SHARING
4. TIMELY & RELEVANT INFORMATION SHARING
5. MEMBER BUSINESS PROMOTION
6. DISCOUNTS
DIGITAL ENTERPRISE 2019
BCM WORKING GROUPS
2. Economic Freedom and Competitiveness
- Chair: Gund Investment/TUSS Solution
- Vice Chair: Clean Energy Asia
3. Energy, Infrastructure and Connectivity
- Chair: PwC Mongolia
- Vice Chair: Erdenes Oyu Tolgoi
1. Banking, Finance and Capital Markets
- Chair: Trade and Development Bank
- Vice Chair: Tavan Bogd Group
4. Growth and Innovation
- Chair: Mobicom Corporation
- Vice Chair: Erdene Resource Development Corp.
5. Resources and Environment
- Chair: Oyu Tolgoi LLC
- Vice Chair: Erdenes Mongol
6. Tax, Legal and Ethics
- Chair: Avinex LLP
- Vice Chair: Rio Tinto Mongolia
Chaired by senior executives and thought leaders from key economic sectors
DIGITAL ENTERPRISE 2019
BCM WORKING GROUPS FOCUS AND COMPOSITION
Working Group Composition
Chairs / Vice-Chairs / Non-Board Vice-Chairs
Members (BCM Members)
BCM Secretariat (support)
Sector-focused advocacy
Policy and regulatory engagement
Partnership development
Public education & media engagement
Improve sector competitiveness & attractiveness to investors
Policy positions / papers
DIGITAL ENTERPRISE 2019
BCM Growth & Innovation Working Group
Events Practice sharing
Government engagement
Raising awareness about Digital Transformation and its potential benefits to business and
society.
DIGITAL ENTERPRISE 2019
BCM by the NUMBERS
• 1 Annual Summit per year to showcase key business issues
• 18 major policy items were advocated in last 18 months
• More than 80 Knowledge Sharing Sessions since 2007
• More than 100 Monthly Meetings since 2007
• Over 550 issues of NewsWire since 2007
• More than 1,400 active subscribers to BCM Mailing list
• Social media presence: 17,000+ followers on Facebook, 3,000+ on Twitter
DIGITAL ENTERPRISE 2019
CONTACT US
bcmongolia.org @bcmongolia @bcmongolia
Address:
Suite 1103, Floor 11,
Suite 1202, Floor 12,
Express tower, Peace Avenue,
Khoroo 1, Chingeltei District,
Ulaanbaatar
Phone: 976-11-317027
THANK YOU
DIGITAL ENTERPRISE 2019
Digital Literacy for Mongolia
Byambajargal Ayushjav
Founder and CEO
Faro Foundation Mongolia NGO
DIGITAL ENTERPRISE 2019
FARO Foundation Mongolia
Faro Foundation Mongolia (FFM) is a non-
governmental organization that has focused on
promoting adequate and accessible use of social
media and digital literacy in Mongolia.
FFM’s work includes but are not limited to,
promoting online safety, digital literacy, child
protection programs, proper use of social media,
public awareness regarding cyber bullying and
such.
The primary goal of FFM is to implement positive
change in the community through the use of social
media.
DIGITAL ENTERPRISE 2019
THE FOUR INDUSTRIAL REVOLUTIONS
DIGITAL ENTERPRISE 2019
BRIEF HISTORY OF THE DIGITAL REVOLUTION
DIGITAL ENTERPRISE 2019
Social Media Stats Mongolia (May 2018 – May 2019)
DIGITAL ENTERPRISE 2019
Digital Literacy
Digital literacy refers to an individual's ability to find,
evaluate, and compose clear information through
writing and other mediums on various digital
platforms.
Five Essential digital skills:
• Communicating
• Handling information and content
• Transacting
• Problem solving
• Being safe and Legal Online
DIGITAL ENTERPRISE 2019
Digital Literacy Library (Facebook)
DIGITAL ENTERPRISE 2019
Digital Literacy Library
Developed:
Youth and Media at the
Berkman Klein Center for
Internet & Society at
Harvard University
License:
Creative Commons
Attribution-ShareAlike 4.0
International license
DIGITAL ENTERPRISE 2019
Digital Literacy
Digital Literacy Curriculum
is designed for:
Students – 18 Lessons
Teachers – 18 Lessons
Parents – 6 Lessons
DIGITAL ENTERPRISE 2019
Digital Literacy Skills
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
Digital Literacy
DIGITAL ENTERPRISE 2019
THANK YOU
DIGITAL ENTERPRISE 2019
Future of Internet
IDERMUNKH.TS
CEO of MobiNet
Director of Enterprise Business
Division, MobiCom
DIGITAL ENTERPRISE 2019
Internet today
DIGITAL ENTERPRISE 2019
Source: crc.gov.mn
Total ISP contract - 68.03 Gbps
Internet customers by connection type
Internet today
DIGITAL ENTERPRISE 2019
Source: crc.gov.mn
Нийт гэрээт интернет
хэрэглэгчийн 70% нь 2-5 Mbps-н
хурдтай гадаад интернет
үйлчилгээ ашиглаж байна
Internet today
DIGITAL ENTERPRISE 2019
Mongolian Internet Penetration is
65% in 2018, but!
Global Speeds - April 2019
Source: https://www.speedtest.net
Mongolian Speeds - April 2019
Internet today
DIGITAL ENTERPRISE 2019
Source: www.atlasandboots.com
- Global Forecast and Trends of Internet
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
Content Delivery Networks (CDNs) will carry
72% percent of Internet traffic by 2022 up
from 56 percent in 2017.
By 2022, global mobile devices will grow from
8.6 billion in 2017 to 12.3 billion by 2022 - over
422 million of those will be 5G capable.
Fixed IP traffic will grow at a CAGR of 24 percent
between 2017 and 2022, while mobile traffic
grows at a CAGR of 46 percent. Global mobile data
traffic was 9 percent of total IP traffic in 2017
and will be 20 percent of total IP traffic by 2022.
- Global Forecast and Trends of Internet
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
Интернетэд холбогдох төхөөрөмжийн өсөлт IP Video дамжуулалтын өсөлт
M2M интернетийн холболтын тоо
- Global Forecast and Trends of Internet
DIGITAL ENTERPRISE 2019
Source: www.gartner.com
2018 2019 2020 2021 2022
Cloud Business Process Services
(BPaaS)
45.8 49.3 53.1 57.0 61.1
Cloud Application Infrastructure
Services (PaaS)
15.6 19.0 23.0 27.5 31.8
Cloud Application Services (SaaS) 80.0 94.8 110.5 126.7 143.7
Cloud Management and Security
Services
10.5 12.2 14.1 16.0 17.9
Cloud System Infrastructure
Services (IaaS)
30.5 38.9 49.1 61.9 76.6
Total Market 182.4 214.3 249.8 289.1 331.2
Public Cloud үйлчилгээний орлогын төлөв
(Billions of U.S. Dollars) DDoS attacks-н төлөв
- Conclusion of Forecast
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
IoTCDN
Cloud
Services
IP
Video
Big
data
Security
- What should do ISP’s for Future demand?
- Future of Internet service
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
- More internet cache systems (CDN)
- Most affordable M2M service packages
- Future of Internet service
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
- More reliable and stable internet peering
- More secure network, system and operation
Ping - 50ms
Layer - 3
- Future of Internet service
DIGITAL ENTERPRISE 2019
Source: www.cisco.com
- More speed in Fixed broadband
- And key is good
support and service
50Mbps, 100Mbps
THANK YOU
DIGITAL ENTERPRISE 2019
Contact Center &
Customer Experience
B.BAYARMAA
CXO
MobiCom Corporation LLC
DIGITAL ENTERPRISE 2019
DIGITAL ENTERPRISE 2019
CC Agents ~300
Daily 37k
Monthly 1.1 mln
DIGITAL ENTERPRISE 2019
CONTACT CENTER
2018-2019
2016-2017
2222
1800-2222
1800-1199
2014-2015 7577-2222
2013-2014 Integrated Customer Service Center
2011-2012 333311 2288
2009-2011
2299 2277
Most PSP 2233
2004-2008 2244
2002-2003 11-312222 2222
OUTSOURCING Business FACILITY RENT Business
1800-1917 7555-5555 1800-1937 11-315757
1800-1200 1800-1289 1800-1883 1900-2103
7575-2000 1800-1200 1800-1801 1800-1289
1900-1199 1900-1199
1900-1199 1800-1200
1900-1199
1800-1200 7575-3636
1900-1199 11-327575 11-312234
7711-7711
11-315757
2005 2010 2011-2013 2014 2014-2017 2018
DIGITAL ENTERPRISE 2019
16 years experience
Know How
IVR
 Self–Service
 Self–Sales
INTRODUCED FIRST TIME IN MONGOLIA
 Call center
2222 (toll-free)
 Telemarketing
 24/7 Service
 Call
distribution
 Smart call
distribution
 Customer
Segment
 Implemented
25 KPI's for
Call Center
 Workforce
management
(WFM)
DIGITAL ENTERPRISE 2019
CONTACT CENTER SYSTEM
Since 2017
Advanced Contact
Center Technology
 Channel based architecture
 Skilled HR base, training &
monitoring complex system
2005-2016
Customer Experience
Omni channel
High integration possibility
Smart feature / Smart routing
Workforce Optimization
Self - Service IVR
DIGITAL ENTERPRISE 2019
TO IMPROVE CUSTOMER EXPERIENCE
 To provide personalized & prompt customer service
to MobiCom customers and partners, through Omni-
channel, resolve their issues
 To deliver customer voice & request to the top
management team
 To support company’s sales by up & cross sales
 To care MobiCom customers, increase satisfaction
SMART DISTRIBUTION
DIGITAL ENTERPRISE 2019
DIGITAL ENTERPRISE 2019
 Easy
 Prompt
IVR Self-sales
Data package
MCA
HiTone
Data gift
Unitloan
Hybrid Payment
Surprise - 596
~800k
Self-sales
7 types self-sales
IVR Self-Service
Bill info
Handset configuration
Candy balance
Bank account
Data package balance
Handset Leasing condition
Get puk code IVR
SMS loan amount by sms
SMS loan payment by sms
~1mln
Service activation
9 types self-service
DIGITAL SERVICE
DIGITAL ENTERPRISE 2019
я
 Call forecast, HR forecast
 WFM is powerful tool which can organize time management & HR
Work Force Management program
WORK FORCE MANAGEMENT (WFM)
DIGITAL ENTERPRISE 2019
SERVICE QUALITY
DIGITAL ENTERPRISE 2019
Customer Journey Analytics
ALL CHANNEL’S
INFORMATION
PAST
NOW
FUTURE
SAME
BEHAVIOR
CUSTOMER
EXPERIENCE
ONE PLATFORM
SINGLE CUSTOMER VIEW
DIGITAL ENTERPRISE 2019
Hybrid line
Status: Active
Package: Hybrid - 19,900
Segment: Business USINESS
BOLD Gansukh
26 ages
KHAN-UUL, 3 KHOROO
TELMUUN
SINGLE
CUSTOMER VIEW
9933**** By month
CUSTOMER’S SERVICE:
HITONE
MCA
LEASING
DAILY VAS
CLIR
CUSTOMER’S HISTORY:
09:15 – 2222 – about data package
10:00 – NPS – 4 point
17:20 – 592 – 1 day data
19:03 – 2222 – data complaint
19:00 – Mobile bank - 19,900₮ payed
UNIT – Dealer
PAYMENT- Mobile bank
CHANNEL:
Now
uses
IPHONE 6S
Web
SPOS
Candy app
Internet
CARE
Usage Data
7.5GB
NPS
-15.5%
OFFER
CUSTOMER JOURNEY
DIGITAL ENTERPRISE 2019
Human-Assisted
Reach
Channels
Coverage
SMS
• Single Channel
• Interaction Focus
• Next up staff
• Work Mix is Broad
• Siloed Multi-Channel
• Interaction focus
• Skill based Routing
• Manual Quality Management
• Work Mix Complex
• Touchpoints Siloed
• WFO siloed
• Analytics by Channel
• Journey Orchestration
• Multi-modal, Cross-Channel
• Predictive and Proactive
• Journey Intent Routing
• Soft Switching (egWebRTC)
• Continuous WFO
• Journey Analytics & Insights
• CX Work Item SLAs Enforced
CUSTOMER EXPERIENCE CENTER
1960-2005 2006-2016 Since 2017
CONTACT CENTERCALL CENTER
Enterprise-Wide
CC MILESTONE
DIGITAL ENTERPRISE 2019
CUSTOMER ENGAGEMENT CYCLE
CUSTOMER EXPERIENCE
PLATFORM
IVR
voice Social
Contact
Center Chat Web site
Shop/
BranchE-mail
Mobile
App
SELF-SERVICE PAYMENT CUSTOMER SERVICE
DEALER SERVICE IVR SALES
MARKETING
SUPPORT
CUSTOMER
JOURNEY
SINGLE
CUSTOMER
VIEW
WFM
SERVICE
QUALITY
THANK YOU
DIGITAL ENTERPRISE 2019
The Game Changer of Digital Enterprise
Juniper Network Strategy and Solution
Norman Lam CEO
VP & GM – Greater China
Juniper Networks
DIGITAL ENTERPRISE 2019
At A Glance
Sunnyvale, CA
HEADQUARTERED
1996
FOUNDED
$4.648B
2018 REVENUE
9,300
EMPLOYEES
88
Locations
43
COUNTRIES
24/7 AVAILABILITY
TO ADDRESS ALL CUSTOMER NEEDS
GLOBAL REACH ++ +
17 out of 20
WORLD’S
LARGEST BANKS
7 out of 10
TOP GLOBAL
UNIVERSITIES
More than 1,400
LOCATIONS FOR
NATIONAL GOVERNMENTS
10 out of 12
TOP TECHNOLOGY
COMPANIES
9 out of 10
TOP GLOBAL
WEB SERVICE
PROVIDERS
10 out of 10
WORLD’S LARGEST WIRELESS &
WIRELINE TELECOM COMPANIES
REACHING THE HIGHEST STANDARDS ENCOURAGING FUTURE INNOVATORS
OUR MISSION Connect Everything. Empower Everyone. OUR VISION Engineering Simplicity
WHO
TRUSTS
US
DIGITAL ENTERPRISE 2019
THE INTERNET OF THINGS
– EVERYTHING IS
CONNECTED
connected devices by
202575B
5G WILL ENABLE A NEW
BREED OF MOBILE APPS
Is how much faster 5G is
estimated to be over 4G60x
A.I. HAS
EMERGED
of business leaders say A.I.
will be a business advantage
%
80
THE CLOUD IS EATING
THE WORLD
%
50 of enterprise applications
in the cloud by 2020
FIGHTING CYBER-CRIME
AND LOSING
will be spent on fighting
cybercrime in 2022$8T
THE WORLD IS CHANGING FAST
DIGITAL ENTERPRISE 2019
AND OUR OPPORTUNITY IS IMMENSE TO…
DISTRIBUTE CLOUDS
TO ENABLE 5GAND
IoT
DELIVER THE
SOFTWARE DEFINED
NETWORK
HELP COMPANIES
BUILD CLOUDS
CONNECT
PEOPLE
TO CLOUDS
Our intelligent SDN solution
enables customers to
achieve open, intelligent and
flexible business objectives
from cloud design to
implementation and post-
operation management.
We help our customers build
and run their cloud
environments with world-
class infrastructure
We build the best core,
edge, metro, and enterprise
networks to allow our
customers and their
customers to connect to the
cloud
We help our customers
transform their infrastructure
to scale-out distributed
clouds to help unleash the
promise of
5G & IoT
DIGITAL ENTERPRISE 2019
We're recognized As A leader in Data Center
127
GARTNER
MAGIC QUADRANT FOR DATA CENTER NETWORKING FORRESTER WAVE TM
HARDWARE PLATFORMS FOR SOFTWARE DEFINED NETWORKING
JUNOS
Contrail
Automation
High performance
Open standard
automation
DIGITAL ENTERPRISE 2019
WE ARE LEADING THE TELCO TRANSFORMATION
SERVICE & SUPPORT
TECHNOLOGY INNOVATION
Least Important
Source: IHS Markit, December 2017
SP VENDOR RANKING FOR BUYING
CORE/EDGE ROUTERS
Product Reliability
Service & Support
Technology Innovation
Security
TOP SP SELECTION CRITERIA
#1
PRODUCT RELIABILITY
SECURITY
#1
#1 #1
More interesting information
DIGITAL ENTERPRISE 2019
Mary Meeker
Queen of the Internet
The Internet Trends report
Secure and automated multicloud
DIGITAL ENTERPRISE 2019
Enable Digital Enterprise journey
DESTINATION: SECURE & AUTOMATED MULTICLOUD
New IT platform is hybrid & multicloud because it’s the
best:
• Venue
• Resilience
• Agility
• Flexibility
• Economics
…MULTICLOUDSECURE & AUTOMATED…
Top 2 priorities:
• Security:
Failing security can take you from hero to zero immediately
• Automation:
Reliability engineering precedes moving faster for business
It’s no longer only about TCO
DIGITAL ENTERPRISE 2019
SECURE AND AUTOMATED MULTICLOUD – NOT JUST ABOUT CLOUDS
Branch / Remote
Office
Campus / HQ
SaaS Public Cloud
Public Cloud
Data Centers / Private Cloud
Private / Public WAN
DCI
ALL PLACES IN NETWORK TOUCH MULTICLOUD APPLICATIONSPEOPLE & IoT
SECURE and AUTOMATED MULTICLOUD
how what
DIGITAL ENTERPRISE 2019
JUNIPER Open PORTFOLIO
Connected Security
Campus/HQBranch/Remote Office Public CloudData Centers/Private Cloud SaaS Public Cloud
AI-Driven Enterprise Enterprise Multicloud
WAN
JUNIPER ENTERPRISE
Secure and Automate Multicloud
Switching SecurityRouting
Juniper Portfolio
Software
Contrail
MistJunos
Wi-Fi and BLE Services
DIGITAL ENTERPRISE 2019
Connect SEE Secure Deliver
5-STEP Migration to Digital Enterprise
Device Led
Business Led
Operations Led
Architecture Led
Customer Led
DIGITAL ENTERPRISE 2019
We Help our customers Deliver the Amazing
IMPROVE HEALTHCARE TRANSFORM COMMERCE BUILD APPLICATIONS
RETHINK EDUCATION POWER SOCIAL CHANGE EXPLORE NATURE ENCOURAGE DISCOVERY
ENABLE CLEAN ENERGY
DIGITAL ENTERPRISE 2019
Summer everything grown up
DIGITAL ENTERPRISE 2019
THANK YOU
DIGITAL ENTERPRISE 2019
Sophos Solution and How We
Deal With Next-Generation Attack
DIGITAL ENTERPRISE 2019
Stan Ho
SE Manager of China and Mongolia
Sophos Group.
since Nov, 2007
Sophos Snapshot
• Founded in Oxford in 1985
• 3,500 employees
• 327,000 customers
• 100 million users in 150 countries
• 45,000 channel partners
• SophosLabs threat research facility
• “Channel First” go-to-market model
Sophos Headquarters, Abingdon, UK
Sophos History
Evolution to complete security
1985
Founded in Abingdon
(Oxford), UK
Peter Lammer
c1985
Jan Hruska
c1985
Acquired
DIALOGS
Acquired
Astaro
2011 2012 2013
Acquired
Utimaco
Safeware AG
20081988
First
checksum-
based
antivirus
software
1989
First signature-
based antivirus
software
1996
US presence
established in Boston
Voted best
small/medium sized
company in UK
Acquired
ENDFORCE
2014
Acquired
Cyberoam
Acquired
Mojave
Networks
Acquired
Barricade
IPO London
Stock Exchange
Launched
Synchronized Security
2007 2015
Acquired
Surfright
2017
Acquired
Invincea
2016
Acquired
PhishThreat
Acquired
Reflexion
2019
Acquired
Avid Secure
Acquired
DarkBytes
Acquired
Rook Security
Sophos Global Sites
San Francisco
Bay Area
Vancouver
Canada
Abingdon
UK
Budapest
Hungary
Singapore
Sydney
Australia
Manila
Philippines
Tokyo
Japan
Milan
Italy
Karlsruhe
Germany
Wiesbaden
Germany
Dortmund
Germany
Paris
France
Ahmedabad
India
Dubai
UAE
Hengelo
Netherlands
Linz
Austria
Bangalore
India
New Delhi
India
Ottawa
Canada
São Paulo
Brazil
Buenos Aires
Argentina
Bogotá
Colombia
Ciudad de México
Mexico
Boston
MA
TW/HK/China
A Leader in Endpoint Protection
“The Sophos Intercept X product, designed to protect against
and recover from the malicious actions related to ransomware
and exploits, proved popular with both existing Sophos Endpoint
Protection customers and as an augmentation to an incumbent
EPP. This momentum continued its increased brand awareness in
the enterprise space.
Also included in the Intercept X purchase are Sophos' EDR-like
capabilities — called Root Cause Analysis — and the ML
malware detection technology from the acquisition of Invincea
was added in late 2017.
Sophos' cloud-based EPP with the Intercept-X platform is a good
fit for organizations that can take advantage of a cloud-based
administration platform, and that value strong protection
against ransomware and exploit-based attacks over advanced
forensic investigation capabilities.”
Gartner Magic Quadrant
ENDPOINT PROTECTION
Source: Gartner (February 2016)
This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all
warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed
in Gartner publications are not representations of fact, and are subject to change without notice.
Magic Quadrant for Endpoint Protection Platforms,
Ian McShane, Avivah Litan, Eric Ouellet, Prajeet Bhajanka; 24 January, 2018
A Leader in Unified Threat Management
Gartner Magic Quadrant
UNIFIED THREAT MANAGEMENT
This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all
warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed
in Gartner publications are not representations of fact, and are subject to change without notice.
Magic Quadrant for Unified Threat Management,
Rajpreet Kaur, Claudio Neiva, 20 September, 2018
Sophos first entered into this MQ publication in March 2012, positioned
in the Leader quadrant – and has retained this position for 6 consecutive
publications
“Sophos is a Leader in the UTM Magic Quadrant. It continues to gain
market share due to ease of use, security feature richness and successful
integration with its endpoint product. It demonstrates strength in its
product vision and roadmap execution, relative to those of some
competitors.”
THREAT LANDSCAPE
Continued rapid growth in new malware
By the end of 2019 over 1 Billion unique malware samples will exist
Total Malware collected over time (AV-Test)
0
100,000,000
200,000,000
300,000,000
400,000,000
500,000,000
600,000,000
700,000,000
800,000,000
900,000,000
The Volume of malware is
staggering
1990’s - Signature based
Anti-Virus
o 1-1 map of ‘checksums’ to
malware
o String Scanning
Requires a Victim to report
the malware so a new
signature can be built
The age of single-use disposable malware
75%
75% of the malicious
files SophosLabs detects
are found only within a
single organization.
400,000
Sophos Labs receives and
processes 400,000
previously unseen malware
samples each day.
The Challenge Of Addressing New Threats
Software Vulnerabilities Reported By Year
Source information NIST National Vulnerability Database as of 1 May 2018
https://beta.nvd.nist.gov/vuln-metrics/visualizations/cvss-severity-distribution-over-time
4639
4150
5286 5186
7937
6487 6446
14647
16517
2010 2011 2012 2013 2014 2015 2016 2017 2018
Top Threats Worldwide
• Active Adversary
• Privilege escalation, cred theft, lateral
movement, exploits, process injection
• Advanced Malware
• Zero-day attacks w/multiple stages
• Worms, Trojans, VB script, PDF,
File-less attacks (cryptominers,
powershell, etc…), bots, rats
• Cryptomining/Cryptojacking
• Legitimate and malicious use of CPU
cycles to generate digital currency
38%21%
33%
5%
Advanced Malware
Active
Adversary
Ransomware
Cryptojacking
3%
Generic
Malware
How we deal with Next-Gen attack
Endpoint and Network Security
Predictive Security
Harness The Power of Data Science to Protect Against Future Attacks
SEEING THE FUTURE IS THE FUTURE OF SECURITY
Deep Learning Neural Network
SMARTER FASTER SMALLER
DEEP
LEARNING
• High Detection Rates
• Gets Better with
More Data
20 – 100 ms
Detection
10 – 20 MB
Model Size
TRADITIONAL
MACHINE
LEARNING
• Low Detection Rates
• Diminishing Returns
with More Data
100 – 500 ms
Detection
500 MB to 1 GB
Model Size
Intercept X with EDR for Endpoints and Servers
ANTI-EXPLOIT
MACHINE LEARNING
ANTI-RANSOMWARE
MALWARE REMOVAL ROOT CAUSE ANALYSIS
STOP UNKNOWN THREATS PREVENT RANSOMWARE DENY THE ATTACKER
Sophos Intercept X: Intelligent EDR
Data
Correlated, Contextualized,
and Organized
Insights
Humanized, Prioritized,
and Actionable
Explore
Search, Investigate, and
Hunt
IT Generalists
Analysts, IR, and SoC
Specialists and Products
Cybersecurity
Experts-in-a-Box
AI Expert Insights
• EDR Starts with the
Strongest Protection
Stop Breaches
before they Start
• Add Expertise,
Not Headcount
“Experts in a Box”
• Guided Incident
Response
Respond with the
Click of the Button
Next-Gen Firewall –Essential Protection Tasks
STEALTH
MALWARE
SOFTWARE
EXPLOITS
CRYPTO
RANSOMWARE
CREDENTIAL
HARVESTING
PROCESS
ATTACKS
UNKNOWn
THREATS Block Attacks
?
Contain Threats
?
Visibility and Control (over users/apps/data)
XG Series Winning Advantages
Industry leading performance with unique connectivity, reliability, and management
1. Flexible Connectivity
3. Easy Management
 Modular desktop options for LTE, DSL, WiFi
 Built-in bypass ports
 Full line of copper and fiber FleXi Port modules
 Unique RED devices
Micro USB Management Ports
USB and HDMI Ports
2. Business Continuity
Redundant Power Supplies across the entire line
Hot swap drives and PSUs on high-end models
4. Industry Leading Performance
Among the highest rated price-performance by NSSLabs
High-performance solid-state storage on every model
Next-Gen XG Firewall
NEW HARDWAREDEEP LEARNING VISIBILITY
• Boosts performance 20+%
• Adds unmatched connectivity
• Best in class business
continuity
• Identifies 100% of
applications
• Uncovers shadow IT, data at
risk
• Unmasks top risky users
• Unparalleled malware
detection
• 3,500 new files convicted
weekly
• Pre-emptive detection
reduces risk
Sophos XG Firewall
The world’s best visibility, protection, and response
1. Exposes Hidden Risks
3. Automatically Responds to Incidents
 Visual dashboard & rich on-box reporting
 Identify risky users and suspicious payloads
 Identify unknown cloud & evasive apps
Unique Security Heartbeat™
Integrates EP Health into rules
Automatically isolate infected systems
2. Blocks Unknown Threats
Full suite of protection – easy to manage
Deep learning
Top performing IPS Engine
XG Firewall + Intercept X =
Stop Ransomware and NextGen Attack
Exposes Hidden Risks
Blocks Unknown Threats
Automatically Responds to Incidents
Security Heartbeat™
Sophos Security Heartbeat – Automated Response
Sophos is the only vendor to use system health in firewall rules
Security Heartbeat™
Servers
XG Firewall Sophos Central
Security Heartbeat™ links Endpoints
with the firewall to monitor health
and immediately share the presence
of threats.
Instant Identification
Security Heartbeat can
instantly share telemetry
about the user, systems and
process responsible
Automated Response
Automatically isolate, or limit
network access, and encryption
keys for compromised systems
until they are cleaned up
Internet
XG Firewall Endpoints
Sophos Central: Partner Dashboard
Partner-Centric
Portfolio Mgmt.
MSP
License Mgmt.
Trial to Purchase
Allows partners to
manage multiple
customer installations
Endpoint Protection
Email Security
Web Gateway
Server Protection
Encryption
Mobile Protection
Wireless
Allows users to access
email, mobile, and
encryption features
Sophos Central
Partner Dashboard Admin Self Service
Firewall Management
Synchronized Security
Cloud Intelligence
Sophos Labs
Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions
| 24x7x365, multi-continent operation |
Malware Identities | URL Database | Machine Learning | Threat Intelligence | Genotypes | Reputation |
Behavioral Rules | APT Rules | App Identities | Anti-Spam | DLP | SophosID | Sandboxing | API Everywhere
Sophos Central
Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations
In Cloud On Prem
Next-Gen Endpoint
Mobile
Server
Encryption
Next-Gen Firewall
Wireless
Email
Web
Kerry Logistics Producer
Head office in
Hongkong
Over 100 Branches
across Word Wide。
Quote
“Sophos has engineered a simple solution that
can help organizations quickly provide secure
internet access both locally and remotely.”
30000+ Computers
Central Endpoint Advanced,
Intercept X,
200+ Servers
Sophos Central Server Protection
Network
100+ XG Firewalls (XG)
Unify
and simplify management
Improved protection
against mail, web, zero-day attack
Analytics
for better discovery and reporting
Chenny Chen, CTO
Unparalleled
Protection
Construction Company
Over 65 years in Taiwan
China, Hong Kong,
Macau, Gurgaon, Kuala
Lumpur
Quote
1000 Computers
Sophos Central Endpoint
Advanced
200 Servers
Sophos Central Server Advanced
Network
56 XG Firewalls w/Web
Protection, 2 iView Appliances
Real-time
network protection and real-time
response across 50 sites in Taiwan and
30 in Hong Kong,China
Automation
Looking for solution to scale
performance and security
Automated
Incident Response
“We use Synchronized Security to protect our
users from ransomware attacks and enhance
our IT security environment.”
Kevin Chueh, CIO
THANK YOU
DIGITAL ENTERPRISE 2019
FireEye Protect Defend Innovate
Lawrence Li
Channel Manager
DIGITAL ENTERPRISE 2019
FireEye
Lawrence Li
DIGITAL ENTERPRISE 2019
©2019 FireEye
On the Front Lines. Every Day.
700+
THREAT RESEARCHERS, PLATFORM
ENGINEERS, MALWARE ANALYSTS,
INTELLIGENCE ANALYSTS, AND
INVESTIGATORS
35+
NATION-STATE
SPONSORED APTs
TRACKED
600K – 1M
MALWARE SAMPLES
COLLECTED DAILY FROM 70+
SOURCES
4
CYBER THREAT
OPERATIONS CENTERS
WORLDWIDE
THOUSANDS
OF INCIDENT RESPONSE HOURS EACH
YEAR
24,000
INTELLIGENCE REPORTS
PUBLISHED IN 2018
FireEye Catches What Others Miss
How We Differ
©2019 FireEye
The FireEye
Ecosystem
7,700 customers worldwide,
FireEye is trusted by more than
including 50% of the Global 2000.
as a Service
Who is ?
5300+ Customers In 67+ Countries 825+ Customers
Customers
Breach Response
$300M Cost
CIO resignation
CEO resignation
$35M Cost
Co-Chair resignation $81M Cost
Governor
Resignation
Bangaladesh Bank
孟加拉國的中央銀行
Fedex https://www.cnbc.com/2017/06/29/fedex-cyberattacks-wanted-to-destroy-more-than-just-money-experts-say.html
Deloitte https://www2.deloitte.com/content/dam/Deloitte/global/Documents/About-Deloitte/gx-FactsSheetforGlobalWebsite-cyber-attack.pdf
Uber https://gizmodo.com/uber-s-new-ceo-was-told-about-the-companys-massive-data-1820722228
Home Depot https://www.consumerreports.org/privacy/home-depot-data-leak-exposes-gap-in-consumer-privacy-protection/
Equifax https://investor.equifax.com/news-and-events/news/2017/10-02-2017-213238821
HBO https://www.vanityfair.com/hollywood/2017/08/hbo-hack-seven-times-larger-sony
Ebay https://uk.reuters.com/article/uk-ebay-password/hackers-raid-ebay-in-historic-breach-access-145-million-records-idUKKBN0E10ZL20140522
Yahoo https://www.reuters.com/article/us-yahoo-cyber-idUSKBN1432WZ?
VTech https://www.reuters.com/article/vtech-cyberattack-fireeye-idUSL3N13S48G20151203
Premera Blue Cross https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/#more-30380
Freds https://krebsonsecurity.com/2015/06/discount-chain-freds-inc-probes-card-breach/
Arbys https://krebsonsecurity.com/2017/02/fast-food-chain-arbys-acknowledges-breach/#more-38024
Sabre corp hospitality https://krebsonsecurity.com/2017/05/breach-at-sabre-corp-s-hospitality-unit/#more-39249
Leader in Cyber
Security Services
177
Leader in Cyber
Threat Intelligence
Leader in
Technology
©2019 FireEye
FireEye
Weaker Strategy Stronger Strategy
Weaker
Current
Offering
Stronger
Current
Offering
Cyber
Incident
Response
Services
Q1 2019
Challenger Contender Strong Performer Leader
Optiv
CrowdStrike
Aon
Cylance
IBM
Deloitte
Secureworks
KPMG
Trustwave
PwC
EY
NCC Group
Verizon
Booz Allen
©2019 FireEye
External
Threat
Intelligence
Services
Q3 2018
FireEye
Weaker Strategy Stronger
Weaker
Current
Offering
Stronger
Current
Offering
Cyber
Incident
Response
Services
Q1 2019
Challenger Contender Strong Performer Leader
Optiv
CrowdStrike
Aon
Cylance
IBM
Deloitte
Secureworks
KPMG
Trustwave
PwC
EY
NCC Group
Verizon
Booz Allen
©2019 FireEye
FireEye
Weaker Strategy Stronger
Weaker
Current
Stronger
Current
Offering
Challenger Contender Strong Performer Leader
Optiv
CrowdStrike
Aon
Cylance
IBM
Deloitte
KPMG
Trustwave
EY
NCC Group
Verizon
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
Secureworks
External
Threat
Intelligence
Services
Q3 2018
©2019 FireEye
FireEye
Weaker Strategy Stronger Strategy
Weaker
Current
Offering
Stronger
Current
Offering
Challenger Contender Strong Performer Leader
Optiv
CrowdStrike
Aon
Cylance
IBM
Deloitte
KPMG
Trustwave
EY
NCC Group
Verizon
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
Secureworks
External Threat
Intelligence
Services
Q3 2018
Asia/Pacific
Threat Lifecycle
Services 2018
Vendor
Assessment
Q3 2018
Strategies
Capabilities
Participants Contenders Major Players Leader
©2019 FireEye
Asia/Pacific
Threat
Lifecycle
Services 2018
Vendor
Assessment
Q3 2018
Optiv
CrowdStrike
Aon
Cylance
Deloitte
KPMG
Trustwave
NCC Group
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
Strategies
Capabilities
Participants Contenders Major Players Leader
RSA
Wipro
HCL
Fujitsu
DXC IBM
Deloitte
TCS
NTT
Symantec FireEye
Quann
Verizon
EY
Secureworks
©2019 FireEye
0EnrichmentDetections70
0 Overall Efficacy Score 288
Asia/Pacific
Threat Lifecycle
Services 2018
Vendor
Assessment
Q3 2018
Optiv
CrowdStrike
Aon
Cylance
Deloitte
KPMG
Trustwave
NCC Group
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
Strategies
Capabilities
Participants Contenders Major Players Leader
RSA
Wipro
HCL
Fujitsu
DXC IBM
Deloitte
TCS
NTT
Symantec FireEye
Quann
Verizon
EY
Secureworks
Forrester Scoring
of the MITRE
ATT&CK
Framework
Evaluation (EDR)
Q1 2019
©2019 FireEye
0EnrichmentDetections70
0 Overall Efficacy Score 288
Forrester Scoring of
the MITRE ATT&CK
Framework
Evaluation (EDR)
Q1 2019
Optiv
CrowdStrike
Aon
Cylance
Deloitte
KPMG
Trustwave
NCC Group
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
RSA
Wipro
HCL
Fujitsu
DXC
IBM
Deloitte
TCS
NTT
Symantec
FireEye
Quann
Verizon
EY
Secureworks
CarbonBlack
Endgame
MicrosoftSentinelOne
CounterTack
RSA
©2019 FireEye
Advanced Malware
Sandbox Market
Percent of Revenue
Q1 2019
0EnrichmentDetections70
0 Overall Efficacy Score 288
Optiv
CrowdStrike
Aon
Cylance
Deloitte
KPMG
Trustwave
NCC Group
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
RSA
Wipro
HCL
Fujitsu
DXC
IBM
Deloitte
TCS
NTT
Symantec
FireEye
Quann
Verizon
EY
Secureworks
CarbonBlack
Endgame
MicrosoftSentinelOne
CounterTack
RSA
100
%
0%
Forrester Scoring of
the MITRE ATT&CK
Framework
Evaluation (EDR)
Q1 2019
©2019 FireEye
Advanced
Malware
Sandbox
Market
Percent of
Revenue
Q1 2019
Optiv
CrowdStrike
Aon
Cylance
Deloitte
KPMG
Trustwave
NCC Group
Booz Allen
PwC
Hold
Kaspersky Labs
Group-IB
Flashpoint
Recorded Future
Digital Shadows
ProofPt
Intel 471
Verint
IntSights
RSA
Wipro
HCL
Fujitsu
DXC
IBM
Deloitte
TCS
NTT
Symantec
FireEye
Quann
Verizon
EY
Secureworks
CarbonBlack
Endgame
Microsoft
SentinelOne
CounterTack
RSA
100
%
0%
Company A
Company B
Company C
Company D
Company E
Company F
Company G
Company H
CheckPoint
Cisco
ForcePoint
Fortinet
LastLine
McAfee
Palo Alto Networks
©2019 FireEye
Winning with FireEye Email Security
Best Email Security Solution
WINNER: FireEye Email Solution
Source : http://www.scawardseurope.com/results-2018/
Source : https://www.crn.com/rankings-and-lists/ti2018.htm
Source : https://www.scmagazine.com/2019-trust-awards/
Source : https://www.scmagazine.com/home/security-news/company-news/the-winners-of-the-2019-sc-awards-honored-in-the-u-s/
Jun 2018
Security - Email
WINNER: FireEye Email Solution
Nov 2018
Best Email Security Solution
WINNER : FireEye Email Solution
Dec 2018
FireEye Helix
FireEye Security Ecosystem
Contextual
Intelligence
Alerts/Case
Management
Investigative
Workbench
Orchestration
& Automation
Central
Management
FireEye
Network Security
FireEye
Email Security
FireEye
Endpoint Security
3rd Party
Solutions
FireEye
Threat Analytics
Advanced
Intelligence
Expertise
On-Demand
3rd Party
Apps
Managed
Defense
Expertise Threat
Intelligence
Partner
Services
Community
Marketplace
Answers
Research Tools
Ideas
Mandiant Services
Strategic Advisory
Technical Assessment
Incident Response
DIGITAL ENTERPRISE 2019
DIGITAL ENTERPRISE 2019
THANK YOU
DIGITAL ENTERPRISE 2019
Security in the IoT Era: Device Visibility an Control
Michael Lafuente
Senior Technical Consultant
APJ Region
FORESCOUT Technology
DIGITAL ENTERPRISE 2019
DIGITAL ENTERPRISE 2019
Digital Transformation
DIGITAL ENTERPRISE 2019
DIGITAL ENTERPRISE 2019
Confluence of Macro Trends Creating Visibility Challenges
Growth of Devices &
Platform Diversity
1990s 2020
Innumerable device-specific operating systems (OS)
Cannot get agents onto new devices
Cannot write agent-based software for every OS
DESKTOP LAPTOP MOBILE
CLOUD
VIRTUAL
SERVERS
SERVERS
DATA CENTER
Cloud Adoption Creates
New Challenges
Multiple Device Locations and Access Points
Heterogeneous Environment with Multiple Vendors
De-centralized Management
OT Convergence With IT
Heightens Risk
CORPORATE HQ
• CRITICAL
INFRASTRUCTURE
• INDUSTRIAL
CONTROL SYSTEMS
INFORMATION
TECHNOLOGY
OPERATIONAL
TECHNOLOGY
OT networks are no longer physically separated
Threats moving between cyber & physical dimensions
Assets are highly vulnerable & rarely can be patched
DIGITAL ENTERPRISE 2019
Visibility & Control Gap Vulnerability
Increasing
Attack Surface
DIGITAL ENTERPRISE 2019
The Hidden Challenges of IoT
IDC conducted in-depth
interviews of 7
ForeScout customers to
understand business
value provided by
ForeScout’s See, Control
and Orchestrate
capabilities
DIGITAL ENTERPRISE 2019
Broad Recognition of Growth of IoT on Networks
DIGITAL ENTERPRISE 2019
Despite this seemingly positive emphasis on IoT Security, some disturbing trends emerged
76% are Rethinking their Security Strategy
Due to IoT Security Concerns
DIGITAL ENTERPRISE 2019
Accepting a Significant Level of Security Risk
DIGITAL ENTERPRISE 2019
So Who is Addressing IoT Security? SOC or LoB?
Disagreement on Security Responsibility
DIGITAL ENTERPRISE 2019
Confident on IoT Security…Until They Are Tested
DIGITAL ENTERPRISE 2019
So Why Don’t They Do Anything About It?
Complacency – Respondents & C-level
“Tolerance” (for risk) seems to be less about what they are comfortable with, and more about what they are powerless to control.”
