Cloud & Service Management blog
ivor macfarlane 2700022KPS IVORMACF@uk.ibm.com Tags:  itil complaints tivoli itsm ibm service-management ivor 3,213 Visits
David Ojalvo 060001CNQC DAOJALVO@US.IBM.COM Tags:  center partners tivoli knowledge 2,062 Visits
A colleague of mine just introduced me to another great Tivoli resource for Business Partners. The Tivoli Knowledge Center is a great place for partners to get the training and skills to successfully sell, service, and become certified on our most important and strategic IBM Tivoli product lines. It includes marketing tools, as well as technical, training and sales resources.
For those partners who are new to the Tivoli family, there is a very intuitive "Getting started with Tivoli" section. For the 'seasoned veterans' who already have a relationship with Tivoli, there are quick links to sales kits, sales plays, and incentives.
One of this month's top stories will point you to the Business Partner Summit presentations from Pulse 2012. Within that page, you can find a link to the "Small Deals Equals Big Revenue" charts that were presented by Tamara Crawford and Michele Payne to an audience of about 60 partners at Pulse 2012. I was fortunate enough to attend that presentation in Vegas, and got some great insight from the presenters and the partners, who offered up a lot of great questions and comments.
The Tivoli Knowledge Center can be found within the PartnerWorld web site so feel free to share this resource with YOUR colleagues!
Noah Kuttler 110000SVNJ firstname.lastname@example.org Tags:  cloud devops service-management apm innovate jazz storage edge 1 Comment 5,629 Visits
As I type this, so many of our customers, partners and my colleagues are in the "brutal" 88°F* weather learning more about storage and software & system innovation.
Since much of my focus is around product announcements, I wanted to point folks to the IBM Tivoli Storage Productivity Center V5.1 announcement that happened yesterday (Announcement Letter 212-189).
For content coming from the conference, a number of the marketing team are on the ground at Edge and tweeting. Be sure to follow Maria, Martha and Branavan (and of course, @ibmstorage) as well as the hashtag #ibmedge.
The Rational team have a number of exciting new announcements around Jazz and they will be talking quite a bit about mobile, cloud, industry solutions and a few other things including DevOps.
For us service management folks, DevOps translates into tangible benefits we can bring back to the business; like fewer errors and faster time to resolving errors if they do occur.
Of course, at Innovate there's a lot more to talk about with DevOps. Including the announcement from last week of IBM SmartCloud Application Performance Management 7.5 (Announcement Letter 212-143).
Along with IBM SmartCloud Control Desk and IBM SmartCloud Provisioning Manager (among others), it's about developers and testers having access to the same tools, data and information that operations uses and leveraging them to fix problems before they occur. And if problems do occur, the linkages with tools like Rational Application Developer and Rational Performance Tester allow the developers and testers to quickly resolve these issues as everyone and everything is connected.
As stated before, fewer errors and faster time to resolving errors if they do occur. This translates into using time to be productive and being innovative. Innovation is what provides value back to the business.
There's a good press release from yesterday, "IBM Expands Collaborative Software Development Solutions to Cloud, Mobile Technologies" that highlights some of the integrations and new solutions (including Application Performance Management).
The conference is being livestreamed (with video available right on the IBM Innovate home page) and be sure to follow the discussion on Twitter using the hashtag #ibminnovate and be sure to read the Invisible Thread blog for updates on what's happening on the floor.
* 88°F = 31°C.
David Ojalvo 060001CNQC DAOJALVO@US.IBM.COM Tags:  ibm co-marketing mid-market partner smb business 2,373 Visits
In my quest to identify valuable resources for IBM Business Partners, I came across another excellent one.
The "2012 Co-Marketing Guide for IBM Business Partners" is an online, user-friendly guide that looks and reads like a small spiral notebook. The color coded tabs make it extremely easy to navigate through the topics which include co-marketing programs, assets, incentives, sales plays, and solutions. The guide has dozens of hotlinks which point to PartnerWorld web pages, and is also a great conduit to funnel users to the new "Co-Marketing Center" where they can create and design their own customized "Ready to Execute" campaigns.
