Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.

Slides:



Advertisements
Similar presentations
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Advertisements

Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
August, Company History Founded in 1993, public since 1997 Headquartered in Wall, NJ with a development office in Eagan, MN Fast and highly discriminating.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
3 rd Executive Forum on Trade Facilitation Paperless Trade in International Supply Chains: Enhancing Efficiency and Security Technology as Enabler of Innovation.
Convergence – Driving down the Cost of Enterprise IT Christoph Rau BEA Vice President, Central & Eastern Europe October 23, 2003.
Unified Logs and Reporting for Hybrid Centralized Management
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
1 MAIS & ITSS FY09 Priorities Joint UL Meeting October 27, 2008.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Optimizing Business Operations Business Priorities Presentation.
Private Cloud: Application Transformation Business Priorities Presentation.
The 4BF The Four Bridges Forum The SAFE-BioPharma Digital Identity and Signature Standard.
Motorola Mobility Services Platform
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
+. Background Design & Structure Motives & FitsPerformance Problems & Success Factors Microsoft: leading software companies – developing, manufacturing.
1 EMC CONFIDENTIAL—INTERNAL USE ONLY EMC’s End-to-End Capabilities for Microsoft EMC helps you successfully plan, design, deploy and manage your Microsoft.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
©2014 Extreme Networks, Inc. All rights reserved. Microsoft Skype for Business Integration Overview Leveraging the Power of Technology Partnerships Niels.
COMPETING WITH INFORMATION TECHNOLOGY
© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Global Citizenship Walt Rosenberg.
Consero Private & Confidential CLOUD COMPUTING “Plug & Work” IT Applications Finance & Accounting Outsourcing (FAO) 5/26/2011 Consero - High Performance.
1 Session Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Real Time Inter-Agency/ Inter-Jurisdiction Collaboration: Doing More.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
Smart Media Innovations & HID Corporation MOBILE SECURITY.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Industry Outlook November Manufacturing Matters in Canada  A $620 billion industry  12% of GDP (18% in 2004)  1.7.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
Building a Fully Trusted Authentication Environment
PepsiCo & Stakeholder Engagement Enhancing Enterprise Value November 2012.
State of New Jersey IT Consolidation Charles S. Dawson CTO/CIO.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Microsoft to buy Nokia's mobile phone unit. Background-Microsoft Microsoft Corporation is an American-based multinational computer technology corporation.
Microsoft and Symantec
User and Device Management
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Oct 2005 page 1 The CIO of the Future – Changing the Dialogue Rolf Kubli, EDS EMEA Architects Office, CTO EDS Switzerland EGEE04 Industry Forum.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
 TECHNOLOGIA is a startup company in Bangalore in 2007 which is completely owned by emirates telecommunication corporation- ETISALAT.  It has helped.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Intro movie. Presenter’s name November 2015 Avnet Partner Event 2015 Technology Trends Avnet’s Role Avnet’s Value add  Security  Converged Infrastructure.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
June 23, 2016 Organizational Overview. 2 Automation Federation Background A fragmented community of automation professional associations and societies.
ILink Systems, Inc Feb, 2014 Government IT Solutions.
CORPORATE PRESENTATION
Technology Implications for Net Centric Operations 2004 Interoperability & Systems Integration Conference Industry Views Dr. Aaron Budgor Vice President.
Veo One® – Unify Your Technology
M.Tech Industrial Visit Presentation
Ken Baker ISA President October 2006
Transforming IT Management
Wes Rihani, MBA ADP – Global Payroll Product Leader October 23, 2018
Innovative content & language solutions: Transforming digital.
BLACKVARD MANAGEMENT CONSULTING, LLC
Cloud Consulting Services and Solutions
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President and CEO, ASSA ABLOY Identification Technology Group (ITG) -- Parent company to HID Corporation Alex Mandl, CEO, Gemplus Don Lyman, Vice President, Software House, a member of Tyco Fire and Security Robert Rodriguez, Special Agent, United States Secret Service, Electronic Crimes Task Force Nazzareno E. Paciotti, President, Pinkerton Consulting & Investigations

Security Management For The Enterprise

Challenges ¤Security remains a board-level concern ¤Lack of integrated security management ¤Creates vulnerabilities ¤Results in high-operating costs ¤Limits organizational collaboration Corporate Risk Exposure & Grounds For Liability

The Open Security Exchange ™ ¤Cross-industry, open forum delivering: ¤Interoperability specifications ¤Best practices for security management ¤Goals ¤Unify disparate security technologies ¤Optimize security and operational efficiencies ¤Respect existing operational requirements

First Deliverables: Physical and IT Security Management ¤Specifications now available for… ¤End-to-end audit and forensics capabilities ¤Single view ¤Powerful authentication ¤One common credential ¤Centralized provisioning ¤One point of control ¤…from gates to gateways

First Deliverables: Physical and IT Security Management ¤Enhanced security ¤Concerted response ¤Superior detection ¤Consistent policy enforcement ¤Reduced costs ¤Simplified implementation ¤Streamlined security operations ¤Enhanced automation Less time…less risk

HID Corporation ¤With over 150 million credentials shipped, HID is the world’s largest manufacturer of readers and cards used for physical access control. ¤Proximity ¤ iCLASS TM MHz read/write contactless smart card technology ¤Multi-technology credentials: ¤Provide users the ability to leverage investments in existing systems. ¤Enable seamless, cost-effective upgrades to advanced technologies and new applications. ¤Allow users to carry a single credential for multiple applications. ¤Increase security - add a photo ID or anti-counterfeiting element!

Gemplus ¤Adding intelligence to credentials ¤Enhanced security ¤Enable business applications ¤Why smart cards? ¤Two-Factor Authentication ¤Protect sensitive ID data ¤Combine Physical and IT access control ¤Flexible – able to host multiple applications ¤Gemplus is the #1 producer of smart cards

Software House A Tyco Fire & Security Company ¤Leading provider of integrated security solutions since 1978 ¤Nearly 10,000 systems installed in 50 countries in 9 different languages ¤Industry acclaimed API for seamless integration with business applications ¤Total event and credential management system ¤Physical access control ¤Critical life safety and area management ¤Complete Network Compatibility ¤DHCP compatible field hardware ¤TCP/IP communications ¤Dual network communications

Computer Associates ¤Unique expertise in IT infrastructure management: ¤Platform independent ¤Leadership & innovation ¤Security Command Center ¤Provide a complete view of the enterprise ¤Increase security situational awareness ¤Eliminate information overflow ¤Maximize organizational efficiency 27 years of IT expertise, 99% of the Global 1000 use CA technology

America’s Security Partnership Federal Bureau of Investigation United States Secret Service Electronic Crimes Task Force Infragard

Computer Associates Pinkerton Consulting & Investigations

The Global Leader in Security Consulting, Investigations and Business Risk Services. Established in Comprehensive Information Technology Services including: Computer Forensics, Network Security and Brand Protection. Division of Securitas AB -World’s largest security firm – Operating in 30 Countries, 6.2 billion in revenue, 210,000 employees.

The Alliance Unique combined expertise Policies & Technologies Physical & IT Security Strategic partnership Joint Engagement Development Collaboration Complementary Solutions

Questions ?