- Forrester 2017
DIGITAL ENTERPRISE 2019
Considerations
to Reduce Risk
DIGITAL ENTERPRISE 2019
Promote a Security Culture
DIGITAL ENTERPRISE 2019
Improve Visibility
DIGITAL ENTERPRISE 2019
Practice Good Cyber Security Hygiene
DIGITAL ENTERPRISE 2019
Segment Accordingly
DIGITAL ENTERPRISE 2019
Boost Strength of Security Investments
DIGITAL ENTERPRISE 2019
How can ForeScout help?
DIGITAL ENTERPRISE 2019
Servers
Virtual Servers
Network
MobileUsers
Private Cloud Public Cloud
Physical Security
Security
Building
Automation
Controller
Systems
IoT Devices Physical
Equipment
Laptops /
Desktops Badging
Campus Data Center Cloud Operational TechnologyIoT
THE DEFACTO STANDARD FOR DEVICE VISIBILITY ACROSS THE EXTENDED ENTERPRISE
Our Product Vision
DIGITAL ENTERPRISE 2019
DEVICE
VISIBILITY
ASSET
MANAGEMENT
DEVICE
COMPLIANCE
NETWORK ACCESS
CONTROL
NETWORK
SEGMENTATION
INCIDENT
RESPONSE
Campus IoT Data Center Cloud OT
Scalable Across Extended Enterprise Networks
The ForeScout Platform Addresses The Visibilty Gap
DIGITAL ENTERPRISE 2019
Time-to-Value
65 days – average time for visibility roll out
74
Net Promoter Score
(above security industry average)
Why Customers Choose FORESCOUT
Visibility
Across all major industries including
Government, Financial Healthcare
Discover 30% more devices on average
Orchestration
Increase value of existing investment
Reduce MTTR with automation
2900+
Customers in over 80 countries
2M+ Devices in a single deployment
4.7M+ Device in Device Cloud
57M+ Total Device capacity sold
DIGITAL ENTERPRISE 2019
THANK YOU
DIGITAL ENTERPRISE 2019
Huaming Wu
DIGITAL ENTERPRISE 2019
Driving the Enterprise Digital
Transformation
VMware Senior Consultant
Agenda
251
 VMware Introduction
 Market position and our vision
 Enterprise Digital Transformation
 Why need to choose digital transformation
 How to help our customer make the decision
 What ‘s the Benefit for choosing VMware
 Success Story
DIGITAL ENTERPRISE 2019
252
Industry-Specific
Solutions
Global and
Local Presence
Compatibility and
Open Source Integration
Industry and
Domain Expertise
Strategy and
Planning Expertise
Advanced
Technology Capabilities
1,000+
VMware Service
Professionals
100+
Consulting
Partners
75,000
Solution
Partners
$8.97B
annual
revenue of
2019
5,00
Customer include
Top 500 enterprises in the
world.
A Trusted Partner for Your Digital Business Journey
VMware is the fourth biggest basic software companies!
253
Wide-Ranging Customer Success
EDUCATION FINANCIAL
SERVICES
GOVERNMENT TECHNOLOGY HEALTHCARE/
PHARMA
MANUFACTURING/
OTHER
The Best 100
Ent US #7
Pat Galsinger Fortune
Executive Leader #2
Leader of
Hybrid Cloud
Management
Market Scape
Leader of Unified
Endpoint
Management
Leader of Hyper
Converged
Infrastructure
Market share
Leader of Cloud
and IT Automation
Leader of HCI
and WAN Edge
Infrastructure
Magic Quadrant
The Best Container
Platform Management
Award by EMA
VMware CEO
Pat Galsinger
CRN 2018
Top 100
Executives #1
VMware Awards and Recognitions in 2018
DIGITAL ENTERPRISE 2019
255
Our mission
We create an experience
that makes the cloud invisible and
easily to control so that our
customers can focus on transforming
their business
Agenda
256
 VMware Introduction
 Market position and our vision
 Enterprise Digital Transformation
 Why need to choose digital transformation
 How to help our customer make the decision
 What ‘s the Benefit for choosing VMware
 Success Story
DIGITAL ENTERPRISE 2019
257
Transformation goes pragmatic
As brands try to connect
to customers’ lifestyles
and habits, what real
purpose do they serve
in those moments?
RPA and AI technology
innovations will
combine to create
business value
Automation is often
placed in strategic and
operational terms.
 Manufacturing
 Retail.
 Financial services
 Transportation.
•
20% of brands will
refine and
revitalize purpose.
RPA and AI will join
forces to create digital
workers for more than
40% of enterprise.
25% of leaders will
use automation to
address the talent
scarcity squeeze.
---- source from : <<Predict 2019 Transformation goes pragmatic>>
Investors are
looking for the
industries top 4
list.
SaaS
Replatform
Keep app unchanged,
move to new
environment
Refactor
Modify app, new
environment, on-prem
or in the cloud
Multi-Tier Hybrid
Shift portions of multi-tier
app to public cloud
Replace
Move to SaaS
version of packaged app
Develop for Cloud
New cloud native app
deployed on-prem &
IaaS
Maintain
Keep app unchanged,
modernize environment
Cloud Native Apps
Time to market • Innovation • Scale • Differentiation
Existing Apps
Reduce Costs • Security • Reliability • Control
Application needs are driving IT strategies and directions
Data Center and Cloud solutions must match the needs of each application
AGILITY
Accelerate time to Market
Deliver new services that differentiate your business
Optimize Costs
Apply your IT budget based on ROI and
app requirements
Maximize Security
Unify security from the data center to the cloud and device
Manage Across Clouds
Manage cost, usage, capacity planning, performance,
and security across all clouds and on-prem
Scale Seamlessly
Seamlessly add resources across
private and public clouds, expand globally
COMPLEXITY
AND RISK
Extend to any Cloud
everage consistent infrastructure from data
center to the cloud
The Challenge for IT:
Increase IT agility while reducing complexity and risk
All software will run on a cloud
Enterprise‘s application to run on a cloud
Self-service Scalable Rich services
Secure,
compliant
Self-
optimized
Resilient
261
VMware Cloud Management Platform
CMP as licensed software (vRealize)
Cloud
Assembly
Service
Catalog
Code
Stream
Application
Discovery
Log
Intelligence
Wavefront Network
Insight
CMP as a Service (VMware Cloud Services)
Hybrid Cloud Public Cloud
CONTAINERSVIRTUAL MACHINES KUBERNETESVM
Cloud
Health
Self-Driving Operations
Programmable
Provisioning
Application Operations
Cloud
Health
Cloud
Assembly
Service
Broker
Code
Stream
Wavefront
Log
Intelligence
Network
Insight
vRealize
Code Stream
2.4.2
vRealize
Network Insight
4.1
vRealize
Operations
7.5
vRealize
Log Insight
4.8
VMware
Integrated
OpenStack
5.1
vRealize
Automation
7.6
vRealize
Lifecycle
Manager
2.1
vRealize
Business
for Cloud
7.6
Cloud Management Platform
Consistent Developer Experience
262
Industrializing Private Cloud
• DevOps for CMP with
vRS Lifecycle Manager
• AI/ML-based performance &
capacity optimization with
integrated automation & cost (vRA-
vRBC-vROps)
• Native integrations with
SDDC technologies, including VMC
on AWS
• Cloud Agnostic –
common approach to hybrid and
multi-cloud (AWS, Azure, GCP, VCPP,
and more)
• Developer-friendly
• VMs and Container-based
applications
• Leader in Forrester Private and
Hybrid Cloud Wave
• #1 market share in
4 IDC reports
• Positioned favorably
by Gartner
• Leader in Ovum
Decision Matrix
Why VMware
• Best for SDDC
and beyond
• Most Complete
• Trusted
Market Leader
263Confidential │ ©2019 VMware, Inc.
Use Case
DIGITAL ENTERPRISE 2019
264
China Mobile
China Mobile Communications Corporation(CMCC) is a Chinese state-owned telecommunication corporation
that provides mobile voice and multimedia services through its nationwide mobile telecommunications network
across mainland China. China Mobile is the largest mobile telecommunications corporation by market
capitalization, and also the worlds largest mobile phone operator by total number of subscribers, with over 902
million subscribers as of June 2018.
CMCC began to set up its Public Cloud business in Inner Mongolia, because the power supply and the climate,
and thus comes the 139 Cloud of CMCC Inner Mongo.
Business issues VMware Solution Business Value
1. Construction Size: 62 Million
square meters , contains 18
datacenter building. And 52.5
thousand cabinets;
2. Total investment : $2 billion ;
3. Functions
• Public Cloud and virtualization
Resource pools
• Multi -tenants help enterprise
migrate application to cloud.
• Site Recover services protect
enterprise business available .
1. Storage has double protect method,
even storage failure doesn’t impact the
continuity of the operation;
2. base backup policy , all data are backup
in virtual tape device;
3. comprehensive security policy
• vvSphere
• vSAN.
• NSX.
Base on VMware SDDC and
SDN components build up
the public cloud.
VMwaer vSphere
China Mobile (cont.)
 hotline
266
Yili Group
Yili Group has ranked among the world’s most successful dairy companies( rank 8), It is also the largest dairy
company in China. It offers the most comprehensive range of products. In the course of development, Yili has
always adhered “internationalization” and “innovation”, and insisted to the two fundamentals of “quality” and
“responsibility”. Every day, more than 100 million Yili products are delivered to consumers.
Business issues VMware Solution Business Value
1. International operation is an import
strategy of Yili,offers the most
comprehensive range of products
and serve for the more and more
people;
2. boost the innovation in the dairy
sector, develop the health and
suitable dairy products ;
3. updated Yili's global quality and
safety management systems ;
• Design the IT infra structure in
next 3 years to match the the
requirement of business growth
rapidly
• Build up Active-Active Data Center
and recovery site, support
Seamless data recover in local city
or 5 min recovery to another city.
• vCloud Suite advance
• vSphere、vSAN、NSX
• vxRail /DELL
1. build a bridge for the communication
and exchange of information that is
necessary for production plants,
completely present the situation of a
real time.
2. Yili uses the digital technology to collect
and monitor data, get data value and
turn into attractive models, improve
the quality of service.
3. Accelerate IT-infra agility, support more
management system go
live, improve system stability
Thank You
DIGITAL ENTERPRISE 2019
Machine Data Insight Into The AI World
YANTAO HU
Senior Consultant
Splunk North Asia
DIGITAL ENTERPRISE 2019
Top Predictions for 2019 by Splunk
DIGITAL ENTERPRISE 2019
* Pulling together insights from our thousands of customers and our
dedicated research teams, our experts have assembled a shortlist of
the top predictions for 2019. - Splunk Predictions 2019
Top Predictions for 2019 by Splunk
DIGITAL ENTERPRISE 2019
 Artificial Intelligence and Machine Learning as it breaks out of the lab
 Security in the wake of heightened compliance regulations and
evolving digital environments
 IT Operations as it transforms to focus on application mobility
 IoT as it claims its stake in the modern organization
Splunk AI Solutions
DIGITAL ENTERPRISE 2019
Machine Learning
Toolkit (MLTK)
Nasdaq: Keeping Markets Moving
DIGITAL ENTERPRISE 2019
“ Splunk UBA gives us insight into internal threats and is a
unique data science-driven approach that automatically finds
unknown threats that traditional rule-based methods can‘t
match. ” - AVP, Nasdaq
• Using Splunk Enterprise to monitor potential external security
breaches and UBA to detect insider threats
• Analyst efficiency to gather data and speed security investigations has
increased by more than 50 percent
• Provides deep understanding of data and reusable correlation rules
across all support engineer levels
Splunk UBA: Active Directory Intelligence
DIGITAL ENTERPRISE 2019
Root of All Evil
Actual
Activities
Active
Directory
Events
Remote PowerShell
Go to CompB
- Login success
- Execute
UserA SrcComp
DstServ
PS
Admin$
IPC$
4688
4688
4648
4624
4768
4768
Domain Controller
internal
auth
4672
5140
5140
target
cmd
4688
SC
manager
4674
PS
4688
4624
4768
4624
Chaotic world of internal micro interactions
Splunk UBA: Unsupervised ML Analysis
DIGITAL ENTERPRISE 2019
Splunk UBA: Unveil the Kill Chain
DIGITAL ENTERPRISE 2019
Vodafone Implementation of AI with Splunk
DIGITAL ENTERPRISE 2019
• Problem Statement
Efficiency and speed of service
restoration post planned and
unplanned outages to ensure:
Application uptime
Customer experience
Service fulfilment
Operation resource utilization
2-3 changes per week
• Requires dedicated and
coordinated efforts across
multiple teams
Complex architecture to meet business
requirements
• 12 core applications &
Complex integration to other
80
Long and complex restoration process to:
• Avoid dominos affect on
applications
Vodafone Implementation of AI with Splunk
DIGITAL ENTERPRISE 2019
• Splunk AI Solution
 Intelligent decisions based on real time performance resulting in efficient queue throttling
 Applied Machine Learning to predict ticket priorities, categories, assignees and resolutions
Vodafone Implementation of AI with Splunk
DIGITAL ENTERPRISE 2019
• Benefits realized
Cost Savings
 Resource reduction
 Man Hours Savings / Year
 Up to 50% faster queue
throttling
AI & Machine Learning
 Reduced SME
dependency
Opportunities
 Further Artificial
Intelligence / ML within
Operations space
Customer Experience
 Reduced issues and
time to BAU, enhances
Vodafone TNPS
DIGITAL ENTERPRISE 2019
• CBM In The German Public
Rail Transportation System
• Analyzing train door machine data
using Splunk Machine Learning
capabilities
• Maintenance & repair cost exceed
expectations
• Cost overruns influence the
operational result
• Failure of systems cause
interruptions of service
Condition-Based Maintenance Deutsche Bahn
Condition-Based Maintenance
DIGITAL ENTERPRISE 2019
Bombardier TALENT 2
Deutsche Bahn
Detecting Anomalies Using DBSCAN
DIGITAL ENTERPRISE 2019
DBSCAN
From Splunk
Machine Learning
Toolkit
Anomaly  indicating door-locking malfunction!
Energy-consumption (Ampere) over recent
opening events
Deutsche Bahn
DIGITAL ENTERPRISE 2019
• Reduction of service interruptions
• Even distribution of stress to the mechanical components
• Foresight in failure-causing effects and when they occur
• Alerting and reporting at any moment through live-data
• Precise scheduling of maintenance cycles
Benefits of Implementing CBM
Overall cost reduction!
Deutsche Bahn
DIGITAL ENTERPRISE 2019
• Since deploying Splunk Phantom, Blackstone has seen benefits
including:
• Fast and accurate resolution of malware alerts
• Ensuring a repeatable and auditable process for investigating malware alerts
Splunk Phantom @ Blackstone
“Automation with Splunk Phantom enables us
to process malware email alerts in about 40
seconds versus 30 minutes or more.”
Adam Fletcher, CISO
Blackstone
DIGITAL ENTERPRISE 2019
1. Security Analyst
1. Extract attachments / Detonate in a malware sandbox /Catch the results
2. Extract URLs (from emails & attachments) / Check URL Reputation
3. Collect all IP’s involved (including sender, MTA) / Check IP reputation
4. Summarize Indicators of Compromise / Threat Intel
5. Search for Threat Intel. in your log data (Network Traffic, Proxy, Email, Email Filter,
Endpoint data sources) / Identify affected hosts and users
6. Document / The Security Analyst Hands Over to the Threat Responder
2. Response Through the Threat Responder
1. Block IP at the Firewall
2. Block URL at the Proxy
3. Block E-Mail Domain at the Spamfilter
4. Block URL & IP & Hash at the Endpoint Security
3. Malware Containment
1. Create Ticket for Service Desk
2. Service Desk cleanups host
3. Threat Responder validates cleanup was efficient
4. Ticket closed
Splunk Phantom @ Blackstone
45m
DIGITAL ENTERPRISE 2019
Splunk Phantom @ Blackstone
Time per Play: 30-60 Seconds + human review time
DIGITAL ENTERPRISE 2019
• Previous industrial revolutions
• Steam and the first machines that mechanized some work
• Electricity, the assembly line and the birth of mass production
• Computers and the beginnings of automation
• Next stage so called smart factory
• Design principles
• Interoperability
• Information transparency
• Decentralized decisions
• Technical assistance systems
Industry 4.0 at the BMW Group
DIGITAL ENTERPRISE 2019
Technical assistance system for rework process
Break Test Battery
Test
Chassis
Test
(Re-)
Workers
Rework
Protocols+
Test and
Error
Events
ID 12: Assignment
Error at Airbag
Control Unit Init-Test
ID 23: Operating
Voltage too low
at Steering Wheel
Test
defectiveversion wrong
unit unlock
airbag control
changed
unit version wrong
ID 45: Cannot Read
Variable
AIRBAG_SENSOR_VA
LUE
DIGITAL ENTERPRISE 2019
What to do with Splunk MLTK
 Error Patten / Building Clusters
 Clustering using Custom Splunk-ML-Algorithm:
• Spectral Clustering with a custom affinity
function
• Determines the group (color) of closely
linked errors
 Forming the complete hierarchy (all nodes up
to the root) of reworking categories
DIGITAL ENTERPRISE 2019
Achievement
Provide an assistance system
 Support the workers with the
"experience" that we can
draw from the historic data
 Give qualified
recommendations for
reworks
 Fix errors before subsequent
errors occur
 Optimization of rework
logistics
Error Classes Error Patterns
Mapping
Rework
Categories
Hierarchy of
Rework
Categories
Recommen-
dations
DIGITAL ENTERPRISE 2019
• Industry 4.0 – Use Case on the shop floor
Splunk @ Porsche
DIGITAL ENTERPRISE 2019
Industry 4.0 – Use Case on the shop floor
Industry 4.0
• The 1st Realtime Usage Dashboard of Shop Floor at Porsche
• Data from the supply chain and unstructured data get together
• End-to-End View of All Production Stations
• Station Health Status Monitoring, Deep Dive, and Predictive
Analysis
DIGITAL ENTERPRISE 2019
Mission of Splunk
Our Mission
DIGITAL ENTERPRISE 2019
.CONF19
THANK YOU
DIGITAL ENTERPRISE 2019

