Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Internet of Things (IoT) matters at HP Discover

“You ain't seen nothin' yet,” is the phrase that comes to mind when I take a look at the HP Discover sessions on Internet of Things (IoT). Big Data mattered at past HP Discover conferences, but IoT is going to take it to the next level as projected in multiple sessions at HP Discover. Discover Theater session DT3621 from HP Labs discusses how the appliances in our homes, and the environment around us, generate data that must be harnessed and mined across the fabric of connected devices. At the same time, I am presenting on the on the impact of IoT on IT in a different Discover Theater session – DT3503. While gearing up for this session, I am reminded of a recent Twitter Chat, coordinated by the Enterprise CIO Forum, where it was abundantly clear that IoT is bound to matter to CIOs. Here are some of the key reasons why. 

Protecting your enterprise against “Adversaries ‘R’ Us”

A federal indictment from the United States Attorney's Office charges five men with conspiring in a worldwide hacking and data breach scheme to steal more than 160 million credit card numbers (a scheme akin to a global enterprise) with a strategy to fraudulently get to the most valued asset — information. Legitimate enterprises must stay up-to-date on various concepts, techniques and tools required to proactively safeguard their enterprises against such schemes, which can be loosely labeled as “Adversaries ‘R’ Us.” The sessions at HP Protect 2013 offer a diverse array of topics to that end. Here are some of my picks in the context of this security breach — the largest such scheme ever prosecuted in the United States.

Fortify the dynamic enterprise with static code analysis tools

Security is what I had in mind when I started teaching my daughter driving recently. I explained all the steps that a good, secure driver must take before setting the vehicle in motion when it is static – at rest. While these are really simple steps to ensure, for example, that the mirrors are positioned properly and the turn signals are functioning, they are also powerful life-saving steps once the vehicle is in motion. Applications are like cars in many respects. Therefore, enterprises should take a similar approach before putting their applications in motion. It is much easier to take precautionary measures by scanning the source code for vulnerabilities – way before running the binary code. Simple techniques, such as visual inspection, have proven powerful in the past. Imagine having a tool to automate such techniques and execute them faster that runs parallel to software development. Well, you don’t have to imagine any longer!

A New Style of IT is securely emerging in government clouds

Civilian agencies, the intelligence community, DoD, and their systems integrators are looking to capitalize on opportunities for efficiencies, reduced costs, and competitive advantage. So says the abstract for “1286 - HP's vision, strategy, and best practices for private, public, and cloud brokering in US federal IT environments,” a session by Henry Fleischmann, Chief Technologist for Federal Cloud Solutions, HP at HP Protect 2013. This session details the cloud journeys taken by enterprises, calling out its application, architecture, and the evolution and deployment of services. Moreover, the session also addresses the shift from a product-centric approach toward a service-centric private and hybrid cloud model. A New Style of IT is emerging in government-based cloud computing.

To be or not to be 100 percent protected

Today, there is simply no way to provide 100 percent protection,” says Steve Lazerowich, a security solution leader within the U.S. Public Sector practice for HP Enterprise Services. Adversaries – be they hackers, criminal elements, or nation states – can penetrate the enterprise information systems to the core. So what can the nations of today do? “The best approach is defense in depth,” says Lazerowich, speaking of a multi-layered approach to protecting systems. Let’s explore this further.

Search
Follow Us


About the Author(s)
Labels