Managing Chaos: Data Movement in 2014 Steve Jordan Director, Industry Solutions 2
Agenda Cleo Overview Business Needs Managing the Chaos
Cleo Overview
About Cleo 35 800 100K 35 years of A2A & B2B solutions. 800 preconfigured connections. 100K Helping you master and reliably integrate a complex web of disparate information content and end-points. Protecting the integrity of your mission critical information. More than 100,000 software installations worldwide.
Business Needs
was created in the last 2 years 90% of the World’s Data 2013 Big Bang 2011 10% 90% was created in the last 2 years http://www.sintef.no/home/Press-Room/Research-News/Big-Data--for-better-or-worse/
and the data keeps on growing Global Data Center IP Traffic Growth Personal Content Locker Traffic Growth http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns1175/Cloud_Index_White_Paper.html
Managing the Chaos
Key Questions What kind of information must be exchanged? Everything required for your business including Advance Ship Notices, Orders, Invoices, Payments, Financial Data, Pricing, Engineering/Design, Healthcare Records… What are you connecting? Internal applications, legacy systems, external gateways, human interfaces, cloud, mobile devices… Where is the information going? Communities of all types: customers, partners, suppliers, resellers, industry exchanges… What do you need to manage this? Governance, compliance, reliability, visibility, security, integration…
Scenarios and Benefits External secure, managed and auditable data exchange with outside buyers, suppliers, dealers, and partners. Scenario 5 External B2B Internal A2A Division communicates through separate installation ,adding visibility and governance, but maintaining autonomy Scenario 2 Connectivity, Visibility, Security, Governance Scenario 6 Cloud data exchange enablement for various lines of business., including direct materials, aftermarket and MRO Automated high volume transfer directly between ERP, TMS, WMS and between various internal legacy applications. Scenario 3 Scenario 4 Segregated secure connections for financial, government, and other transactions which require secure, auditable, and compliant data exchanges. Scenario 7 P2P data exchange to enable secure exchange of data for example R&D exchanging design or schematic files Segregate traffic for highly sensitive internal transfers which have large file size and volume with significant security and compliance considerations.
Customer Example
Manufacturing Multi-Billion Aerospace and Defense Case Study Major American defense contractor and industrial corporation. Business Requirements Lacking ultra secure and robust system architecture Unable to defend against over 1,000,000 threats from hackers, rogue nations, etc. daily Infrastructure of multiple FTP servers behind and throughout numerous DMZs required many complex layers of security, none of which were fully reliable Cleo Unique Differentiators Incredibly secure code base allows for full government regulatory compliance Responsive to all needs, especially in configuring their environment correctly and securely Consolidated communications platform with an easily managed and incredibly robust architecture DMZ security and firewall integrity Cleo Solution SOCKS proxy (new feature development) Easy, flexible protocol selection to allow connection to all necessary trading partners Ultra secure and robust system architecture High Availability (HA) architecture Business Benefits Quick and easy on-boarding of trading partners ensures faster customer delivery Secure code base mitigates the possibility of data breaches and fines up to $1M+ DMZ security reduces internet threat footprint
Leading Companies Choose Cleo Most Secure Solution Highly Scalable Easy to Use & Flexibly Integrate Lowest TCO