Contenu connexe

Tendances

Accenture-2022-Full-Report.pdf
Accenture-2022-Full-Report.pdfAccenture-2022-Full-Report.pdf
Accenture-2022-Full-Report.pdfArthurKKAI
 
Intelligent Automation - The Evolution of Automated Business Processes
Intelligent Automation - The Evolution of Automated Business ProcessesIntelligent Automation - The Evolution of Automated Business Processes
Intelligent Automation - The Evolution of Automated Business ProcessesSwiss Post Solutions
 
SME 10-minute guide to digital transformation v1
SME 10-minute guide to digital transformation v1SME 10-minute guide to digital transformation v1
SME 10-minute guide to digital transformation v1Bill Harpley
 
Digitalization and business model innovation
Digitalization and business model innovationDigitalization and business model innovation
Digitalization and business model innovationPeter Tyreholt
 
Chapter8
Chapter8Chapter8
Chapter8AG RD
 
Accenture Tech Vision 2019 for Consumer Goods and Services
Accenture Tech Vision 2019 for Consumer Goods and ServicesAccenture Tech Vision 2019 for Consumer Goods and Services
Accenture Tech Vision 2019 for Consumer Goods and Servicesaccenture
 
Global banking outlook 2018: pivoting toward an innovation-led strategy
Global banking outlook 2018: pivoting toward an innovation-led strategyGlobal banking outlook 2018: pivoting toward an innovation-led strategy
Global banking outlook 2018: pivoting toward an innovation-led strategyEY
 
Shifting Trade Rules and the Future for North America’s Auto Industry
Shifting Trade Rules and the Future for North America’s Auto IndustryShifting Trade Rules and the Future for North America’s Auto Industry
Shifting Trade Rules and the Future for North America’s Auto IndustryBoston Consulting Group
 
IT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh WarrenIT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh Warrenbob panic
 
Data Warehouse Programme Notes
Data Warehouse Programme NotesData Warehouse Programme Notes
Data Warehouse Programme NotesAlan McSweeney
 
Internal Operations Automation Journey | Accenture
Internal Operations Automation Journey | AccentureInternal Operations Automation Journey | Accenture
Internal Operations Automation Journey | Accentureaccenture
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and RoadmapAndrew Byers
 
IT Carve-Out Guide by TUM university
IT Carve-Out Guide by TUM universityIT Carve-Out Guide by TUM university
IT Carve-Out Guide by TUM universityNaoufal El Jaouhari
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
2021 Women in the Workplace News and Media Briefing
2021 Women in the Workplace News and Media Briefing2021 Women in the Workplace News and Media Briefing
2021 Women in the Workplace News and Media BriefingMcKinsey & Company
 
Management Information System James O Brien Study Notes
Management Information System James O Brien Study NotesManagement Information System James O Brien Study Notes
Management Information System James O Brien Study Notessau275
 
CSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero EmissionsCSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero Emissionsaccenture
 
Accenture Tech Vision 2020 - Overview
Accenture Tech Vision 2020 - OverviewAccenture Tech Vision 2020 - Overview
Accenture Tech Vision 2020 - Overviewaccenture
 
Automating Procurement Plus
Automating Procurement PlusAutomating Procurement Plus
Automating Procurement Plusaccenture
 
Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015Syed Ahmed
 

Tendances (20)

Accenture-2022-Full-Report.pdf
Accenture-2022-Full-Report.pdfAccenture-2022-Full-Report.pdf
Accenture-2022-Full-Report.pdf
 
Intelligent Automation - The Evolution of Automated Business Processes
Intelligent Automation - The Evolution of Automated Business ProcessesIntelligent Automation - The Evolution of Automated Business Processes
Intelligent Automation - The Evolution of Automated Business Processes
 
SME 10-minute guide to digital transformation v1
SME 10-minute guide to digital transformation v1SME 10-minute guide to digital transformation v1
SME 10-minute guide to digital transformation v1
 
Digitalization and business model innovation
Digitalization and business model innovationDigitalization and business model innovation
Digitalization and business model innovation
 
Chapter8
Chapter8Chapter8
Chapter8
 
Accenture Tech Vision 2019 for Consumer Goods and Services
Accenture Tech Vision 2019 for Consumer Goods and ServicesAccenture Tech Vision 2019 for Consumer Goods and Services
Accenture Tech Vision 2019 for Consumer Goods and Services
 
Global banking outlook 2018: pivoting toward an innovation-led strategy
Global banking outlook 2018: pivoting toward an innovation-led strategyGlobal banking outlook 2018: pivoting toward an innovation-led strategy
Global banking outlook 2018: pivoting toward an innovation-led strategy
 
Shifting Trade Rules and the Future for North America’s Auto Industry
Shifting Trade Rules and the Future for North America’s Auto IndustryShifting Trade Rules and the Future for North America’s Auto Industry
Shifting Trade Rules and the Future for North America’s Auto Industry
 
IT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh WarrenIT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh Warren
 
Data Warehouse Programme Notes
Data Warehouse Programme NotesData Warehouse Programme Notes
Data Warehouse Programme Notes
 
Internal Operations Automation Journey | Accenture
Internal Operations Automation Journey | AccentureInternal Operations Automation Journey | Accenture
Internal Operations Automation Journey | Accenture
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and Roadmap
 
IT Carve-Out Guide by TUM university
IT Carve-Out Guide by TUM universityIT Carve-Out Guide by TUM university
IT Carve-Out Guide by TUM university
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
2021 Women in the Workplace News and Media Briefing
2021 Women in the Workplace News and Media Briefing2021 Women in the Workplace News and Media Briefing
2021 Women in the Workplace News and Media Briefing
 
Management Information System James O Brien Study Notes
Management Information System James O Brien Study NotesManagement Information System James O Brien Study Notes
Management Information System James O Brien Study Notes
 
CSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero EmissionsCSPs' Critical Role in the Race to Net Zero Emissions
CSPs' Critical Role in the Race to Net Zero Emissions
 
Accenture Tech Vision 2020 - Overview
Accenture Tech Vision 2020 - OverviewAccenture Tech Vision 2020 - Overview
Accenture Tech Vision 2020 - Overview
 
Automating Procurement Plus
Automating Procurement PlusAutomating Procurement Plus
Automating Procurement Plus
 
Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015
 

Similaire à Digital Enterprise 2019

Digital_Business_Strategy_FINAL_DRAFT
Digital_Business_Strategy_FINAL_DRAFTDigital_Business_Strategy_FINAL_DRAFT
Digital_Business_Strategy_FINAL_DRAFTDave Power ACEcD
 
The 10 accelerators of broadband growth for digital india
The 10 accelerators of broadband growth for digital indiaThe 10 accelerators of broadband growth for digital india
The 10 accelerators of broadband growth for digital indiaMerry D'souza
 
Lightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdf
Lightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdfLightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdf
Lightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdfRoBee4
 
New Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationNew Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationJoseph M Bradley
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)TRPC Pte Ltd
 
Roles of ICT in digital bangladesh
Roles of ICT in digital bangladeshRoles of ICT in digital bangladesh
Roles of ICT in digital bangladeshRayhan Shahariar
 
e-Conomy SEA 2020
e-Conomy SEA 2020e-Conomy SEA 2020
e-Conomy SEA 2020Peerasak C.
 
