Presentation to The BIM Summit 2016 SECURE COLLABORATION FOR BIM Delivering a Secure Common Data Platform and a Collaborative Business Process for BIM.

Slides:



Advertisements
Similar presentations
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Advertisements

Govern the Flow of Data: Moving from Chaos to Control
Innovation is a Function of Collaboration Dave Carden General Manager – Unified Communications & Collaboration Telstra Business.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
M2M Evolution Battle of the Platforms 2013
2014 MindSpace Technologies Positive Minds, Positive People.
1. THE TRANSLATION NETWORK Case Studies 2 THE TRANSLATION NETWORK6 Intel OSTC uses Drupal for localization for the Tizen initiative into 6 languages.
Federal Student Aid Technical Architecture Initiatives Sandy England
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Robin Daniels Sr. Manager, Product Marketing Running Your Business in the Cloud.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
NASA Growth Strategy Cindy Bolt Group Vice President March 10, 2009.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Driving Improvements in Efficiency & Effectiveness North West Centre of Excellence Stakeholder Event Martin Fokinther Executive Consultant, Global Public.
Thriving in a Hybrid World Dean J. Marsh Vice President, Client Success IBM Analytic Solutions.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
Energy Ecosystem Overview David Miller Chief Security Officer.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Unify and Simplify: Security Management
Open APIs for Open Minds Nuria de Lama, Atos Research & Innovation Future Internet Public Private Partnership in EU FI-WARE: Overview.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
1 CLOUD RELIABILITY AND SECURITY Shekhar Gupta Director, Consulting & PLM Motorola Mobility.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Deconstructing API Security
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
Identity Management and Enterprise Single Sign-On (ESSO)
2015 NetSymm Overview NETSYMM OVERVIEW December
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Accelerate Mobile App Delivery with Kinvey on vCloud Air.
© 2015 TM Forum | 1 Service Level Management for Smart City Ecosystems and Trusted IoT Nektarios Georgalas, BT.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Total Enterprise Mobility Comprehensive Management and Security
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Digital Solutions Extension Framework Mark Myers Director, Global Solutions Go-To-Market July 12, 2016 Solution Partner Forum.
Scales Technology FZCO
Reduce Risk Across Hybrid IT
Reduce Risk Across Hybrid IT
Transforming business
Introduction to Windows Azure AppFabric
Microsoft Azure-Powered BlueCielo Meridian360 Portal Improves Asset Data Integrity and Facilitates Secure Collaboration with External Stakeholders MICROSOFT.
CIOs, IT, and Digital Transformation
Enterprise Launch Cloud Networking Connected Experience
Reduce Risk Across Hybrid IT
Enterprise Productivity Services
Insightful Analysis Practical Advice
ShepHertz App42 Platform is a cloud ecosystem
Company Overview & Strategy
Managing Technology at Plantronics
Extending Your Integration Strategy
Azure Availability, Reliability, and Performance
Digital Transformation of the Customer Experience
Identity Infrastructure Fundamentals and Key Capabilities
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Increase productivity
Microsoft Data Insights Summit
The Intelligent Enterprise and SAP Business One
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Presentation to The BIM Summit 2016 SECURE COLLABORATION FOR BIM Delivering a Secure Common Data Platform and a Collaborative Business Process for BIM Andrew Longyear Solutions Architect - Transportation Cisco Systems

Presentation to The BIM Summit 2016 WHO IS CISCO CHANGE, SOLVE, INNOVATE CISCO’S VISION For 30 years, we’ve focused on helping to change the way the world works, lives, plays, and learns. CISCO’S STRATEGY We create solutions built on intelligent networks that solve our customers’ challenges. CISCO’S MISSION Shape the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors, and ecosystem partners. Cisco Overview More than 71,500 employees Nearly 70,000 channel partners 380 global sites doing business in 165+ countries More than 19,000 patents 25,000 engineers (35% of our workforce) #1 or #2 in most market segments we serve More than 180 acquisitions since 1993 Broad portfolio of integrated products and solutions

Presentation to The BIM Summit 2016 COLLABORATION BIM LEVEL 2 NEEDS TO EMBRACE COMPLEX SET OF CONNECTED PEOPLE AND THINGS TO DRIVE INNOVATION

Presentation to The BIM Summit Data records stolen every second £10 0 Average cost per stolen record 23% Increase in the total cost of a data breach since 2013 SECURITY IN THE CONNECT WORLD WHY DO WE NEED TO WORRY ABOUT SECURITY