As a staunch advocate of content consolidation and "one-stop-shop" repositories, I highly recommend this new resource, and would encourage you to view the many other resources that are available on the PartnerWorld SMB web page.
ivor macfarlane 2700022KPS IVORMACF@uk.ibm.com Tags:  ibm itsm itil customer-survey ivor 3,324 Visits
How would you feel, as manager in your company’s IT department, when the marketing people specified, commissioned and developed an IT application for their needs?
I was driven to ask this question by several ‘customer surveys’ that I have seen come out of the IT departments. An extract from my very favourite is shown here, which while it demonstrates admirable self-confidence it is perhaps not the perfect basis for objective assessment.
It just seems strange to me that an industry built entirely upon providing specialist expertise to allow others to deliver their jobs doesn't always feel the need to get specialist advice itself.
Now, personally, I do believe I know at least as much about building, delivering and analysing surveys as I do about technology application. But that is mostly because I know so little about technology. In both situations I would always welcome expert advice if I need to get something right.
Even IT listens to the CFO’s people when it comes to costs and accounting, yet many have potential access to significant expertise in their marketing people that goes untapped.
This feels important to me simply because of the all the bad surveying we still see. I suspect that availability of free services like Survey Monkey leads us to build and do surveys without any real planning, and without thinking through how we might analyse and use the results when we have them. Basically a good example of reducing the ‘Plan-Do-Check-Act’ cycle down to ‘Do’ - speedy and economic but not usually very effective.
As for the confusion and the wrong results taken from unrepresentative samples …
For simple, but telling, examples think about how many ‘customer survey’ results you have seen where in fact it is only users who have been addressed. It is an important thing, user satisfaction, but it isn’t customer satisfaction and we need to find out both and act accordingly on what we find. For example if you have 100% perfect user satisfaction, then the odds are your customers will think they are spending too much. And you will frequently see a mix of customers and users asked questions that are not really targeted at all, just asked because they can. This is often based on the – misplaced – belief that the more people you ask, then the more accurate the answer, ignoring the whole ‘sample selection process’.
Take a classic ITSM example, where a support unit routinely sends questionnaires to those who have made use of the service desk. This, of course, gives you a satisfaction result amongst those who have had sufficient problems to make them phone for help. Might you expect a rather lower score from these people than the ones who have been working quite happily without the need for support.
We know we need to care more and more about understanding what our customers – and users and other stakeholders – want and need. We also need to understand it is not always an easy task to find that out. There is a whole professional specialism out there that delivers this service – as service providers ourselves, proud of our professional expertise, should we recognise that more – and take some better advice before we ‘knock something up to measure satisfaction?
Maybe you do consult with your internal experts if you have them, or maybe you buy in expertise. It would be good to hear if you do.
David Ojalvo 060001CNQC DAOJALVO@US.IBM.COM Tags:  partners business co-marketing partnerworld 1 Comment 4,084 Visits
I recently stumbled upon a great little co-marketing resource for Business Partners . The Mid Market Asset Gallery is a slick and extremely user-friendly one-stop-shop repository for the most recent midmarket advertising and demand generation assets. What I liked most about this tool was its search functionality, which enabled me to easily filter by campaign, asset type or date.
I did a quick search on a topic that is near and dear to me lately - IBM SmartCloud, and I unearthed a very cool downloadable print add that speaks to the ways that IBM and its Business Partners can work with a midmarket business to "take all or part of their IT infrastructure to the cloud".
I would encourage you to check it out to increase your awareness of the various campaigns and drive usage of the assets with your BPs.
ivor macfarlane 2700022KPS IVORMACF@uk.ibm.com Tags:  ibm itsm measurement ivor itil itsmf tivoli 2,422 Visits
People seem to like a thing to be right or wrong. Yet the older I get the more it seems to me that very few things are totally right, and that there is rarely only one right answer to real situations.
