Let’s Get to Work

first_imgEMC’s Information Intelligence Group is focused on helping customers transform their business with software and cloud solutions that connect information to work. It’s our mission statement, but even more important, it’s our sole focus.For our enterprise customers, all work is knowledge work. By work we mean the processes and collaboration that drive the daily activity of our customers.  Examples of work are processing a loan, answering a customer service complaint, testing a drug, using a design document to repair an aircraft, designing a new car by sharing new ideas with teams, inside and outside the firewall, or accessing the latest price list, whether the worker is at her desktop or on the go.  In each of these cases, the work is only productive if all the information needed is available when and where it is needed.Wrapping Information, Process, and Collaboration with governance policies in order to protect and track information, while making the information mobile and cloud enabled, is how we think companies truly transform their businesses to derive more value.I recently met with a CIO at one of the world’s largest transportation companies in Europe. His company required a single system to manage and share a vast number of technical documents and engineering drawings, and wanted to integrate that repository with other applications that run his business. The system had to be accessible by internal and external teams with the proper rights so each group had access to certain content. The clincher was, he had weeks – not years – to get a system implemented. In this case, work meant having the right technical information available via the right application to the right person whether inside or outside the firewall.  This is a great example of combining Information, Process and Collaboration together to get work done.Our team helped meet the challenge, configuring a solution that would be hosted in the cloud to accelerate time to value. The CIO’s team determined that over the course of five years, they would realize more than 40% annualized savings with this approach versus building their own solution and managing it in their own data center.Delivering cloud-based solutions to get work done…that’s where IIG is headed.last_img read more

IT Security at the Crossroads

first_imgExcerpts from Art Coviello’s keynote today at the 2013 RSA Conference in San Francisco.  We are at a critical crossroads – the next phase in the evolution of the Information Age with this convergence of Big Data, mobility, cloud, and our social media-driven society. It is past time for us to disenthrall ourselves from the reactive and perimeter-based IT security dogmas of the past and speed adoption of intelligence-driven security. Requirements for this new model include a thorough understanding of risk, the use of agile controls based on pattern recognition and predictive analytics to replace outdated static controls and the ability to analyze vast streams of data from numerous sources to produce actionable information.What results is a model based on “Big Data” – our own version of security Big Data.Last year was a breakthrough year for the concept of Big Data. For all of the buzz, there’s tremendous confusion about the term because it represents more than just a lot of data.  Fundamentally, Big Data is about the ability to extract meaning – to sort through the masses of data elements and find the hidden patterns, the unexpected correlation or the surprising connection.  It’s about analyzing vast and complex unstructured data sets at high speed to solve innumerable problems across a wide spectrum of industrial, non-commercial and governmental organizations.Big Data has the potential to transform our lives, our health, our environment, our livelihoods – almost every facet of our daily lives – for the better. Yet, we are only at the dawn of Big Data.While the most common business analytics are based on structured data using relational data bases, the real goldmine is in unstructured data which is five times larger and growing three times faster.By 2020, analysts predict that tens of billions and perhaps as many as 200 billion objects will be connected. Think of the richness and variability of data that data scientists will have to work with. And, we’re not only talking about how Big Data will impact and drive information technology. We’re talking about how businesses and organizations will fundamentally change and evolve to become more productive and efficient. However, according to IDC, less than one percent of the world’s data is being analyzed.Security Big Data will be applied in two ways: security management and the development and application of individual controls.Because sources of security data are almost limitless, there is a requirement for security management that goes well beyond traditional SIEM.  We have reached the limits of that technology and organizations must be able to gain full visibility into all data, structured and unstructured, internal and external.Big Data architectures will be scalable enough such that all data can be analyzed no matter how expansive or fast changing. Organizations will be able to build a mosaic of specific information about digital assets and users and infrastructure, allowing the system to spot and correlate abnormal behavior in people and, in the flow and use of data.In a recently published security brief titled, “Big Data Fuels Intelligence Driven Security,”experts from RSA, Northeastern University and Booz Allen Hamilton set out the components for a Big Data oriented security management system.It must start with automated tools that collect diverse data types and normalize them. And the data needs to be stored in a centralized warehouse where all security-related data is available for security analysts to query. The system must include analytics engines capable of processing vast volumes of fast-changing data in real time as well as a standardized taxonomy for indicators of compromise that are in machine-readable form and can be readily shared. It must also rely on N-tier infrastructures that can scale out across multiple vectors and have the ability to process large and complex searches and queries. Finally, the system must have a high degree of integration with GRC systems and task specific security tools to detect attacks early or even in advance, and then trigger automated defensive measures such as blocking network traffic, quarantining systems or requiring additional identity verification.A high degree of integration in the controls themselves is key to replacing today’s non-system of individual, isolated static controls. Big Data controls will be agile and predictive like next generation authentication and malware blocking.Although initially task-specific, to be truly dynamic and situationally aware, these controls have to evolve. Individual Big Data controls will be smart to begin with but will also have the capacity to be self-learning. And they should be able to inform or be informed by other controls and feed or receive intelligence from security management systems and report to and receive instructions from GRC systems.While we are several years away from all controls and management platforms having this level of completeness, the process is well underway. Vendors have already been building tools with Big Data analytics and are offering products that will have a disruptive impact on many tired product categories like anti-virus, authentication and SIEM.As an example, RSA just announced version 8.0 of the SecurID authentication manager platform. Version 8.0 includes a risk based analytics engine that has experience gained from nearly 50 billion transactions. We also recently announced our Security Analytics platform, a new approach to security management that fuses log and packet data with internal and external threat intelligence. This platform gives analysts unprecedented visibility to assess and defend against advanced attacks.But Big Data is only as good as the amount and quality of the data.  This is why it is so important to address the need for information sharing so that external feeds of intelligence can have a force multiplier effect. Whether it’s within or among industries, or between and among vendors, Intelligence-driven security models can only succeed through better sharing of intelligence.I don’t mean to imply we are headed to some security utopia, but, we should be able to keep pace with our adversaries, and, in many instances, get ahead of them, even in the face of uncertainty.last_img read more