Presentation to The BIM Summit 2016 CLIENT-SERVER CLOUD MOBILE DEVICES THOUSANDS TENS OF THOUSANDS MILLIONS BILLIONS  potential for more people and things to be engaging with your business  higher expectations C OMPLIANCE : BIM L EVEL 2  legacy systems, interoperability issues & security/privacy concerns holding you back WIDENING THREAT LANDSCAPE INCREASED COST $ POOR USER EXPERIENCE CHANGING LANDSCAPE THE GAP IS WIDENING

Presentation to The BIM Summit 2016 S INGLE S OURCE OF T RUTH FOR I DENTITY Standard approach for managing the lifecycle of B2B and B2C identities I NTERNAL C OMMUNICATION Providing employees with SSO access to multiple internal and external applications I NTERNAL & E XTERNAL C OLLABORATION Connecting partners, vendors and the wider community into the project or Business T RANSFORMATION Embrace complex set of connected people and things to drive innovation LARGE ENTERPRISE SCALE SELF - SERVICE AND MULTI - LEVEL APPROVALS LEVERAGE AND INTEGRATE EXISTING SYSTEMS AND ASSETS GOVERNANCE & COMPLIANCE Start with the end in mind ROADMAP TO BIM COLLABORATION SYSTEMATIC APPROACH

Presentation to The BIM Summit 2016 The goal is to deliver trusted BIM data securely to the systems, people and things that need it. Identity Management. Who are the right systems, people and things, what should they have access to? Integration and Orchestration. Where does that information come from? What format should it be in? How should it be fed-back into the Model? Presentation. How should the Building Information Model be presented to the end-user in a way that is personalised and useful to them? BIM AND COLLABORATION IDENTITY IS THE FUNDAMENTAL BUILDING BLOCK

Presentation to The BIM Summit 2016 IdentityMessagingPresentation Identity Manager Identity and access provisioning, delegated admin, auth mgmt., audit compliance and attestation Integration Broker Data transfer/routing/prioritization, Transformation/Sequencing, EDI, Trading Partner Mgmt Portal Build web applications App Community (API’s) BIM Systems Authentication Manager ID/Password, MFA, Risk Based, SSO, Federation translation and mapping Identity Intelligence Reporting and analytics Directory Services Cloud directory, Data Sync, IDBridge Gateway Services Integrate 3 rd party web services, API orchestration, composite services Pub/Sub Engine Event data hub, guaranteed delivery, application registration/authentication Content Management Role-Based Delivery COLLABORATION ELEMENTS HIGH LEVEL STRUCTURE

Presentation to The BIM Summit 2016 Challenge Collaborating with internal and external business partners (risk and process) Moving targets – global legislation Security and privacy concerns Legacy systems/approaches Multiple Security Levels leads to negative user experience Management overhead for 1000’s of suppliers/contractors ID should not be the bottle neck to BIM Level 2 Compliance Local Administration Request/Approve Audit/Attestation Registration/Approval Automated (De) Provisioning SSO / MFA SAML / WS-Fed Contractor Admin Contractor Users Supplier Admin Supplier Users Supplier Admin Supplier Users BIM Applications Enterprise Directory (AD/LDAP…) CHALLENGE 1 - MANAGING IDENTITY ACROSS LARGE COMPLEX PROJECT FOR BIM COMPLIANCE DELEGATED AUTHORITY

Presentation to The BIM Summit 2016 CHALLENGE 2 - DATA EXCHANGE & PRESENTATION Data Exchange It is the data exchange that provides system-to-system integration and facilitates the exchange of data between suppliers/contractors Data Exchange should perform any-to-any translation and other custom processing services during the data exchange Data Exchange should supports asynchronous and synchronous message processing Data Exchang e Contractor A Receiving Contractor B Receiving Supplier A Sending Employees Receiving & Sending Supplier B Receiving & Sending

Presentation to The BIM Summit 2016 ManufactureSell Engage Develop LEGISLATION MARKET PRESSURES CRM / ERP LEGACY SYSTEMS Prod. Suppliers Non-Prod Suppliers Retailers Customer Prospect Partner Finance IOs Fleet/ Logistics Testing Contractor Partner Events Training INNOVATION IN THE AUTOMOTIVE SECTOR

Presentation to The BIM Summit 2016 Aggregated & Transformed Analytics IoT ServicesPresentation Integration Orchestration Identity APIs Presented on Any Device On-Device Computer Mobile Tablet Information from Anywhere Systems Things Private Cloud Public Cloud One Secure, Personal Experience Employees Trackside Workers Suppliers Construction BIM COLLABORATION SUMMARY SECURE COLLABORATIVE ENVIRONMENT

Presentation to The BIM Summit 2016 BIM COLLABORATION CHALLENGES Identity Management –Start with the end in Mind System Scalability and Extensibility –We will need to scale and reach all the parties to reach BIM compliance Learn form other industries who have already tackled some of these challenges SUMMARY

Presentation to The BIM Summit 2016 Q&A