Download the complete edition
Find out more at enterprisemanagement360.com
CONTENTS
Inside this edition CYBERSECURITY
Digital Risk and Security Awareness David Goodman EM360°
A Word from the Editor
FEATURE DATA
Sylvia Entwistle
Business Intelligence is no Spectre
TECH
Bob Tarzey, Quocirca
Hyper-Convergence: Putting IT Back in the Driver’s Seat
In the old days, understanding spooks seemed easy; the good ones worked for us and the bad ones for them. This is the Cold War paradigm that many (...)
CYBERSECURITY
Protecting Data from the Inside Out
FEATURE
Yaki Faitelson, CEO - Varonis DEVOPS
Next Generation DevOps: Supporting a Continuous Delivery Value Chain INTERNET OF THINGS
The Past the Present and Future of Industrial IoT space
Download the complete edition
DATA
Bringing Customer Experience to the next level Riley Newman, Head of Data Science - Airbnb Airbnb has recently developed into one of the most profitable companies over the past couple of years (...)
WELCOME
A Word from the Editor Sylvia Entwistle
O
ur ears are getting accustomed to hearing news about high-profile data breaches in the media, and this is certainly only the tip of the cybersecurity iceberg across governmental and enterprise data.
The upcoming release of new Bond film, Sceptre—in which Bond faces a mysterious global criminal agency—is perhaps a reflection of this uneasy feeling that there are dark forces ‘out there’ preying on our sensitive information; and it may not be far from the truth! In this issue, Bob Tarzey addresses the danger of illogical and irrational fear, which drives overreaction and mistrust of ‘data espionage’, when in reality there is a lot to be said for our national safety and clearly there is a balance to be struck between data protection and data privacy.
Find out more at enterprisemanagement360.com
...in reality there is a lot to be said for our national safety and clearly there is a balance to be struck between data protection and data privacy.
One could say there is a certain amount of acceptance sweeping boardrooms that breaches are ‘inevitable’ and so it is becoming not a question of ‘if’ but ‘when’ this may happen. Safenet’s Blair Semple addresses this topic in his podcast and discusses how focus needs to—and is—being shifted from protecting the perimeter, to the protection and encryption of data itself. Join the conversation with us on issues of data & infrastructure management, security, developing trends such as IoT and mobility and much more. Tweet @EM360editor
Download the complete edition
DATA
Business intelligence is no spectre Bob Tarzey Mobile Security Analyst - Quocirca
I
n the old days, understanding spooks seemed easy; the good ones worked for us and the bad ones for them. This is the Cold War paradigm that many early Bond films played up to, the righteous West versus the Evil Empire (although Ian Fleming’s first novel, Casino Royale was
Find out more at enterprisemanagement360.com
actually inspired by struggle for power in post-war France, however the Soviets were lurking on the side lines). When Fleming was writing in the 50s and 60s, whilst the idea of nuclear war was scary for all, the world was reassuringly black and white; spies would not have the time or wherewithal to take a look at us mere mortals. Today, government-backed spying is regarded with far greater suspicion; the position is at best grey. If a potential terrorist is identiďŹ ed through social media activity we might be relieved, but we also worry that, to track that individual down, our own activity may have come under scrutiny too.
Today, government-backed spying is regarded with far greater suspicion; the position is at best grey This leads to all sorts of scare stories that governments are reading our emails, checking our Internet searches and listening to our phone calls. For human operators to literally monitor the activities of millions of users would of course be impossible. However, powerful search and forensics tools can be used to automatically scan huge volumes of records and messages in seconds looking for keywords, phrases and patterns that raise Download the complete edition
Find out more at enterprisemanagement360.com
TECH
Hyper-Convergence: Putting IT Back in the Driver’s Seat Jason Collier Chief Evangelist Officer - Scale Computing
W
ith the flood of hyper-convergence vendors coming into the market over the past few years—pioneered by Scale Computing, Nutanix and SimpliVity then joined by EMC, Dell, HP and NetApp and several
Download the complete edition
MASTER DATA MANAGEMENT
Aligning MDM with Business Motivation – Whose 360° View? Donna Burbank Global Data Strategy
T
he phrase “360° view of customer” is a phrase commonly used in organisations looking to get a better sense of their critical business data, and is a driver for many master data management (MDM) projects. But the phrase “360° view of customer”
Find out more at enterprisemanagement360.com
The 360° view of customer incorporates numerous business drivers
Upsell & Cross-Sell
Better marketing campaigns
Streamlined customer service
Customer sentiment analysis
More efficient onboarding
Improved billing Building community
Find the right ‘slice’ of the 360° view To help ensure the success of an MDM initiative, it is important to find the right “slice” of this enterprise 360° view in order to properly focus efforts, and help ensure the highest value to the Download the complete edition
INTERNET OF THINGS
The Past, the Present and Future of Industrial IoT space Samsurin Welch Head of Digital Innovation - Strategy & Architecture PETRONAS
E
M360° interviews Samsurin Welch, Head of Digital Innovation — Strategy & Architecture, PETRONAS on the rise of the Internet of things, particularly in the Industrial space.
