QUESTION: How do you approach sensitive data protection, data loss prevention, and enterprise encryption services? Do you focus in on critical areas or step back and attempt to address the enterprise as a whole?
QUESTION: Is replacing the security applications with the newest and highest rated product a cost effective or appropriate approach? Is it necessary or reasonable to attempt to change the security culture in an organization?
Consider your best laid plans to secure the data in your enterprise. Did you discover something simple yet amazing, or did you crack a complicated code to achieve results?
Here’s what a few of the Pulse 2010 client presenters told us after presenting a panel of unique expert experience from three diverse organizations, including a consulting firm, a gas and electric company, and a healthcare organization.
THINK about it. And then submit a proposal to share your own unique experience in how you applied Integrated Service Management to help you overcome business challenges and deliver smarter, more secure service on any scale.
If securing the data center isn’t in your realm of expertise, here are some other topics in which there is a high demand for discussion leaders at Pulse 2011.
Service architectures tailored by industry that address unique service delivery challenges including security, storage and compliance requirements.
- Service architectures tailored by industry that address unique service delivery challenges including security, storage and compliance requirements.
- Service lifecycle management that bridge workflow across line of business, enterprise architecture, software development and testing, IT operations (data center, security, storage, and network operations), and business operations (production and facilities) to ensure successful “go-live” and continual improvement of applications and services.
- Service dashboards that enable audiences from executives and business operations to IT managers to see the service and gain insight into service health, integrity (security and storage), and business activity.
- Unified management of service requests and problems spanning business and IT that enable work orders to be automatically routed to the right support staff.
- Asset management that supports both enterprise and IT assets across all asset classes with a single process model and a single data model.
- Automated management of heterogeneous physical virtualized and cloud environments across distributed systems, mainframes and storage that ensure security, increase speed and save costs.
- Security and storage management that ensure effective access, identity and threat management, and scalable management of growing data volumes generated by smart assets and technology.
Proposals will consist of a 100-word abstract that outlines a unique organizational experience and should include:
- Initial pain points or problems
- Statistics about your deployment layout and company
- The IBM solution/products applied by your organization
- How the IBM solution/products help address the pain points
- Lessons learned from the experience
Submit proposals now through November 9, 2010 at ibm.com/pulse
As a bonus, all clients who present at Pulse will have the conference registration fee waived ($1995 value). In addition, the first 50 clients accepted to present at Pulse will receive a complimentary hotel upgrade. Client must pay for the basic room rate.