The Unseen Ballet: The Intersection of Technology and Humanity

first_imgAt Dell Technologies, we are technology optimists. Meaning we truly believe technology has the power to solve some of the world’s greatest challenges, break down barriers, and create opportunity for all. We work hard to bring this belief and our commitment to inclusion to life through our brand – from the advertising we create to the experiences we build not only for our customers but our communities and the world.We were inspired by one of our television spots which features a woman at a ballet performance who is visually impaired. Through a pair of advanced technology glasses, she is able to see a dancer twirling on stage for the first time.We wondered – could we bring this idea to life right here in our hometown of Austin, Texas, and give back to the community where we started it all? The answer was a resounding yes. After all, we’re optimists! And so, The Unseen Ballet was born. Earlier this month, in partnership with Ballet Austin and eSight, a leader in assistive technology, we equipped Austinites who are visually impaired with special glasses that enabled them to view a live performance of The Nutcracker with their families for the first time.With over 150 community members in attendance, this was a truly special event that brought families together this holiday season. One person in attendance was an eight-year-old girl named Lily who loves to dance. Lily was diagnosed with Optic Nerve Hypoplasia which has led to blindness in her right eye and limited vision in her left eye. Despite her love for dance, her disability had previously prevented her from seeing a ballet performance. She came dressed for the occasion in her very own ballet outfit, sat in the front, put on her glasses, and was able to see the ballet with her mom for the first time. A truly magical moment that demonstrates how technology can break down barriers and open the door to new possibilities. You can learn more about Lily and the Unseen Ballet in the video below: We hope that Lily, whose motto is “I can do even the hardest things,” will inspire the optimist in you. Visit here for more on The Unseen Ballet experience.last_img read more

UK’s ‘tsunami’ of grief as coronavirus deaths pass 100,000

first_imgLONDON (AP) — The U.K. has become the first country in Europe to pass 100,000 coronavirus-related deaths. With more than 2 million dead worldwide, people the world over are mourning loved ones, but the U.K.’s toll weighs particularly heavily: It is the smallest nation to pass the grim milestone. For comparison, the United States, with five times Britain’s population, has four times the number of deaths. Alongside excess deaths comes excess grief, made even more acute by the social distancing measures in place to slow the virus’s spread. Charities and campaigning groups are urging the government to offer more help to deal with this “tsunami” of grief.last_img read more

Vermont Sen. Patrick Leahy returns home after hospital visit

first_imgWASHINGTON (AP) — A spokesman for U.S. Sen. Patrick Leahy says the Vermont Democrat was taken to a hospital Tuesday evening after not feeling well and later sent home following an examination. The 80-year-old senator had begun presiding over the impeachment trial of former President Donald Trump earlier in the day. Leahy spokesman David Carle says the senator went to George Washington University Hospital “out of an abundance of caution” after being examined by Congress’ attending physician. Carle says Leahy looks forward to returning to work. Leahy swore in his fellow lawmakers for the trial, which will begin next month.last_img read more