LightCastle Partners Bangladesh Hi-Tech industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech industries Vision 2030 LightCastle Partners Bangladesh Hi-Tech industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech industries Vision 2030 LightCastle Partners
 
LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030LightCastle Partners
 
Internet marketing full project report
Internet marketing full project reportInternet marketing full project report
Internet marketing full project reportGitika Kolli
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014Market Engel SAS
 
Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANThe Economist Media Businesses
 
Gsma me report_2014_r2_web
Gsma me report_2014_r2_webGsma me report_2014_r2_web
Gsma me report_2014_r2_webSandeep Parashar
 
Webinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in MalaysiaWebinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in MalaysiaThe Digital Insurer
 
e-Government Master Plan for Digital Bangladesh Final.pdf
e-Government Master Plan for Digital Bangladesh Final.pdfe-Government Master Plan for Digital Bangladesh Final.pdf
e-Government Master Plan for Digital Bangladesh Final.pdfAbul Khayer
 

Similaire à Digital Enterprise 2019 (20)

Business Council of Mongolia presentation
Business Council of Mongolia presentationBusiness Council of Mongolia presentation
Business Council of Mongolia presentation
 
Ict
IctIct
Ict
 
Digital_Business_Strategy_FINAL_DRAFT
Digital_Business_Strategy_FINAL_DRAFTDigital_Business_Strategy_FINAL_DRAFT
Digital_Business_Strategy_FINAL_DRAFT
 
The 10 accelerators of broadband growth for digital india
The 10 accelerators of broadband growth for digital indiaThe 10 accelerators of broadband growth for digital india
The 10 accelerators of broadband growth for digital india
 
Lightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdf
Lightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdfLightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdf
Lightcastle-Partners-Bangladesh-Hi-Tech-Industries-Vision-2030.pdf
 
New Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationNew Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business Transformation
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
 
Roles of ICT in digital bangladesh
Roles of ICT in digital bangladeshRoles of ICT in digital bangladesh
Roles of ICT in digital bangladesh
 
e-Conomy SEA 2020
e-Conomy SEA 2020e-Conomy SEA 2020
e-Conomy SEA 2020
 
LightCastle Partners Bangladesh Hi-Tech industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech industries Vision 2030 LightCastle Partners Bangladesh Hi-Tech industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech industries Vision 2030
 
LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030
LightCastle Partners Bangladesh Hi-Tech Industries Vision 2030
 
The Impact Of Technology
The Impact Of TechnologyThe Impact Of Technology
The Impact Of Technology
 
Product Market Study of ICT sector in Philippines
Product Market Study of ICT sector in PhilippinesProduct Market Study of ICT sector in Philippines
Product Market Study of ICT sector in Philippines
 
Internet marketing full project report
Internet marketing full project reportInternet marketing full project report
Internet marketing full project report
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEAN
 
Gsma me report_2014_r2_web
Gsma me report_2014_r2_webGsma me report_2014_r2_web
Gsma me report_2014_r2_web
 
The Mobile Economy 2014
The Mobile Economy 2014The Mobile Economy 2014
The Mobile Economy 2014
 
Webinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in MalaysiaWebinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in Malaysia
 
e-Government Master Plan for Digital Bangladesh Final.pdf
e-Government Master Plan for Digital Bangladesh Final.pdfe-Government Master Plan for Digital Bangladesh Final.pdf
e-Government Master Plan for Digital Bangladesh Final.pdf
 

Plus de The Business Council of Mongolia

N. Chimguundari economic corridor and investment research center Nov 12
N. Chimguundari economic corridor and investment research center Nov 12N. Chimguundari economic corridor and investment research center Nov 12
N. Chimguundari economic corridor and investment research center Nov 12The Business Council of Mongolia
 

Plus de The Business Council of Mongolia (20)

Three Camel Lodge 3 days itinerary
Three Camel Lodge 3 days itineraryThree Camel Lodge 3 days itinerary
Three Camel Lodge 3 days itinerary
 
Three Camel Lodge 4 days itinerary
Three Camel Lodge 4 days itineraryThree Camel Lodge 4 days itinerary
Three Camel Lodge 4 days itinerary
 
BCM Macroeconomic Updates January 2020
BCM Macroeconomic Updates January 2020BCM Macroeconomic Updates January 2020
BCM Macroeconomic Updates January 2020
 
Faro Foundation presentation
Faro Foundation presentationFaro Foundation presentation
Faro Foundation presentation
 
National Development Association of Mongolia presentation
National Development Association of Mongolia presentationNational Development Association of Mongolia presentation
National Development Association of Mongolia presentation
 
Gobi Green Energy Gankhuyag
Gobi Green Energy GankhuyagGobi Green Energy Gankhuyag
Gobi Green Energy Gankhuyag
 
Ch.Anar Competitiveness of the fintech sector
Ch.Anar Competitiveness of the fintech sectorCh.Anar Competitiveness of the fintech sector
Ch.Anar Competitiveness of the fintech sector
 
A.Bilguun Competitiveness of Mongolia's resource sector
A.Bilguun Competitiveness of Mongolia's resource sectorA.Bilguun Competitiveness of Mongolia's resource sector
A.Bilguun Competitiveness of Mongolia's resource sector
 
B.Lakshmi EPCRC Competitiveness of Mongolia
B.Lakshmi EPCRC Competitiveness of MongoliaB.Lakshmi EPCRC Competitiveness of Mongolia
B.Lakshmi EPCRC Competitiveness of Mongolia
 
Munkhzorig - Digital Transformation
Munkhzorig - Digital TransformationMunkhzorig - Digital Transformation
Munkhzorig - Digital Transformation
 
Tseesuren - Data is the Key for Innovation
Tseesuren - Data is the Key for InnovationTseesuren - Data is the Key for Innovation
Tseesuren - Data is the Key for Innovation
 
System analysis study on the Constitution of Mongolia
System analysis study on the Constitution of MongoliaSystem analysis study on the Constitution of Mongolia
System analysis study on the Constitution of Mongolia
 
Kincora Copper March 2019
Kincora Copper March 2019Kincora Copper March 2019
Kincora Copper March 2019
 
Erdenes Mongol presentation
Erdenes Mongol presentationErdenes Mongol presentation
Erdenes Mongol presentation
 
Tatsuya Hamada presentation
Tatsuya Hamada presentationTatsuya Hamada presentation
Tatsuya Hamada presentation
 
BCM Monthly Meeting BCM updates January 30, 2019
BCM Monthly Meeting BCM updates January 30, 2019BCM Monthly Meeting BCM updates January 30, 2019
BCM Monthly Meeting BCM updates January 30, 2019
 
N. Chimguundari economic corridor and investment research center Nov 12
N. Chimguundari economic corridor and investment research center Nov 12N. Chimguundari economic corridor and investment research center Nov 12
N. Chimguundari economic corridor and investment research center Nov 12
 
Procurement mca-compact-ii-presentation-bcm
Procurement mca-compact-ii-presentation-bcmProcurement mca-compact-ii-presentation-bcm
Procurement mca-compact-ii-presentation-bcm
 
Bcm brochure 2018 final
Bcm brochure 2018 finalBcm brochure 2018 final
Bcm brochure 2018 final
 
D.Jargalsaikhan BCM presentation 24-05-18
D.Jargalsaikhan BCM presentation 24-05-18D.Jargalsaikhan BCM presentation 24-05-18
D.Jargalsaikhan BCM presentation 24-05-18
 

Dernier

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Dernier (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Digital Enterprise 2019