Hope Ruiz 110000NU71 HRUIZ@US.IBM.COM Tags:  tivoli_user_community tivoli_user_community_web... ibm_webcast tuc 1,230 Visits
Shifting Towards Transparent Development:
How you can make an impact on the future of Tivoli products
May 8, 2012 at 11:00 am ET, USA
Space is limited. Reserve your Webinar seat now (click here)
Overview: Connect, learn, and share with IBM Tivoli on the development of future product releases. Learn how you can get open access to release plans, product roadmaps, sprint demos, and beta code so that you can provide feedback and make a direct impact on what development teams deliver.
About The Speakers:
Denny O’Brien is a manager in the IBM Tivoli strategy and development organization. In his current role, Denny manages the development and strategy of Service Management Connect, a community site that provides best practices and discussion around technical discussion around Tivoli products, and connects clients and business partners to IBM Tivoli development. Denny also is leading the transformation within Tivoli to a new transparent development model, which will give more clients access to future development plans and a bigger voice in the direction of Tivoli products.
Webcast replays will be posted here
The Official Tivoli User Community is the largest online and offline organization of Tivoli professionals in the world – home to over 160 local User Communities and dozens of virtual/global groups from 29 countries – with more than 26,000 members. The TUC community offers Users blogs and forums for discussion and collaboration, access to the latest whitepapers, webinars, presentations and research for Users, by Users and the latest information on Tivoli products. The Tivoli User Community offers the opportunity to learn and collaborate on the latest topics and issues that matter most. Membership is complimentary. Join NOW!
ivor macfarlane 2700022KPS IVORMACF@uk.ibm.com Tags:  ivor itsm ibm best-practice tivoli itsmf service-management 2,599 Visits
For most of last week I was attending and – I hope – contributing to itSMF’s international publishing meeting. This was held in
Now, first a little background, just in case there is anyone who does not know what the itSMF is. The letters stand for IT Service Management Forum – and that sums it up quite well: a place for those interested in ITSM to talk, learn, teach, compare and discuss. Part of that communication naturally involves publication – and our group focuses on that – from reviewing others’ books through translation and dissemination to encouraging authoring and publishing books. Crucial to its attitudes and success, itSMF is a non-profit organisation, owned by its members.
OK, as you may imagine it is – as well as serious working meeting – a chance to catch up with friends and colleagues of the ITSM global village. And the active ITSM community really is like a village, except that it spread across some 50 countries – we have all the relationships that you would expect: friends, enemies and lots in between.
All of us have our day jobs, many of us
working for cut-throat competitors but that all gets set aside and we settle
back into our ‘all in this together’ mode. One of things that I came back from
That makes the non-profit member owned organisations a lot like government – and like governments today we are strapped for cash. These are hard times and no-one has much in the way of spare money. But we still strive to fight against what would be a sensible approach for an organisation focused on shareholder value. We still need to deliver what the ‘right things’. From our publishing perspective it would be tempting to look only at safe books – rearranging established best practice into easier, shorter or simpler reads. Instead though, everyone at our meeting sees that we need a focus on innovation and stretching our industry.
Of course we need to be financially successful with enough of our projects, and we have work to do on building a firm base to take ourselves – and our industry – forwards. But I am proud that the books we have already managed to publish contain real industry innovations and new perspectives – both on service management as you would expect but also into wider topics such as organisational change.
So, I came back feeling the need to write down how much work people put in – for nothing – last week. I’m not claiming I did that much, but lots of work was put in, and even more commitments made to keep the momentum going and I felt that it was a few day’s work I was proud to have been a part of and an effort worth recording here. In some later blogs I might relate more about other aspects of the trip - like using budget airlines and the change in perspective of value that goes with that.
So – please go read about what we have already managed (6 books published, quarterly magazine, whitepaper competition etc.). You can find out about the books are – and read the magazines for free by going to http://www.itsmfi.org/content/publications. If that gets you interested in how you can get your ideas written up and out there then get in touch. My portfolio responsibility is ‘Authoring’, so I would love to hear from you. We are keen to find new authors, for whitepapers, books or articles – and happy to offer any level of support you might need – from final review through mentoring and even to co-authoring or ghost writing.
By my next blog, I will be back in successful company mode, but it is good to remember that the commercial companies also live in and benefit from the wider community. It is good to see that being recognised through sponsorship and support. IBM sponsored the meeting last year - this time we had support from TSO and BTC. massive thanks to those companies. With more support next year we should have more people and achieve even more.