Find out more at enterprisemanagement360.com
DATA
Bringing Customer Experience to the next level Riley Newman Head of Data Science - Airbnb
A
irbnb has recently developed into one of the most proďŹ table companies over the past couple of years. Once valued last year at $10bn after a $475m round of investment, Airbnb mainly generates revenue through online bookings for
Download the complete edition
CYBERSECURITY
3 Steps to Unsharing and Protecting Sensitive Data Jennifer Hindle Senior Product Marketing Manager - Gemalto
I
n today’s global economy, data is king. Organisations are mining their available data to personalise customer experiences,
automate
competition,
and
processes,
guide
other
outperform
important
the
business
initiatives and decisions. As a result, they’re not only
Find out more at enterprisemanagement360.com
CYBERSECURITY
Protect Sensitive Data with Enterprise Encryption Solutions Blair Semple, Business Development Director Safenet/Gemalto
Your corporate data assets are being stored, processed, and shared more than ever before. To meet business-critical demands, such as migrating to the cloud or enabling big data analysis, your colleagues will need access to this high-value information.
Ebooks from Gemalto Encrypt Everything: How to unshare and secure your sensitive data wherever it resides Gemalto
2014 - Breach Level Index Annual Report Gemalto
6 Vulnerabilities of the Retail Payment Ecosystem
Learning how to Secure the Breach
An Introduction to Crypto Management
Gemalto
Gemalto
Download the complete edition
DATA
Wi-Fi required to play this video
Enterprise BI levels up: The two-tier platform approach Richard Neale Birst
White Paper: A Platform for 2-Tier BI and Analytics Birst
Find out more at enterprisemanagement360.com
CYBERSECURITY
Digital Risk and Security Awareness David Goodman Senior Analyst, KuppingerCole
I
t is evident from the information released into the public domain and the continuing resonance of the Snowden revelations that the number of cyber attacks on corporate digital resources, and the leakage of valuable and sensitive corporate data assets are increasing
Download the complete edition
DEVOPS
Next Generation DevOps: Supporting a Continuous Delivery Value Chain Wed 2 Dec 2015 - London
DEC
2
Register here
D
evOps, a portmanteau of “development” and “operation” brings together these two distinct strands of IT. This may sound very easy to define but the truth is somewhat more complex as the broad definition of these terms hide a variety of
Find out more at enterprisemanagement360.com
EVENTS
Events Calendar 2015-16 NOV 11-12 NOV 12-13 NOV 17 NOV 17-19 NOV 18 NOV 18-19
LONDON
REGISTER >
Chief Data Officer Summit Innovation Enterprise
GLASGOW
REGISTER >
New Start Scotland Exhibition New Start Exhibitions LONDON
NOV 16-17
REGISTER >
Business Process Management Forum Ovum Events MUNICH, GERMANY
NOV 12
REGISTER >
Chief Data Officer Europe 2015
NOV 17-19
LONDON
Big Data Analytics Whitehall Media
LONDON
REGISTER >
CX Europe Forrester Research
LONDON
REGISTER >
Digital Transformation in Financial Services 2015 PEX Network
WE’RE EXHIBITING
PEX Network NEW YORK
REGISTER >
NOV 18-19
REGISTER >
Storage Executive Summit 451 Research LONDON LONDON
Apps World Informa
Download the complete edition
REGISTER >
DatacenterDynamics: Converged DatacenterDynamics As the Internet of Things, Smart Cities, Big Data and Clouds drive the industry, DCD Europe is about NOT forgetting the engine.
REGISTER >
enterprisemanagement360.com @EM360mag
Reach a global audience of IT professionals with EM360° We are committed to helping your business grow Online campaigns
Thought leadership & education
Bespoke publishing options
Brand awareness
Digital magazine
Podcasts
Videos
Radio
Webcasts
Lead generation
Email newsletters
Mobile app
We can support your marketing goals and objectives. To ďŹ nd out how you can reach your target market with our dedicated global audience, contact +44 207 148 4444 (UK) or +1 575 642 1046 (US) or email: sales@enterprisemanagement360.com
Download the complete edition