  • 1.
  • 2. Promoting growth through innovation Jon Lyons Board Director Business Council of Mongolia Since June 18, 2019 DIGITAL ENTERPRISE 2019
  • 3. WHAT IS THE BUSINESS COUNCIL OF MONGOLIA? DIGITAL ENTERPRISE 2019 Independent member-based, self-governing, non-profit, non-governmental organization (NGO) – Established in 2007.
  • 4. DIGITAL ENTERPRISE 2019 BCM PURPOSE Vision To deliver value for the public, the members, and the employees by advocating economic freedom and property rights provided by the Constitution of Mongolia and protecting and promoting the common lawful interests of members for a fair, stable, and internationally competitive business environment. Mission • To equip members with an information platform that provides up-to-date policy and business research, training and knowledge sharing. • To develop and promote economic and sector policy recommendations through engagement with the BCM members, the government and the wider public. • To provide networking and other services that support doing business in Mongolia.
  • 5. DIGITAL ENTERPRISE 2019 Media / Printing, 9, 4% IFIs and Ios, 12, 5% Tax / Legal / Ethics, 11, 5%Growth & Innovation, 16, 7% Education / Training, 14, 6% Food & Beverages / Hospitality / Light Industry / Rretail / Real Estate, 20, 8%Resources / Environment, 50, 21%Associations & NGOs, 18, 8% Embassies, 25, 11% Government Entities, 10, 4% Energy / Infrastructure / Connectivity / Logistics, 13, 5% Banking / Finance / Capital Market / Insurance, 37, 16% BCM MEMBERS BY SECTOR
  • 6. DIGITAL ENTERPRISE 2019 BCM ORGANIZATIONAL STRUCTURE & BENEFITS • The highest governing body of the Organization is the Board of Directors (BoD) which consists of 15 member. • Executive Committee (ExCo) is the main operational and monitoring body of the Organization and has 9 members. • 6 Working Groups are functional bodies that optimize the implementation of BCM objectives. 1. POLICY & ADVOCACY 2. NETWORKING & CONNECTIVITY 3. KNOWLEDGE SHARING 4. TIMELY & RELEVANT INFORMATION SHARING 5. MEMBER BUSINESS PROMOTION 6. DISCOUNTS
  • 7. DIGITAL ENTERPRISE 2019 BCM WORKING GROUPS 2. Economic Freedom and Competitiveness - Chair: Gund Investment/TUSS Solution - Vice Chair: Clean Energy Asia 3. Energy, Infrastructure and Connectivity - Chair: PwC Mongolia - Vice Chair: Erdenes Oyu Tolgoi 1. Banking, Finance and Capital Markets - Chair: Trade and Development Bank - Vice Chair: Tavan Bogd Group 4. Growth and Innovation - Chair: Mobicom Corporation - Vice Chair: Erdene Resource Development Corp. 5. Resources and Environment - Chair: Oyu Tolgoi LLC - Vice Chair: Erdenes Mongol 6. Tax, Legal and Ethics - Chair: Avinex LLP - Vice Chair: Rio Tinto Mongolia Chaired by senior executives and thought leaders from key economic sectors
  • 8. DIGITAL ENTERPRISE 2019 BCM WORKING GROUPS FOCUS AND COMPOSITION Working Group Composition Chairs / Vice-Chairs / Non-Board Vice-Chairs Members (BCM Members) BCM Secretariat (support) Sector-focused advocacy Policy and regulatory engagement Partnership development Public education & media engagement Improve sector competitiveness & attractiveness to investors Policy positions / papers
  • 9. DIGITAL ENTERPRISE 2019 BCM Growth & Innovation Working Group Events Practice sharing Government engagement Raising awareness about Digital Transformation and its potential benefits to business and society.
  • 10. DIGITAL ENTERPRISE 2019 BCM by the NUMBERS • 1 Annual Summit per year to showcase key business issues • 18 major policy items were advocated in last 18 months • More than 80 Knowledge Sharing Sessions since 2007 • More than 100 Monthly Meetings since 2007 • Over 550 issues of NewsWire since 2007 • More than 1,400 active subscribers to BCM Mailing list • Social media presence: 17,000+ followers on Facebook, 3,000+ on Twitter
  • 11. DIGITAL ENTERPRISE 2019 CONTACT US bcmongolia.org @bcmongolia @bcmongolia Address: Suite 1103, Floor 11, Suite 1202, Floor 12, Express tower, Peace Avenue, Khoroo 1, Chingeltei District, Ulaanbaatar Phone: 976-11-317027
  • 13.
  • 14.
  • 15. Digital Literacy for Mongolia Byambajargal Ayushjav Founder and CEO Faro Foundation Mongolia NGO DIGITAL ENTERPRISE 2019
  • 16. FARO Foundation Mongolia Faro Foundation Mongolia (FFM) is a non- governmental organization that has focused on promoting adequate and accessible use of social media and digital literacy in Mongolia. FFM’s work includes but are not limited to, promoting online safety, digital literacy, child protection programs, proper use of social media, public awareness regarding cyber bullying and such. The primary goal of FFM is to implement positive change in the community through the use of social media. DIGITAL ENTERPRISE 2019
  • 17. THE FOUR INDUSTRIAL REVOLUTIONS DIGITAL ENTERPRISE 2019
  • 18. BRIEF HISTORY OF THE DIGITAL REVOLUTION DIGITAL ENTERPRISE 2019
  • 19. Social Media Stats Mongolia (May 2018 – May 2019) DIGITAL ENTERPRISE 2019
  • 20. Digital Literacy Digital literacy refers to an individual's ability to find, evaluate, and compose clear information through writing and other mediums on various digital platforms. Five Essential digital skills: • Communicating • Handling information and content • Transacting • Problem solving • Being safe and Legal Online DIGITAL ENTERPRISE 2019
  • 21. Digital Literacy Library (Facebook) DIGITAL ENTERPRISE 2019
  • 22. Digital Literacy Library Developed: Youth and Media at the Berkman Klein Center for Internet & Society at Harvard University License: Creative Commons Attribution-ShareAlike 4.0 International license DIGITAL ENTERPRISE 2019
  • 23. Digital Literacy Digital Literacy Curriculum is designed for: Students – 18 Lessons Teachers – 18 Lessons Parents – 6 Lessons DIGITAL ENTERPRISE 2019
  • 33.
  • 34. Future of Internet IDERMUNKH.TS CEO of MobiNet Director of Enterprise Business Division, MobiCom DIGITAL ENTERPRISE 2019
  • 35. Internet today DIGITAL ENTERPRISE 2019 Source: crc.gov.mn Total ISP contract - 68.03 Gbps Internet customers by connection type
  • 36. Internet today DIGITAL ENTERPRISE 2019 Source: crc.gov.mn Нийт гэрээт интернет хэрэглэгчийн 70% нь 2-5 Mbps-н хурдтай гадаад интернет үйлчилгээ ашиглаж байна
  • 37. Internet today DIGITAL ENTERPRISE 2019 Mongolian Internet Penetration is 65% in 2018, but! Global Speeds - April 2019 Source: https://www.speedtest.net Mongolian Speeds - April 2019
  • 38. Internet today DIGITAL ENTERPRISE 2019 Source: www.atlasandboots.com
  • 39. - Global Forecast and Trends of Internet DIGITAL ENTERPRISE 2019 Source: www.cisco.com Content Delivery Networks (CDNs) will carry 72% percent of Internet traffic by 2022 up from 56 percent in 2017. By 2022, global mobile devices will grow from 8.6 billion in 2017 to 12.3 billion by 2022 - over 422 million of those will be 5G capable. Fixed IP traffic will grow at a CAGR of 24 percent between 2017 and 2022, while mobile traffic grows at a CAGR of 46 percent. Global mobile data traffic was 9 percent of total IP traffic in 2017 and will be 20 percent of total IP traffic by 2022.
  • 40. - Global Forecast and Trends of Internet DIGITAL ENTERPRISE 2019 Source: www.cisco.com Интернетэд холбогдох төхөөрөмжийн өсөлт IP Video дамжуулалтын өсөлт M2M интернетийн холболтын тоо
  • 41. - Global Forecast and Trends of Internet DIGITAL ENTERPRISE 2019 Source: www.gartner.com 2018 2019 2020 2021 2022 Cloud Business Process Services (BPaaS) 45.8 49.3 53.1 57.0 61.1 Cloud Application Infrastructure Services (PaaS) 15.6 19.0 23.0 27.5 31.8 Cloud Application Services (SaaS) 80.0 94.8 110.5 126.7 143.7 Cloud Management and Security Services 10.5 12.2 14.1 16.0 17.9 Cloud System Infrastructure Services (IaaS) 30.5 38.9 49.1 61.9 76.6 Total Market 182.4 214.3 249.8 289.1 331.2 Public Cloud үйлчилгээний орлогын төлөв (Billions of U.S. Dollars) DDoS attacks-н төлөв
  • 42. - Conclusion of Forecast DIGITAL ENTERPRISE 2019 Source: www.cisco.com IoTCDN Cloud Services IP Video Big data Security - What should do ISP’s for Future demand?
  • 43. - Future of Internet service DIGITAL ENTERPRISE 2019 Source: www.cisco.com - More internet cache systems (CDN) - Most affordable M2M service packages
  • 44. - Future of Internet service DIGITAL ENTERPRISE 2019 Source: www.cisco.com - More reliable and stable internet peering - More secure network, system and operation Ping - 50ms Layer - 3
  • 45. - Future of Internet service DIGITAL ENTERPRISE 2019 Source: www.cisco.com - More speed in Fixed broadband - And key is good support and service 50Mbps, 100Mbps
  • 47.
  • 48. Contact Center & Customer Experience B.BAYARMAA CXO MobiCom Corporation LLC DIGITAL ENTERPRISE 2019
  • 49. DIGITAL ENTERPRISE 2019 CC Agents ~300 Daily 37k Monthly 1.1 mln
  • 50. DIGITAL ENTERPRISE 2019 CONTACT CENTER 2018-2019 2016-2017 2222 1800-2222 1800-1199 2014-2015 7577-2222 2013-2014 Integrated Customer Service Center 2011-2012 333311 2288 2009-2011 2299 2277 Most PSP 2233 2004-2008 2244 2002-2003 11-312222 2222 OUTSOURCING Business FACILITY RENT Business 1800-1917 7555-5555 1800-1937 11-315757 1800-1200 1800-1289 1800-1883 1900-2103 7575-2000 1800-1200 1800-1801 1800-1289 1900-1199 1900-1199 1900-1199 1800-1200 1900-1199 1800-1200 7575-3636 1900-1199 11-327575 11-312234 7711-7711 11-315757
  • 51. 2005 2010 2011-2013 2014 2014-2017 2018 DIGITAL ENTERPRISE 2019 16 years experience Know How IVR  Self–Service  Self–Sales INTRODUCED FIRST TIME IN MONGOLIA  Call center 2222 (toll-free)  Telemarketing  24/7 Service  Call distribution  Smart call distribution  Customer Segment  Implemented 25 KPI's for Call Center  Workforce management (WFM)
  • 52. DIGITAL ENTERPRISE 2019 CONTACT CENTER SYSTEM Since 2017 Advanced Contact Center Technology  Channel based architecture  Skilled HR base, training & monitoring complex system 2005-2016 Customer Experience Omni channel High integration possibility Smart feature / Smart routing Workforce Optimization Self - Service IVR
  • 53. DIGITAL ENTERPRISE 2019 TO IMPROVE CUSTOMER EXPERIENCE  To provide personalized & prompt customer service to MobiCom customers and partners, through Omni- channel, resolve their issues  To deliver customer voice & request to the top management team  To support company’s sales by up & cross sales  To care MobiCom customers, increase satisfaction
  • 55. DIGITAL ENTERPRISE 2019  Easy  Prompt IVR Self-sales Data package MCA HiTone Data gift Unitloan Hybrid Payment Surprise - 596 ~800k Self-sales 7 types self-sales IVR Self-Service Bill info Handset configuration Candy balance Bank account Data package balance Handset Leasing condition Get puk code IVR SMS loan amount by sms SMS loan payment by sms ~1mln Service activation 9 types self-service DIGITAL SERVICE
  • 56. DIGITAL ENTERPRISE 2019 я  Call forecast, HR forecast  WFM is powerful tool which can organize time management & HR Work Force Management program WORK FORCE MANAGEMENT (WFM)
  • 58. DIGITAL ENTERPRISE 2019 Customer Journey Analytics ALL CHANNEL’S INFORMATION PAST NOW FUTURE SAME BEHAVIOR CUSTOMER EXPERIENCE ONE PLATFORM SINGLE CUSTOMER VIEW
  • 59. DIGITAL ENTERPRISE 2019 Hybrid line Status: Active Package: Hybrid - 19,900 Segment: Business USINESS BOLD Gansukh 26 ages KHAN-UUL, 3 KHOROO TELMUUN SINGLE CUSTOMER VIEW 9933**** By month CUSTOMER’S SERVICE: HITONE MCA LEASING DAILY VAS CLIR CUSTOMER’S HISTORY: 09:15 – 2222 – about data package 10:00 – NPS – 4 point 17:20 – 592 – 1 day data 19:03 – 2222 – data complaint 19:00 – Mobile bank - 19,900₮ payed UNIT – Dealer PAYMENT- Mobile bank CHANNEL: Now uses IPHONE 6S Web SPOS Candy app Internet CARE Usage Data 7.5GB NPS -15.5% OFFER CUSTOMER JOURNEY
  • 60. DIGITAL ENTERPRISE 2019 Human-Assisted Reach Channels Coverage SMS • Single Channel • Interaction Focus • Next up staff • Work Mix is Broad • Siloed Multi-Channel • Interaction focus • Skill based Routing • Manual Quality Management • Work Mix Complex • Touchpoints Siloed • WFO siloed • Analytics by Channel • Journey Orchestration • Multi-modal, Cross-Channel • Predictive and Proactive • Journey Intent Routing • Soft Switching (egWebRTC) • Continuous WFO • Journey Analytics & Insights • CX Work Item SLAs Enforced CUSTOMER EXPERIENCE CENTER 1960-2005 2006-2016 Since 2017 CONTACT CENTERCALL CENTER Enterprise-Wide CC MILESTONE
  • 61. DIGITAL ENTERPRISE 2019 CUSTOMER ENGAGEMENT CYCLE CUSTOMER EXPERIENCE PLATFORM IVR voice Social Contact Center Chat Web site Shop/ BranchE-mail Mobile App SELF-SERVICE PAYMENT CUSTOMER SERVICE DEALER SERVICE IVR SALES MARKETING SUPPORT CUSTOMER JOURNEY SINGLE CUSTOMER VIEW WFM SERVICE QUALITY
  • 63.
  • 64. The Game Changer of Digital Enterprise Juniper Network Strategy and Solution Norman Lam CEO VP & GM – Greater China Juniper Networks DIGITAL ENTERPRISE 2019
  • 65. At A Glance Sunnyvale, CA HEADQUARTERED 1996 FOUNDED $4.648B 2018 REVENUE 9,300 EMPLOYEES 88 Locations 43 COUNTRIES 24/7 AVAILABILITY TO ADDRESS ALL CUSTOMER NEEDS GLOBAL REACH ++ + 17 out of 20 WORLD’S LARGEST BANKS 7 out of 10 TOP GLOBAL UNIVERSITIES More than 1,400 LOCATIONS FOR NATIONAL GOVERNMENTS 10 out of 12 TOP TECHNOLOGY COMPANIES 9 out of 10 TOP GLOBAL WEB SERVICE PROVIDERS 10 out of 10 WORLD’S LARGEST WIRELESS & WIRELINE TELECOM COMPANIES REACHING THE HIGHEST STANDARDS ENCOURAGING FUTURE INNOVATORS OUR MISSION Connect Everything. Empower Everyone. OUR VISION Engineering Simplicity WHO TRUSTS US DIGITAL ENTERPRISE 2019
  • 66. THE INTERNET OF THINGS – EVERYTHING IS CONNECTED connected devices by 202575B 5G WILL ENABLE A NEW BREED OF MOBILE APPS Is how much faster 5G is estimated to be over 4G60x A.I. HAS EMERGED of business leaders say A.I. will be a business advantage % 80 THE CLOUD IS EATING THE WORLD % 50 of enterprise applications in the cloud by 2020 FIGHTING CYBER-CRIME AND LOSING will be spent on fighting cybercrime in 2022$8T THE WORLD IS CHANGING FAST DIGITAL ENTERPRISE 2019
  • 67. AND OUR OPPORTUNITY IS IMMENSE TO… DISTRIBUTE CLOUDS TO ENABLE 5GAND IoT DELIVER THE SOFTWARE DEFINED NETWORK HELP COMPANIES BUILD CLOUDS CONNECT PEOPLE TO CLOUDS Our intelligent SDN solution enables customers to achieve open, intelligent and flexible business objectives from cloud design to implementation and post- operation management. We help our customers build and run their cloud environments with world- class infrastructure We build the best core, edge, metro, and enterprise networks to allow our customers and their customers to connect to the cloud We help our customers transform their infrastructure to scale-out distributed clouds to help unleash the promise of 5G & IoT DIGITAL ENTERPRISE 2019
  • 68. We're recognized As A leader in Data Center 127 GARTNER MAGIC QUADRANT FOR DATA CENTER NETWORKING FORRESTER WAVE TM HARDWARE PLATFORMS FOR SOFTWARE DEFINED NETWORKING JUNOS Contrail Automation High performance Open standard automation DIGITAL ENTERPRISE 2019
  • 69. WE ARE LEADING THE TELCO TRANSFORMATION SERVICE & SUPPORT TECHNOLOGY INNOVATION Least Important Source: IHS Markit, December 2017 SP VENDOR RANKING FOR BUYING CORE/EDGE ROUTERS Product Reliability Service & Support Technology Innovation Security TOP SP SELECTION CRITERIA #1 PRODUCT RELIABILITY SECURITY #1 #1 #1
  • 70. More interesting information DIGITAL ENTERPRISE 2019 Mary Meeker Queen of the Internet The Internet Trends report
  • 71. Secure and automated multicloud DIGITAL ENTERPRISE 2019 Enable Digital Enterprise journey
  • 72. DESTINATION: SECURE & AUTOMATED MULTICLOUD New IT platform is hybrid & multicloud because it’s the best: • Venue • Resilience • Agility • Flexibility • Economics …MULTICLOUDSECURE & AUTOMATED… Top 2 priorities: • Security: Failing security can take you from hero to zero immediately • Automation: Reliability engineering precedes moving faster for business It’s no longer only about TCO DIGITAL ENTERPRISE 2019
  • 73. SECURE AND AUTOMATED MULTICLOUD – NOT JUST ABOUT CLOUDS Branch / Remote Office Campus / HQ SaaS Public Cloud Public Cloud Data Centers / Private Cloud Private / Public WAN DCI ALL PLACES IN NETWORK TOUCH MULTICLOUD APPLICATIONSPEOPLE & IoT SECURE and AUTOMATED MULTICLOUD how what DIGITAL ENTERPRISE 2019
  • 74. JUNIPER Open PORTFOLIO Connected Security Campus/HQBranch/Remote Office Public CloudData Centers/Private Cloud SaaS Public Cloud AI-Driven Enterprise Enterprise Multicloud WAN JUNIPER ENTERPRISE Secure and Automate Multicloud Switching SecurityRouting Juniper Portfolio Software Contrail MistJunos Wi-Fi and BLE Services DIGITAL ENTERPRISE 2019 Connect SEE Secure Deliver
  • 75. 5-STEP Migration to Digital Enterprise Device Led Business Led Operations Led Architecture Led Customer Led DIGITAL ENTERPRISE 2019
  • 76. We Help our customers Deliver the Amazing IMPROVE HEALTHCARE TRANSFORM COMMERCE BUILD APPLICATIONS RETHINK EDUCATION POWER SOCIAL CHANGE EXPLORE NATURE ENCOURAGE DISCOVERY ENABLE CLEAN ENERGY DIGITAL ENTERPRISE 2019
  • 77. Summer everything grown up DIGITAL ENTERPRISE 2019
  • 79.
  • 80. Sophos Solution and How We Deal With Next-Generation Attack DIGITAL ENTERPRISE 2019 Stan Ho SE Manager of China and Mongolia Sophos Group. since Nov, 2007
  • 81.
  • 82. Sophos Snapshot • Founded in Oxford in 1985 • 3,500 employees • 327,000 customers • 100 million users in 150 countries • 45,000 channel partners • SophosLabs threat research facility • “Channel First” go-to-market model Sophos Headquarters, Abingdon, UK
  • 83. Sophos History Evolution to complete security 1985 Founded in Abingdon (Oxford), UK Peter Lammer c1985 Jan Hruska c1985 Acquired DIALOGS Acquired Astaro 2011 2012 2013 Acquired Utimaco Safeware AG 20081988 First checksum- based antivirus software 1989 First signature- based antivirus software 1996 US presence established in Boston Voted best small/medium sized company in UK Acquired ENDFORCE 2014 Acquired Cyberoam Acquired Mojave Networks Acquired Barricade IPO London Stock Exchange Launched Synchronized Security 2007 2015 Acquired Surfright 2017 Acquired Invincea 2016 Acquired PhishThreat Acquired Reflexion 2019 Acquired Avid Secure Acquired DarkBytes Acquired Rook Security
