“Smarter Government Summit 2014”

stg-cmriadmin18

stg-cmriadmin18

978x80

 

Intelligent & Interconnected Application Infrastructure WAS
With increasing adoption of internet, there is a significant shift in the landscape of Government business. Enhancing citizen-connect and building customer-centric services is one of the key imperatives in the public sector. They are also realizing the impact of IT on their revenues and therefore cost optimization, effective management of existing resources and innovation for new services are now on the radar in this part of the world.

The flexibility and intelligence of application foundation lets you build, deploy and manage innovative, high performing, reliable and secure applications and services. It facilitates delivery of your business objectives while reducing infrastructure costs across all server environments.

 It increase developer productivity with open standards and broad programming models, including lightweight options for web deployments.
 Helps deploying and managing applications and services without the constraint of time, location or device type.
 It includes the Liberty profile, a dynamic web application server profile.
 Enhances security and control using integrated management and administrative tools.

Security Intelligence, Analytics and Advanced Threat Protection
Advanced security threats are increasing, but simply adding more layers of defense does not necessarily increase security against targeted threats; security controls need to evolve. According to CMR targeted attacks are penetrating standard levels of security controls and causing significant business damage to enterprises that do not evolve their security controls. According to industry estimates, for the average enterprise, 4% to 8 % of executables that pass through antivirus and other common defenses are malicious. Enterprises need to focus on reducing vulnerabilities and increasing monitoring capabilities to deter or more quickly react to evolving threats. There are existing security technologies that can greatly reduce vulnerability to targeted attacks.

The major advance in new threats has been the level of tailoring and targeting — these are not noisy, mass attacks that are easily handled by simple, signature-dependent security approaches.
Targeted attacks aim to achieve a specific impact against specific enterprises, and have three major goals:

• Denial of service: Disrupting business operations.
• Theft of service: Obtaining use of the business product or service without paying for it.
• Information compromise: Stealing, destroying or modifying business-critical information.

The sophistication of cyber threats, attackers and their motives is rapidly escalating. Attackers are going after specific organizations and they are exploiting previously unknown vulnerabilities using highly customized malware, making these attacks very difficult to protect against.

The Security Intelligence with new incident forensics and vulnerability management capabilities, along with Big Data analytics solutions, provide 360-degree visibility across an entire network, using real-time correlation and behavioral anomaly detection to help detect threats, vulnerabilities, and compliance risks that might otherwise be missed. New incident forensics capabilities allow for full deep packet capture analysis so all analysis on potential and actual threats can be seen quicker and in deeper detail.

Smarter Storage to Manage Traditional IT Environments
When you talk about the public sector being smarter in the age of interconnectedness, managing Big Data in secure environment and so on, the comes the importance and issues of managing Storage in traditional IT Environments. Today rapid data growth outpaces organization’s ability to invest in more storage infrastructure. Meeting business resiliency objectives by ensuring data availability and mitigating impact of data loss regardless of cause such as natural disasters, user error, hardware failures, viruses etc is the need of the hour.

A mix of natural disasters, political upheaval and financial crisis in 2013 has prompted companies to plan for 2014 against a backdrop of economic turmoil and great uncertainty. However, in certain areas of business, there are still some absolute certainties. One such area is that of data storage and storage infrastructure, for which demand will undoubtedly intensify in the year ahead, continuing the trend in recent years of exponential growth.

Storage efficiency: There will be a greater focus on storage efficiency technologies such as storage virtualization, dynamic or thin provisioning.

Consolidation to convergence: Consolidation will give way to convergence. Over the past few years IT has focused on consolidation and much of the low-hanging fruit has now been consolidated. In order to gain further cost savings, the focus will be on convergence of server, storage, networks, and applications.

Big Data: The explosion of unstructured data and mobile applications will generate a huge opportunity for the creation of business value, competitive advantage, and decision support if this data can be managed and accessed efficiently.

Storage scaling: Server and desktop virtualization will increase the need for enterprises to scale up storage systems, non-disruptively as physical server demands increase