Rebecca Swindell 270003U1MK REBECCA.SWINDELL@UK.IBM.COM Tags:  infosec ibm pulse xforce robert_freeman 2,163 Visits
Rebecca Swindell 270003U1MK REBECCA.SWINDELL@UK.IBM.COM Tags:  application_security x-force rob_ford infosec rob_whitters simon_smith infosecurity john_smith q1-labs qradar 5,104 Visits
IBM had another great four speaking sessions today, and a colleague of mine -Lauren Mort (@Laurenmort2), joined me to help with our social media activities throughout the day. Below are the key points that Lauren and I thought were raised during the sessions.
Despite our first session being a report of the one given by Simon Smith yesterday, we still learnt some more interesting facts whilst he took the audience through the journey from basic, to proficient to a final state of optimised security (which you can see in more detail in our blog from yesterday - http://ibm.co/IoV9ju). Simon talked about how the optimisation needs to be the specific to the individual company, be it a large multinational bank or a 100 person company in the UK. A good security model can mean high levels of staff retention, because employees are able to be innovative on other projects, rather than having to deal with the daily struggle of keeping the network secure.
Simon spoke about how you need to start understanding what in your network is a normal state and what isn't a normal state in order to achieve the desired “optimised” state. The security needs to fit your business processes to ensure the maximum amount of availability on your systems. Simon finished by talking about how security needs to be built into the design, in an ideal world from the word go – which often is untenable, but it certainly should not just be a “bolt on”. Security is all about risk, and it’s the effective managing of this risk that can lead you to the desired “optimised” state.
The second session of the day was given by John Smith on application security hacking 101 – to a packed room of over 70 people! He opened the session by talking about the work of our X-Force team, who monitor 14b security events every day and produce an annual trends and risks report on what security breaches etc we have seen over the last 12 months. John talked to the audience about SQL injection attacks against web servers, and how they are on the rise - saying there must be a return for the attacker even if it is not at apparent at first. John told the audience that in 2011, 41% security vulnerabilities affected web apps – which is good news as that was down 8% from the previous years, and the lowest it’s been since 2005. This stat shows the organisations are taking the important steps needed to address this problem – by using products like IBMs AppScan!
John then continued the session by looking into XSS vulnerabilities, which still appear in 40% of app scans that IBM perform for companies – which he said was scary as they can so easily be addressed. John explained how injection flaws have “become the poster child of application security”. John then gave the audience an example of an XSS attack, and how much easily a lot of damage can be done, despite warning end users of such possibilities.
John closed the discussion by looking at black box (dynamic) analysis & white box (static) analysis, and gave examples of how these both work. He then offered all the audience a free demonstration of IBM AppScan on their own networks – which many of the audience took him up on!
Rob Ford and Jef Gielkens were next up for IBM, who gave a presentation on Integrated, Intelligent Security analytics for Enterprises. They talked about as the world is becoming more and more digitalised and interconnected, we are opening the door to emerging threats and more data leaks. They looked at four key components that we are currently seeing, all of which are affecting IT Security in some way – Data Explosion, Consumerisation of IT, Everything Everywhere and Attack Sophistication. Jef then looked at the different attacker types and techniques that we are now seeing, and how this is making security a board room discussion, be in affecting brand image, business results, supply chain, legal exposures, impact of hacktivism and audit risk.
Jef talked about how it is no longer enough just to protect the perimeter, silo point products are not enough to secure your enterprises, IBM is integrating across it silos with security intelligence solutions. He spoke about the X-Force protection systems – which is a purpose built, multi tenanted infrastructure designed to collect, aggregate, store, summarise and analyse data to derive the events of most interest.
Rob then took over and showed the audience the MSS architecture overview and how it can be used to optimise security intelligence. He looked into suspicious hosts and IP intelligence. He then took the audience through three use case scenarios – visibility despite encryption or obfuscation, identification of reconnaissance and infected websites. Jef wrapped up the session by stating that intelligent security solutions provide the DNA to secure a Smarter Planet.