  • 84. Sophos Global Sites San Francisco Bay Area Vancouver Canada Abingdon UK Budapest Hungary Singapore Sydney Australia Manila Philippines Tokyo Japan Milan Italy Karlsruhe Germany Wiesbaden Germany Dortmund Germany Paris France Ahmedabad India Dubai UAE Hengelo Netherlands Linz Austria Bangalore India New Delhi India Ottawa Canada São Paulo Brazil Buenos Aires Argentina Bogotá Colombia Ciudad de México Mexico Boston MA TW/HK/China
  • 85. A Leader in Endpoint Protection “The Sophos Intercept X product, designed to protect against and recover from the malicious actions related to ransomware and exploits, proved popular with both existing Sophos Endpoint Protection customers and as an augmentation to an incumbent EPP. This momentum continued its increased brand awareness in the enterprise space. Also included in the Intercept X purchase are Sophos' EDR-like capabilities — called Root Cause Analysis — and the ML malware detection technology from the acquisition of Invincea was added in late 2017. Sophos' cloud-based EPP with the Intercept-X platform is a good fit for organizations that can take advantage of a cloud-based administration platform, and that value strong protection against ransomware and exploit-based attacks over advanced forensic investigation capabilities.” Gartner Magic Quadrant ENDPOINT PROTECTION Source: Gartner (February 2016) This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. Magic Quadrant for Endpoint Protection Platforms, Ian McShane, Avivah Litan, Eric Ouellet, Prajeet Bhajanka; 24 January, 2018
  • 86. A Leader in Unified Threat Management Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT This graphic is published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Sophos. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. All statements in this report attributable to Gartner represent Sophos’ interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. Magic Quadrant for Unified Threat Management, Rajpreet Kaur, Claudio Neiva, 20 September, 2018 Sophos first entered into this MQ publication in March 2012, positioned in the Leader quadrant – and has retained this position for 6 consecutive publications “Sophos is a Leader in the UTM Magic Quadrant. It continues to gain market share due to ease of use, security feature richness and successful integration with its endpoint product. It demonstrates strength in its product vision and roadmap execution, relative to those of some competitors.”
  • 88. Continued rapid growth in new malware By the end of 2019 over 1 Billion unique malware samples will exist Total Malware collected over time (AV-Test) 0 100,000,000 200,000,000 300,000,000 400,000,000 500,000,000 600,000,000 700,000,000 800,000,000 900,000,000 The Volume of malware is staggering 1990’s - Signature based Anti-Virus o 1-1 map of ‘checksums’ to malware o String Scanning Requires a Victim to report the malware so a new signature can be built
  • 89. The age of single-use disposable malware 75% 75% of the malicious files SophosLabs detects are found only within a single organization. 400,000 Sophos Labs receives and processes 400,000 previously unseen malware samples each day.
  • 90. The Challenge Of Addressing New Threats Software Vulnerabilities Reported By Year Source information NIST National Vulnerability Database as of 1 May 2018 https://beta.nvd.nist.gov/vuln-metrics/visualizations/cvss-severity-distribution-over-time 4639 4150 5286 5186 7937 6487 6446 14647 16517 2010 2011 2012 2013 2014 2015 2016 2017 2018
  • 91. Top Threats Worldwide • Active Adversary • Privilege escalation, cred theft, lateral movement, exploits, process injection • Advanced Malware • Zero-day attacks w/multiple stages • Worms, Trojans, VB script, PDF, File-less attacks (cryptominers, powershell, etc…), bots, rats • Cryptomining/Cryptojacking • Legitimate and malicious use of CPU cycles to generate digital currency 38%21% 33% 5% Advanced Malware Active Adversary Ransomware Cryptojacking 3% Generic Malware
  • 92. How we deal with Next-Gen attack Endpoint and Network Security
  • 93. Predictive Security Harness The Power of Data Science to Protect Against Future Attacks SEEING THE FUTURE IS THE FUTURE OF SECURITY
  • 94. Deep Learning Neural Network SMARTER FASTER SMALLER DEEP LEARNING • High Detection Rates • Gets Better with More Data 20 – 100 ms Detection 10 – 20 MB Model Size TRADITIONAL MACHINE LEARNING • Low Detection Rates • Diminishing Returns with More Data 100 – 500 ms Detection 500 MB to 1 GB Model Size
  • 95. Intercept X with EDR for Endpoints and Servers ANTI-EXPLOIT MACHINE LEARNING ANTI-RANSOMWARE MALWARE REMOVAL ROOT CAUSE ANALYSIS STOP UNKNOWN THREATS PREVENT RANSOMWARE DENY THE ATTACKER
  • 96. Sophos Intercept X: Intelligent EDR Data Correlated, Contextualized, and Organized Insights Humanized, Prioritized, and Actionable Explore Search, Investigate, and Hunt IT Generalists Analysts, IR, and SoC Specialists and Products Cybersecurity Experts-in-a-Box AI Expert Insights • EDR Starts with the Strongest Protection Stop Breaches before they Start • Add Expertise, Not Headcount “Experts in a Box” • Guided Incident Response Respond with the Click of the Button
  • 97. Next-Gen Firewall –Essential Protection Tasks STEALTH MALWARE SOFTWARE EXPLOITS CRYPTO RANSOMWARE CREDENTIAL HARVESTING PROCESS ATTACKS UNKNOWn THREATS Block Attacks ? Contain Threats ? Visibility and Control (over users/apps/data)
  • 98. XG Series Winning Advantages Industry leading performance with unique connectivity, reliability, and management 1. Flexible Connectivity 3. Easy Management  Modular desktop options for LTE, DSL, WiFi  Built-in bypass ports  Full line of copper and fiber FleXi Port modules  Unique RED devices Micro USB Management Ports USB and HDMI Ports 2. Business Continuity Redundant Power Supplies across the entire line Hot swap drives and PSUs on high-end models 4. Industry Leading Performance Among the highest rated price-performance by NSSLabs High-performance solid-state storage on every model
  • 99. Next-Gen XG Firewall NEW HARDWAREDEEP LEARNING VISIBILITY • Boosts performance 20+% • Adds unmatched connectivity • Best in class business continuity • Identifies 100% of applications • Uncovers shadow IT, data at risk • Unmasks top risky users • Unparalleled malware detection • 3,500 new files convicted weekly • Pre-emptive detection reduces risk
  • 100. Sophos XG Firewall The world’s best visibility, protection, and response 1. Exposes Hidden Risks 3. Automatically Responds to Incidents  Visual dashboard & rich on-box reporting  Identify risky users and suspicious payloads  Identify unknown cloud & evasive apps Unique Security Heartbeat™ Integrates EP Health into rules Automatically isolate infected systems 2. Blocks Unknown Threats Full suite of protection – easy to manage Deep learning Top performing IPS Engine
  • 101. XG Firewall + Intercept X = Stop Ransomware and NextGen Attack Exposes Hidden Risks Blocks Unknown Threats Automatically Responds to Incidents
  • 102. Security Heartbeat™ Sophos Security Heartbeat – Automated Response Sophos is the only vendor to use system health in firewall rules Security Heartbeat™ Servers XG Firewall Sophos Central Security Heartbeat™ links Endpoints with the firewall to monitor health and immediately share the presence of threats. Instant Identification Security Heartbeat can instantly share telemetry about the user, systems and process responsible Automated Response Automatically isolate, or limit network access, and encryption keys for compromised systems until they are cleaned up Internet XG Firewall Endpoints
  • 103. Sophos Central: Partner Dashboard Partner-Centric Portfolio Mgmt. MSP License Mgmt. Trial to Purchase
  • 104. Allows partners to manage multiple customer installations Endpoint Protection Email Security Web Gateway Server Protection Encryption Mobile Protection Wireless Allows users to access email, mobile, and encryption features Sophos Central Partner Dashboard Admin Self Service Firewall Management
  • 105. Synchronized Security Cloud Intelligence Sophos Labs Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions | 24x7x365, multi-continent operation | Malware Identities | URL Database | Machine Learning | Threat Intelligence | Genotypes | Reputation | Behavioral Rules | APT Rules | App Identities | Anti-Spam | DLP | SophosID | Sandboxing | API Everywhere Sophos Central Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations In Cloud On Prem Next-Gen Endpoint Mobile Server Encryption Next-Gen Firewall Wireless Email Web
  • 106. Kerry Logistics Producer Head office in Hongkong Over 100 Branches across Word Wide。 Quote “Sophos has engineered a simple solution that can help organizations quickly provide secure internet access both locally and remotely.” 30000+ Computers Central Endpoint Advanced, Intercept X, 200+ Servers Sophos Central Server Protection Network 100+ XG Firewalls (XG) Unify and simplify management Improved protection against mail, web, zero-day attack Analytics for better discovery and reporting Chenny Chen, CTO Unparalleled Protection
  • 107. Construction Company Over 65 years in Taiwan China, Hong Kong, Macau, Gurgaon, Kuala Lumpur Quote 1000 Computers Sophos Central Endpoint Advanced 200 Servers Sophos Central Server Advanced Network 56 XG Firewalls w/Web Protection, 2 iView Appliances Real-time network protection and real-time response across 50 sites in Taiwan and 30 in Hong Kong,China Automation Looking for solution to scale performance and security Automated Incident Response “We use Synchronized Security to protect our users from ransomware attacks and enhance our IT security environment.” Kevin Chueh, CIO
  • 109.
  • 110. FireEye Protect Defend Innovate Lawrence Li Channel Manager DIGITAL ENTERPRISE 2019
  • 113. ©2019 FireEye On the Front Lines. Every Day. 700+ THREAT RESEARCHERS, PLATFORM ENGINEERS, MALWARE ANALYSTS, INTELLIGENCE ANALYSTS, AND INVESTIGATORS 35+ NATION-STATE SPONSORED APTs TRACKED 600K – 1M MALWARE SAMPLES COLLECTED DAILY FROM 70+ SOURCES 4 CYBER THREAT OPERATIONS CENTERS WORLDWIDE THOUSANDS OF INCIDENT RESPONSE HOURS EACH YEAR 24,000 INTELLIGENCE REPORTS PUBLISHED IN 2018 FireEye Catches What Others Miss
  • 116. 7,700 customers worldwide, FireEye is trusted by more than including 50% of the Global 2000.
  • 117. as a Service Who is ? 5300+ Customers In 67+ Countries 825+ Customers Customers Breach Response $300M Cost CIO resignation CEO resignation $35M Cost Co-Chair resignation $81M Cost Governor Resignation Bangaladesh Bank 孟加拉國的中央銀行 Fedex https://www.cnbc.com/2017/06/29/fedex-cyberattacks-wanted-to-destroy-more-than-just-money-experts-say.html Deloitte https://www2.deloitte.com/content/dam/Deloitte/global/Documents/About-Deloitte/gx-FactsSheetforGlobalWebsite-cyber-attack.pdf Uber https://gizmodo.com/uber-s-new-ceo-was-told-about-the-companys-massive-data-1820722228 Home Depot https://www.consumerreports.org/privacy/home-depot-data-leak-exposes-gap-in-consumer-privacy-protection/ Equifax https://investor.equifax.com/news-and-events/news/2017/10-02-2017-213238821 HBO https://www.vanityfair.com/hollywood/2017/08/hbo-hack-seven-times-larger-sony Ebay https://uk.reuters.com/article/uk-ebay-password/hackers-raid-ebay-in-historic-breach-access-145-million-records-idUKKBN0E10ZL20140522 Yahoo https://www.reuters.com/article/us-yahoo-cyber-idUSKBN1432WZ? VTech https://www.reuters.com/article/vtech-cyberattack-fireeye-idUSL3N13S48G20151203 Premera Blue Cross https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/#more-30380 Freds https://krebsonsecurity.com/2015/06/discount-chain-freds-inc-probes-card-breach/ Arbys https://krebsonsecurity.com/2017/02/fast-food-chain-arbys-acknowledges-breach/#more-38024 Sabre corp hospitality https://krebsonsecurity.com/2017/05/breach-at-sabre-corp-s-hospitality-unit/#more-39249
  • 118. Leader in Cyber Security Services 177 Leader in Cyber Threat Intelligence Leader in Technology
  • 119. ©2019 FireEye FireEye Weaker Strategy Stronger Strategy Weaker Current Offering Stronger Current Offering Cyber Incident Response Services Q1 2019 Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte Secureworks KPMG Trustwave PwC EY NCC Group Verizon Booz Allen
  • 120. ©2019 FireEye External Threat Intelligence Services Q3 2018 FireEye Weaker Strategy Stronger Weaker Current Offering Stronger Current Offering Cyber Incident Response Services Q1 2019 Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte Secureworks KPMG Trustwave PwC EY NCC Group Verizon Booz Allen
  • 121. ©2019 FireEye FireEye Weaker Strategy Stronger Weaker Current Stronger Current Offering Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte KPMG Trustwave EY NCC Group Verizon Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Secureworks External Threat Intelligence Services Q3 2018
  • 122. ©2019 FireEye FireEye Weaker Strategy Stronger Strategy Weaker Current Offering Stronger Current Offering Challenger Contender Strong Performer Leader Optiv CrowdStrike Aon Cylance IBM Deloitte KPMG Trustwave EY NCC Group Verizon Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Secureworks External Threat Intelligence Services Q3 2018 Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment Q3 2018 Strategies Capabilities Participants Contenders Major Players Leader
  • 123. ©2019 FireEye Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment Q3 2018 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Strategies Capabilities Participants Contenders Major Players Leader RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks
  • 124. ©2019 FireEye 0EnrichmentDetections70 0 Overall Efficacy Score 288 Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment Q3 2018 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights Strategies Capabilities Participants Contenders Major Players Leader RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks Forrester Scoring of the MITRE ATT&CK Framework Evaluation (EDR) Q1 2019
  • 125. ©2019 FireEye 0EnrichmentDetections70 0 Overall Efficacy Score 288 Forrester Scoring of the MITRE ATT&CK Framework Evaluation (EDR) Q1 2019 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks CarbonBlack Endgame MicrosoftSentinelOne CounterTack RSA
  • 126. ©2019 FireEye Advanced Malware Sandbox Market Percent of Revenue Q1 2019 0EnrichmentDetections70 0 Overall Efficacy Score 288 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks CarbonBlack Endgame MicrosoftSentinelOne CounterTack RSA 100 % 0% Forrester Scoring of the MITRE ATT&CK Framework Evaluation (EDR) Q1 2019
  • 127. ©2019 FireEye Advanced Malware Sandbox Market Percent of Revenue Q1 2019 Optiv CrowdStrike Aon Cylance Deloitte KPMG Trustwave NCC Group Booz Allen PwC Hold Kaspersky Labs Group-IB Flashpoint Recorded Future Digital Shadows ProofPt Intel 471 Verint IntSights RSA Wipro HCL Fujitsu DXC IBM Deloitte TCS NTT Symantec FireEye Quann Verizon EY Secureworks CarbonBlack Endgame Microsoft SentinelOne CounterTack RSA 100 % 0% Company A Company B Company C Company D Company E Company F Company G Company H CheckPoint Cisco ForcePoint Fortinet LastLine McAfee Palo Alto Networks
  • 128. ©2019 FireEye Winning with FireEye Email Security Best Email Security Solution WINNER: FireEye Email Solution Source : http://www.scawardseurope.com/results-2018/ Source : https://www.crn.com/rankings-and-lists/ti2018.htm Source : https://www.scmagazine.com/2019-trust-awards/ Source : https://www.scmagazine.com/home/security-news/company-news/the-winners-of-the-2019-sc-awards-honored-in-the-u-s/ Jun 2018 Security - Email WINNER: FireEye Email Solution Nov 2018 Best Email Security Solution WINNER : FireEye Email Solution Dec 2018
  • 129. FireEye Helix FireEye Security Ecosystem Contextual Intelligence Alerts/Case Management Investigative Workbench Orchestration & Automation Central Management FireEye Network Security FireEye Email Security FireEye Endpoint Security 3rd Party Solutions FireEye Threat Analytics Advanced Intelligence Expertise On-Demand 3rd Party Apps Managed Defense Expertise Threat Intelligence Partner Services Community Marketplace Answers Research Tools Ideas Mandiant Services Strategic Advisory Technical Assessment Incident Response DIGITAL ENTERPRISE 2019
  • 132.
  • 133. Security in the IoT Era: Device Visibility an Control Michael Lafuente Senior Technical Consultant APJ Region FORESCOUT Technology DIGITAL ENTERPRISE 2019
  • 134. DIGITAL ENTERPRISE 2019 Digital Transformation DIGITAL ENTERPRISE 2019
  • 135. DIGITAL ENTERPRISE 2019 Confluence of Macro Trends Creating Visibility Challenges Growth of Devices & Platform Diversity 1990s 2020 Innumerable device-specific operating systems (OS) Cannot get agents onto new devices Cannot write agent-based software for every OS DESKTOP LAPTOP MOBILE CLOUD VIRTUAL SERVERS SERVERS DATA CENTER Cloud Adoption Creates New Challenges Multiple Device Locations and Access Points Heterogeneous Environment with Multiple Vendors De-centralized Management OT Convergence With IT Heightens Risk CORPORATE HQ • CRITICAL INFRASTRUCTURE • INDUSTRIAL CONTROL SYSTEMS INFORMATION TECHNOLOGY OPERATIONAL TECHNOLOGY OT networks are no longer physically separated Threats moving between cyber & physical dimensions Assets are highly vulnerable & rarely can be patched
  • 136. DIGITAL ENTERPRISE 2019 Visibility & Control Gap Vulnerability Increasing Attack Surface
  • 137. DIGITAL ENTERPRISE 2019 The Hidden Challenges of IoT IDC conducted in-depth interviews of 7 ForeScout customers to understand business value provided by ForeScout’s See, Control and Orchestrate capabilities
  • 138. DIGITAL ENTERPRISE 2019 Broad Recognition of Growth of IoT on Networks
  • 139. DIGITAL ENTERPRISE 2019 Despite this seemingly positive emphasis on IoT Security, some disturbing trends emerged 76% are Rethinking their Security Strategy Due to IoT Security Concerns
  • 140. DIGITAL ENTERPRISE 2019 Accepting a Significant Level of Security Risk