Rob Whitters gave the final session of the day for IBM (entitled Next Generation SIEM in Action), who has just joined IBM through the acquisition of Q1 labs. Rob opened by giving a brief history of Q1 labs and his involvement with the company. He explained that Q1 labs solve customer problems with total security intelligence. He explained how they are able to help customers look at the threats on their networks, predict risks against the business, consolidate data silos and detect insider fraud. Rob spoke about how the product can be used to link context to what threats we are seeing on the network, where it’s from, which asset it is affecting, changes in network protocol etc and from this derive vulnerability data.
Rob then took
the audience through a demonstration of the QRadar product, looking at the
customisable dashboards, the role based permissions/access and various
workflows. He explained how QRadar allows you to get to the facts quickly and
the data allows you to be proactive, to do something intelligent with it. He closed by talking about some of the 1500
report templates available inbuilt in the product, that can be used to
demonstrate immediate value.
If you would like copies of any of the presentations, please email me at email@example.com.
Come back tomorrow evening for my thoughts from day 3 and
final overview of Infosecurity 2012!
TUC Webinar - April 26: Managing the Smarter Physical Infrastructure with the IBM SmartCloud Control Desk
Hope Ruiz 110000NU71 HRUIZ@US.IBM.COM Tags:  smarter_physical_infrastr... ibm_smartcloud tuc tivoli_user_community 1,385 Visits
TUC Webinar - come learn with us!
Spend the day in the cloud! This webinar is the hour followin
Rebecca Swindell 270003U1MK REBECCA.SWINDELL@UK.IBM.COM Tags:  xforce infosecurity q1_labs mobile_device_management robert_freeman siem 1,819 Visits
It was great to be back at Infosec, with a very colourful IBM booth, that clearly stands out from the crowd! We had four sessions during the day, and below are the key points that I thought were raised.
Our first session was given by Robert Freeman, Manager of X-Force Advance Research Strategy, on The Advanced Persistent Threat in 2012, who opened by talking to the audience about the role of the X-Force team at IBM. He spoke about how 2011 was the year of the security breach, and went into some specific, well known examples that made it into the news during the year. Robert then talked to the audience about who is actually attacking our networks - attacker types and techniques based on the X-Force research, be it off the shelf versus sophisticated attacks, broad versus targeted, financially motivated, state sponsored, or all out cyber war!
The next IBM session was given by Steve Durkin, who joins IBM from our recent acquisition of Q1 labs, whose session was titled “providing your business, total security intelligence”. Steve Durkin opened the session by talking about Security and Information Event Management or SIEM for short! He wanted the audience to understand that SIEM leads to actionable and comprehensive insight into their security infrastructure. He also took the audience through the industry examples of attacks on businesses we have all seen in the press during the last few years. Steve spoke about the four domains or pillars that IBM see as forming a comprehensive IT Security – People, Data, Applications and Infrastructure - if you have got all four areas covered you've cracked it. He then explained that Q1 labs products should been seen as the glue that hold all of these together. Steven urged that internal threats are just as dangerous as external ones. He wanted the audience to ask themselves if they have taken the best steps to protect against these.
Vijay Dheap was next up for IBM, who talked to the audience about Securing Mobile Devices in the Enterprise. He gave some very interesting stats, such as in 2011 sales of smart phones surpassed that of PCs, soon they will dwarf the sales of PC, by 2015 40% of Enterprise devices will be mobile devices – (an IBM projection) and 50% of all apps send device information or personal details. Social norms are now different - mobile devices used in way more locations, mobile devices shared more often, and user experience is prioritised. He continued by talking about how apps now push the boundaries of collaborations, but unfortunately leave you open to attacks. He urged the audience to have visibility to what mobile devices are connected to their corporate network and be reactive, be responsive, and be transparent.
Our final session of the day was given by Simon Smith who presented on Infrastructure Protection - Towards an Optimised Security Position. He talked about how IBM is keen to usher in new era of security intelligence. He then took the audience through what he saw where the different stages companies are at when it comes to IT Security, asking the audience to share where they thought they were in the journey. He first discussed what “basic” security looks like: point solutions, stand alone products & deployments, different solutions for every problem block and prevent attacks, and analysis is mostly manual & reactive.
This is combined with correlation and analytics, alerts based on predefined rules and information, auto analysis and assessment reports and alerts. Simon closed by saying there are no absolutes, no scoring systems, you should look at where we are and your aspirations.
Simon mentioned that there will be new product announcements tomorrow morning, so be sure to follow me @RSwindell and @IBMSecurity to find out what they are! #
If you would like copies of any of the presentations, please email be at firstname.lastname@example.org.
Come back tomorrow evening for my thoughts from day 2 of Infosecurity 2012!
Rebecca Swindell 270003U1MK REBECCA.SWINDELL@UK.IBM.COM Tags:  colin_proctor smarter_buildings mark_baker pulse john_mcclelland iibm trirgia claire_penny public_sector_connect derek_mackay colin_mair 4,671 Visits
On Tuesday IBM were Sponsors at the New Ways of Working, Scotland event, at the Radisson Blu Hotel in Glasgow- http://newwaysscot2012.publicsectorconnect.org/.
The conference aimed to help those working in the public sector, specifically addressing the problem of improving “services whilst managing with reduced budgets”. The sessions looked into how the need for a greater flexibility of work styles, has created “new ways of working” that mean work can be carried out “anytime and anywhere”.
Having previously attended the fantastic Government Property event run by the same company (Public Sector Connect) I was sceptical about whether this event could live up to the high standard they had set. I needn’t have worried! The sessions were highly educational and enlightening. This blog will cover what I thought were the key learning’s from the day – so I hope you find it interesting.
The plenary session was opened by Colin Mair, Chief Exec of Improvement Services, who discussed the theme of why we need “New Ways of Working” and what it means. He spoke about the need to manage resource constraints, decrease overheads, increase flexibility and optimise capacity through sharing services, all the while meeting the public’s expectations, and increasing the value of the public pound in Scotland.
Next up was Derek MacKay – the minister for local government & planning, who wanted the audience to remember that the current budget costs should not be seen as restrictive but instead should be viewed as an impetus for change. He continued that if we continued to do what we have always done, we will get what we have always got. He emphasised the need for joint, collaborative working. Derek talked about the four pillars of Public Sector reform – prevention, closer integration and partnership, improved performance and a workforce focus. There is a new for “radical change”, alongside job security. He spoke about how successful reform is dependent upon managing the culture within and between organisations, which is part of the mantra of “working smarter”. Other things that would come under this umbrella include flexibility, new technology, new office designs, and co-location, all being implemented with an open mind. He concluded by saying there were “big challenges ahead, but immense opportunities too”.
The next plenary speaker was John McClelland CBE - Scottish Further & Higher Funding Council, who talked about how these new ways of working must be citizen driven, but unfortunately this is not always the case. These changes should be “pull and not push”, and the public sector has the opportunity to reset the bar. John talked about the need for online services, and how it is growing exponentially, and these services have to be seamless. He spoke about how, from an adoption of new technologies point of view, a lot more could be done, for instance in Cloud Computing. The deployment of ICT, with the exception of the health service, has been disappointing, with very little sharing of services and deployment. John thought there needs to be a paradigm shift in doing things differently. ICT should be seen as a productivity tool to save more and work more efficiently.
John was followed by Colin Proctor, director of Scottish Futures Trust, continued discussing the theme of new ways of working, stating that we now have a window of opportunity to push the boundaries, and it is a time for accountability. Property should be a major consideration; we should be aiming to do more – with less property. He believed that a 25% reduction in property is readably achievable, especially if the public sector can leverage investment in buildings from the private sector. Colin talked about the 3 Cs – Corporate, Collaborative and Commercial, which he mixed with another C – Commonsense! He talked about thinking about the long term game, and the need to act strategically. He urged the audience to think about a move to open working and efficient space planning by eliminating duplicate desks and space hungry and inflexible systems (incidentally all of which IBM can help you with, by using the Tririga platform!!) . He concluded by talking about the need for employees to be able to work anytime, anyplace and anywhere, which means a wider home and mobile working team. He suggested 10 desks to 8 people ratio as a starting point. This will save costs in business miles savings, time spending commuting and reduce carbon emissions.