  • 141. DIGITAL ENTERPRISE 2019 So Who is Addressing IoT Security? SOC or LoB? Disagreement on Security Responsibility
  • 142. DIGITAL ENTERPRISE 2019 Confident on IoT Security…Until They Are Tested
  • 143. DIGITAL ENTERPRISE 2019 So Why Don’t They Do Anything About It? Complacency – Respondents & C-level “Tolerance” (for risk) seems to be less about what they are comfortable with, and more about what they are powerless to control.” - Forrester 2017
  • 145. DIGITAL ENTERPRISE 2019 Promote a Security Culture
  • 147. DIGITAL ENTERPRISE 2019 Practice Good Cyber Security Hygiene
  • 149. DIGITAL ENTERPRISE 2019 Boost Strength of Security Investments
  • 150. DIGITAL ENTERPRISE 2019 How can ForeScout help?
  • 151. DIGITAL ENTERPRISE 2019 Servers Virtual Servers Network MobileUsers Private Cloud Public Cloud Physical Security Security Building Automation Controller Systems IoT Devices Physical Equipment Laptops / Desktops Badging Campus Data Center Cloud Operational TechnologyIoT THE DEFACTO STANDARD FOR DEVICE VISIBILITY ACROSS THE EXTENDED ENTERPRISE Our Product Vision
  • 152. DIGITAL ENTERPRISE 2019 DEVICE VISIBILITY ASSET MANAGEMENT DEVICE COMPLIANCE NETWORK ACCESS CONTROL NETWORK SEGMENTATION INCIDENT RESPONSE Campus IoT Data Center Cloud OT Scalable Across Extended Enterprise Networks The ForeScout Platform Addresses The Visibilty Gap
  • 153. DIGITAL ENTERPRISE 2019 Time-to-Value 65 days – average time for visibility roll out 74 Net Promoter Score (above security industry average) Why Customers Choose FORESCOUT Visibility Across all major industries including Government, Financial Healthcare Discover 30% more devices on average Orchestration Increase value of existing investment Reduce MTTR with automation 2900+ Customers in over 80 countries 2M+ Devices in a single deployment 4.7M+ Device in Device Cloud 57M+ Total Device capacity sold
  • 154. DIGITAL ENTERPRISE 2019 THANK YOU DIGITAL ENTERPRISE 2019
  • 155.
  • 156.
  • 157.
  • 158. Huaming Wu DIGITAL ENTERPRISE 2019 Driving the Enterprise Digital Transformation VMware Senior Consultant
  • 159. Agenda 251  VMware Introduction  Market position and our vision  Enterprise Digital Transformation  Why need to choose digital transformation  How to help our customer make the decision  What ‘s the Benefit for choosing VMware  Success Story DIGITAL ENTERPRISE 2019
  • 160. 252 Industry-Specific Solutions Global and Local Presence Compatibility and Open Source Integration Industry and Domain Expertise Strategy and Planning Expertise Advanced Technology Capabilities 1,000+ VMware Service Professionals 100+ Consulting Partners 75,000 Solution Partners $8.97B annual revenue of 2019 5,00 Customer include Top 500 enterprises in the world. A Trusted Partner for Your Digital Business Journey VMware is the fourth biggest basic software companies!
  • 161. 253 Wide-Ranging Customer Success EDUCATION FINANCIAL SERVICES GOVERNMENT TECHNOLOGY HEALTHCARE/ PHARMA MANUFACTURING/ OTHER
  • 162. The Best 100 Ent US #7 Pat Galsinger Fortune Executive Leader #2 Leader of Hybrid Cloud Management Market Scape Leader of Unified Endpoint Management Leader of Hyper Converged Infrastructure Market share Leader of Cloud and IT Automation Leader of HCI and WAN Edge Infrastructure Magic Quadrant The Best Container Platform Management Award by EMA VMware CEO Pat Galsinger CRN 2018 Top 100 Executives #1 VMware Awards and Recognitions in 2018 DIGITAL ENTERPRISE 2019
  • 163. 255 Our mission We create an experience that makes the cloud invisible and easily to control so that our customers can focus on transforming their business
  • 164. Agenda 256  VMware Introduction  Market position and our vision  Enterprise Digital Transformation  Why need to choose digital transformation  How to help our customer make the decision  What ‘s the Benefit for choosing VMware  Success Story DIGITAL ENTERPRISE 2019
  • 165. 257 Transformation goes pragmatic As brands try to connect to customers’ lifestyles and habits, what real purpose do they serve in those moments? RPA and AI technology innovations will combine to create business value Automation is often placed in strategic and operational terms.  Manufacturing  Retail.  Financial services  Transportation. • 20% of brands will refine and revitalize purpose. RPA and AI will join forces to create digital workers for more than 40% of enterprise. 25% of leaders will use automation to address the talent scarcity squeeze. ---- source from : <<Predict 2019 Transformation goes pragmatic>> Investors are looking for the industries top 4 list.
  • 166. SaaS Replatform Keep app unchanged, move to new environment Refactor Modify app, new environment, on-prem or in the cloud Multi-Tier Hybrid Shift portions of multi-tier app to public cloud Replace Move to SaaS version of packaged app Develop for Cloud New cloud native app deployed on-prem & IaaS Maintain Keep app unchanged, modernize environment Cloud Native Apps Time to market • Innovation • Scale • Differentiation Existing Apps Reduce Costs • Security • Reliability • Control Application needs are driving IT strategies and directions Data Center and Cloud solutions must match the needs of each application
  • 167. AGILITY Accelerate time to Market Deliver new services that differentiate your business Optimize Costs Apply your IT budget based on ROI and app requirements Maximize Security Unify security from the data center to the cloud and device Manage Across Clouds Manage cost, usage, capacity planning, performance, and security across all clouds and on-prem Scale Seamlessly Seamlessly add resources across private and public clouds, expand globally COMPLEXITY AND RISK Extend to any Cloud everage consistent infrastructure from data center to the cloud The Challenge for IT: Increase IT agility while reducing complexity and risk
  • 168. All software will run on a cloud Enterprise‘s application to run on a cloud Self-service Scalable Rich services Secure, compliant Self- optimized Resilient
  • 169. 261 VMware Cloud Management Platform CMP as licensed software (vRealize) Cloud Assembly Service Catalog Code Stream Application Discovery Log Intelligence Wavefront Network Insight CMP as a Service (VMware Cloud Services) Hybrid Cloud Public Cloud CONTAINERSVIRTUAL MACHINES KUBERNETESVM Cloud Health Self-Driving Operations Programmable Provisioning Application Operations Cloud Health Cloud Assembly Service Broker Code Stream Wavefront Log Intelligence Network Insight vRealize Code Stream 2.4.2 vRealize Network Insight 4.1 vRealize Operations 7.5 vRealize Log Insight 4.8 VMware Integrated OpenStack 5.1 vRealize Automation 7.6 vRealize Lifecycle Manager 2.1 vRealize Business for Cloud 7.6 Cloud Management Platform Consistent Developer Experience
  • 170. 262 Industrializing Private Cloud • DevOps for CMP with vRS Lifecycle Manager • AI/ML-based performance & capacity optimization with integrated automation & cost (vRA- vRBC-vROps) • Native integrations with SDDC technologies, including VMC on AWS • Cloud Agnostic – common approach to hybrid and multi-cloud (AWS, Azure, GCP, VCPP, and more) • Developer-friendly • VMs and Container-based applications • Leader in Forrester Private and Hybrid Cloud Wave • #1 market share in 4 IDC reports • Positioned favorably by Gartner • Leader in Ovum Decision Matrix Why VMware • Best for SDDC and beyond • Most Complete • Trusted Market Leader
  • 171. 263Confidential │ ©2019 VMware, Inc. Use Case DIGITAL ENTERPRISE 2019
  • 172. 264 China Mobile China Mobile Communications Corporation(CMCC) is a Chinese state-owned telecommunication corporation that provides mobile voice and multimedia services through its nationwide mobile telecommunications network across mainland China. China Mobile is the largest mobile telecommunications corporation by market capitalization, and also the worlds largest mobile phone operator by total number of subscribers, with over 902 million subscribers as of June 2018. CMCC began to set up its Public Cloud business in Inner Mongolia, because the power supply and the climate, and thus comes the 139 Cloud of CMCC Inner Mongo. Business issues VMware Solution Business Value 1. Construction Size: 62 Million square meters , contains 18 datacenter building. And 52.5 thousand cabinets; 2. Total investment : $2 billion ; 3. Functions • Public Cloud and virtualization Resource pools • Multi -tenants help enterprise migrate application to cloud. • Site Recover services protect enterprise business available . 1. Storage has double protect method, even storage failure doesn’t impact the continuity of the operation; 2. base backup policy , all data are backup in virtual tape device; 3. comprehensive security policy • vvSphere • vSAN. • NSX. Base on VMware SDDC and SDN components build up the public cloud. VMwaer vSphere
  • 174. 266 Yili Group Yili Group has ranked among the world’s most successful dairy companies( rank 8), It is also the largest dairy company in China. It offers the most comprehensive range of products. In the course of development, Yili has always adhered “internationalization” and “innovation”, and insisted to the two fundamentals of “quality” and “responsibility”. Every day, more than 100 million Yili products are delivered to consumers. Business issues VMware Solution Business Value 1. International operation is an import strategy of Yili,offers the most comprehensive range of products and serve for the more and more people; 2. boost the innovation in the dairy sector, develop the health and suitable dairy products ; 3. updated Yili's global quality and safety management systems ; • Design the IT infra structure in next 3 years to match the the requirement of business growth rapidly • Build up Active-Active Data Center and recovery site, support Seamless data recover in local city or 5 min recovery to another city. • vCloud Suite advance • vSphere、vSAN、NSX • vxRail /DELL 1. build a bridge for the communication and exchange of information that is necessary for production plants, completely present the situation of a real time. 2. Yili uses the digital technology to collect and monitor data, get data value and turn into attractive models, improve the quality of service. 3. Accelerate IT-infra agility, support more management system go live, improve system stability
  • 176.
  • 177. Machine Data Insight Into The AI World YANTAO HU Senior Consultant Splunk North Asia DIGITAL ENTERPRISE 2019
  • 178. Top Predictions for 2019 by Splunk DIGITAL ENTERPRISE 2019 * Pulling together insights from our thousands of customers and our dedicated research teams, our experts have assembled a shortlist of the top predictions for 2019. - Splunk Predictions 2019
  • 179. Top Predictions for 2019 by Splunk DIGITAL ENTERPRISE 2019  Artificial Intelligence and Machine Learning as it breaks out of the lab  Security in the wake of heightened compliance regulations and evolving digital environments  IT Operations as it transforms to focus on application mobility  IoT as it claims its stake in the modern organization
  • 180. Splunk AI Solutions DIGITAL ENTERPRISE 2019 Machine Learning Toolkit (MLTK)
  • 181. Nasdaq: Keeping Markets Moving DIGITAL ENTERPRISE 2019 “ Splunk UBA gives us insight into internal threats and is a unique data science-driven approach that automatically finds unknown threats that traditional rule-based methods can‘t match. ” - AVP, Nasdaq • Using Splunk Enterprise to monitor potential external security breaches and UBA to detect insider threats • Analyst efficiency to gather data and speed security investigations has increased by more than 50 percent • Provides deep understanding of data and reusable correlation rules across all support engineer levels
  • 182. Splunk UBA: Active Directory Intelligence DIGITAL ENTERPRISE 2019 Root of All Evil Actual Activities Active Directory Events Remote PowerShell Go to CompB - Login success - Execute UserA SrcComp DstServ PS Admin$ IPC$ 4688 4688 4648 4624 4768 4768 Domain Controller internal auth 4672 5140 5140 target cmd 4688 SC manager 4674 PS 4688 4624 4768 4624 Chaotic world of internal micro interactions
  • 183. Splunk UBA: Unsupervised ML Analysis DIGITAL ENTERPRISE 2019
  • 184. Splunk UBA: Unveil the Kill Chain DIGITAL ENTERPRISE 2019
  • 185. Vodafone Implementation of AI with Splunk DIGITAL ENTERPRISE 2019 • Problem Statement Efficiency and speed of service restoration post planned and unplanned outages to ensure: Application uptime Customer experience Service fulfilment Operation resource utilization 2-3 changes per week • Requires dedicated and coordinated efforts across multiple teams Complex architecture to meet business requirements • 12 core applications & Complex integration to other 80 Long and complex restoration process to: • Avoid dominos affect on applications
  • 186. Vodafone Implementation of AI with Splunk DIGITAL ENTERPRISE 2019 • Splunk AI Solution  Intelligent decisions based on real time performance resulting in efficient queue throttling  Applied Machine Learning to predict ticket priorities, categories, assignees and resolutions
  • 187. Vodafone Implementation of AI with Splunk DIGITAL ENTERPRISE 2019 • Benefits realized Cost Savings  Resource reduction  Man Hours Savings / Year  Up to 50% faster queue throttling AI & Machine Learning  Reduced SME dependency Opportunities  Further Artificial Intelligence / ML within Operations space Customer Experience  Reduced issues and time to BAU, enhances Vodafone TNPS
  • 188. DIGITAL ENTERPRISE 2019 • CBM In The German Public Rail Transportation System • Analyzing train door machine data using Splunk Machine Learning capabilities • Maintenance & repair cost exceed expectations • Cost overruns influence the operational result • Failure of systems cause interruptions of service Condition-Based Maintenance Deutsche Bahn
  • 189. Condition-Based Maintenance DIGITAL ENTERPRISE 2019 Bombardier TALENT 2 Deutsche Bahn
  • 190. Detecting Anomalies Using DBSCAN DIGITAL ENTERPRISE 2019 DBSCAN From Splunk Machine Learning Toolkit Anomaly  indicating door-locking malfunction! Energy-consumption (Ampere) over recent opening events Deutsche Bahn
  • 191. DIGITAL ENTERPRISE 2019 • Reduction of service interruptions • Even distribution of stress to the mechanical components • Foresight in failure-causing effects and when they occur • Alerting and reporting at any moment through live-data • Precise scheduling of maintenance cycles Benefits of Implementing CBM Overall cost reduction! Deutsche Bahn
  • 192. DIGITAL ENTERPRISE 2019 • Since deploying Splunk Phantom, Blackstone has seen benefits including: • Fast and accurate resolution of malware alerts • Ensuring a repeatable and auditable process for investigating malware alerts Splunk Phantom @ Blackstone “Automation with Splunk Phantom enables us to process malware email alerts in about 40 seconds versus 30 minutes or more.” Adam Fletcher, CISO Blackstone
  • 193. DIGITAL ENTERPRISE 2019 1. Security Analyst 1. Extract attachments / Detonate in a malware sandbox /Catch the results 2. Extract URLs (from emails & attachments) / Check URL Reputation 3. Collect all IP’s involved (including sender, MTA) / Check IP reputation 4. Summarize Indicators of Compromise / Threat Intel 5. Search for Threat Intel. in your log data (Network Traffic, Proxy, Email, Email Filter, Endpoint data sources) / Identify affected hosts and users 6. Document / The Security Analyst Hands Over to the Threat Responder 2. Response Through the Threat Responder 1. Block IP at the Firewall 2. Block URL at the Proxy 3. Block E-Mail Domain at the Spamfilter 4. Block URL & IP & Hash at the Endpoint Security 3. Malware Containment 1. Create Ticket for Service Desk 2. Service Desk cleanups host 3. Threat Responder validates cleanup was efficient 4. Ticket closed Splunk Phantom @ Blackstone 45m
  • 194. DIGITAL ENTERPRISE 2019 Splunk Phantom @ Blackstone Time per Play: 30-60 Seconds + human review time
  • 195. DIGITAL ENTERPRISE 2019 • Previous industrial revolutions • Steam and the first machines that mechanized some work • Electricity, the assembly line and the birth of mass production • Computers and the beginnings of automation • Next stage so called smart factory • Design principles • Interoperability • Information transparency • Decentralized decisions • Technical assistance systems Industry 4.0 at the BMW Group
  • 196. DIGITAL ENTERPRISE 2019 Technical assistance system for rework process Break Test Battery Test Chassis Test (Re-) Workers Rework Protocols+ Test and Error Events ID 12: Assignment Error at Airbag Control Unit Init-Test ID 23: Operating Voltage too low at Steering Wheel Test defectiveversion wrong unit unlock airbag control changed unit version wrong ID 45: Cannot Read Variable AIRBAG_SENSOR_VA LUE
  • 197. DIGITAL ENTERPRISE 2019 What to do with Splunk MLTK  Error Patten / Building Clusters  Clustering using Custom Splunk-ML-Algorithm: • Spectral Clustering with a custom affinity function • Determines the group (color) of closely linked errors  Forming the complete hierarchy (all nodes up to the root) of reworking categories
  • 198. DIGITAL ENTERPRISE 2019 Achievement Provide an assistance system  Support the workers with the "experience" that we can draw from the historic data  Give qualified recommendations for reworks  Fix errors before subsequent errors occur  Optimization of rework logistics Error Classes Error Patterns Mapping Rework Categories Hierarchy of Rework Categories Recommen- dations
  • 199. DIGITAL ENTERPRISE 2019 • Industry 4.0 – Use Case on the shop floor Splunk @ Porsche
  • 200. DIGITAL ENTERPRISE 2019 Industry 4.0 – Use Case on the shop floor Industry 4.0 • The 1st Realtime Usage Dashboard of Shop Floor at Porsche • Data from the supply chain and unstructured data get together • End-to-End View of All Production Stations • Station Health Status Monitoring, Deep Dive, and Predictive Analysis
  • 201. DIGITAL ENTERPRISE 2019 Mission of Splunk Our Mission