Dr Claire Penny ran the IBM work session to a packed room. She wanted to address the question of whether
ICT is a “help of hindrance”. Claire
began by looking at the iGov survey, which looked at real estate management
challenges and pain points, in which 54% of central government respondents did
NOT see ICT as an inhibitor to realising property savings. She took the
audience through IBMs’ real estate history – especially looking at the acquisitions
we have made such as Tririga and MRO. Claire continued by looking at how IBM has
approached its own real estate transformation, working towards common systems
and process and minimal vacancy. She gave the recent West London strategic rationalisation
project as an example of where IBM have identified 12, 500 m² of office space
that could be vacated.
Claire finished the session by looking at the capabilities of IBMs latest Smarter Buildings acquisition – Tririga. This product is split into modules of – Real Estate Portfolio Mgmt, Space & Facilities Mgmt, Operations & Maintenance Mgmt, Capital Project Mgmt and Energy & Environmental Sustainability. These modules can be implemented separately, or part of a complete IWMS. Claire concluded the session by discussing what some of IBMs clients are using Tririga for – the main points being – improving the utilisation of their portfolio, operate in an environmentally sustainable way, simplify & improve user experience, simplify processes, & align their portfolio rapidly to meet changing business needs. She gave the example of GE, who reportedly save $925M in the first four years of using the product!
The final session was a panel debate – which included IBM’s Dr Claire Penny, Mark Baker – Aberdeenshire Council, Harjinder Gharyal & John Dawson – Glasgow City Council, and was led by Simon Haston, Change Champion: Improvement Service. Lots of interesting questions were asked by the audience, all around the theme of new ways of working. Claire specifically spoke about how IBM approaches flexible working, whilst still maintaining important security standards for our mobile devices. The question was posed, what are the critical success factors for new ways of working? Many interesting opinions given, with our expert explaining she thought leadership and a clear strategy were key.
If you are interested in learning more why not come to Pulse Comes To You on 30th May at The Grange, Tower Hill – where our customers & prospects can learn more about the entire Tivoli portfolio. Please register here - http://ibm.co/JgmnZD.
Rebecca Swindell 270003U1MK REBECCA.SWINDELL@UK.IBM.COM Tags:  pulse john_paul_ballerini gpj tweetwally xforce vijay_dheap touchscope marc_van_zadlehoff infosecurity pcty 4,405 Visits
It’s now just one week until the biggest security event of the year – Infosec!! Once again IBM will be attending, this year we will be giving NINE speaking sessions.
Our Key Note Session -
Presentation Title: 2011 was the year of the
Security Breach...what are the security & risk trends for 2012?
Workshops over the three days:
Workshop Title: The Advanced Persistent Threat in 2012
Speaker - Robert Freeman, Manager, X-Force Advanced Research Strategy, IBM
Synopsis - In years past, there was a common misperception that Advanced Persistent Threat (APT) was just a problem for governments and government contractors. In 2011, there were many high-profile security breaches that were influential in affecting this misperception. Organizations of different sizes and focus areas face the threat of operationally sophisticated, targeted attacks to their computer networks. These attacks are amongst the greatest challenges facing network security professionals and researchers alike. To meet this challenge, IBM X-Force thinks it is important to consider new perspective and approaches to network hardening, breach detection and incident response. One needs to think beyond thinking like an attacker and see it as the game that it is. We have been on the forefront of understanding these threats and this talk will provide updated information from IBM X-Force on this threat and the mindset required to meet the APT challenge.
Workshop Title: Providing Your Business, Total Security Intelligence
Speaker: Steve Durkin, EMEA Channels Director at Q1 Labs, an IBM Company
Synopsis: As the world becoming more digitised and interconnected, more doors are being opened to emerging threats and leaks. Security is needed to be made a top concern, from the boardroom down. A report published by Verizon on Business Data Breaches in 2011, found that 48% of total data breaches were caused by insiders and 48% of breaches involved a misuse of an insider’s privileges. All organisations, no matter the size or industry, need to put security first, allowing for the analysis of people, data, applications and infrastructure to be carried out easily and intelligently and providing instant information and visibility into business risks.
Workshop Title: Securing Mobile Devices in the Enterprise
Speaker: Vijay Dheap, Security Systems Product Manager - IBM Mobile Security Solutions
Synopsis: Enterprises want to fully capitalise on the business value of mobility but still have significant concerns about the security implications. To address these challenges, mobile security needs to be viewed and understood holistically from securing the device and the data on the device to secure access to enterprise systems and application security. In this session we will highlight the spectrum of requirements that Mobile Security covers, describe how some organisations have gotten started and introduce the concept of mobile security intelligence. Given the innate dynamic nature of mobility, an intelligent, adaptable mobile security solution is required to provide an enterprise with the necessary visibility, and control in managing threats and risks without degrading user experience.
Workshop Title - Infrastructure Protection - Towards an Optimised Security Position
Speaker - Simon Smith, CISSP - Client Technical Professional, IBM Security Systems
Synopsis - As the nature of the threat to business
changes it is important that companies review their position with regard to
security and particularly how mature their detection and prevention
capabilities are. This session looks at
some of the technology that can be used for Infrastructure protection and how
this might be integrated with other systems and data sources to provide a more
optimised solution. We will discuss the
way that a company can move from a basic security position, through proficient
and finally to optimised, giving the capability to be pre-emptive with
protection and use Security Intelligence and Analytics to provide better
protection and thus stay ahead of the threat.
Workshop Title: Application Security Hacking 101
Speaker: John Smith - IBM Application Security Specialist
Synopsis: Despite a decreased share of the vulnerability disclosures in 2011 (X-Force
Trends and Risks report, 2011) Web Application vulnerabilities still represent the single largest category of issues. This session will examine some of the common types of attacks and show how they work and how to defend against them.
Workshop Title: Integrated, Intelligent Security Analytics for the Enterprise
Speaker(s): Rob Ford - Architect - IBM Security Services, Global OM&D
Jef Gielkens - Managed Security Services Executive, Europe IBM Security Services
Synopsis: In a hyper-connected era can we ever achieve strong security? The answer is yes, but it requires some fundamental changes on how information and events are aggregated from the enterprise. The very strengths of these interconnected networks — their speed and openness, the easy access anywhere on the globe — also create a myriad of vulnerabilities. This session focuses on how you can enhance the levels of security intelligence and visibility provided by your existing security infrastructure, by leveraging the benefits of Security focused Cloud Based Data Analytics and protection technologies, in an efficient manner.
We will also have a smoothie bar on the stand (F40), so if you are attending, why not come along to the stand at grab a FREE refreshing fruit drink! You will also get the chance to talk one on one with our many experts – perhaps getting a demo of our latest products/solutions, use our Touchscope technology to browse key IBM Security pieces of collateral, or check out our Tweetwally, which will show all the twitter conversations during the day.
To join in our Twitter activity on the day – please use #infosec12 with #IBM. You can follow me @RSwindell, or our main security account @IBMSecurity.
Several of our security experts are on Twitter – John Paul Ballerini - @jpballerini, Bharat Bhusan - @_bharat_, Tom Mellow - @vintage1951, Glenn Ambler - @gambler2073, Marc Van Zadelhoff - @mvzadel and Nick Coleman - @teamsecurity. Darren Argyle - @D_Argyle
One of the experts – Vijay Dheap (@dheap) - recently shared his views with me, on what he saw the main topics of conversation at the event being. With many organisations needing to for address the speed of mobile adoption in the workplace, what their options are and how to get started. He added that the most mature organizations have one or more solutions deployed and trying to be more proactive in designing their security posture – of course all of which our IBM experts at the event would be able to help with.
Vijay also has a blog that I am sure you would find interesting - http://ow.ly/aj7Z9
If you are not attending the event, but keen to speak to IBM about their sessions, then please visit –email me at email@example.com and I will be happy to send the decks to you, and put you in touch with one of our experts!
We also have Pulse Comes To You on 30th May at The Grange, Tower Hill – where our customers & prospects can learn more about the entire Security Systems and Tivoli division. Registration is now open at - http://ow.ly/aiP1C