elets 2nd eJharkhand Summit 2016 - Prashant Chaudhary, Senior Director & Head-Business...

23
Smart Technology for Smart Cities Prashant Chaudhary Sr. Director and Head Business Development – Public Sector

Transcript of elets 2nd eJharkhand Summit 2016 - Prashant Chaudhary, Senior Director & Head-Business...

Smart Technology for Smart Cities

Prashant Chaudhary

Sr. Director and HeadBusiness Development –Public Sector

Education

Utility Services

Transportation

Waste Management

Crime Management

Elements of a Smart City

As per Government of India concept paper on smart cities

3 © 2014 CA. ALL RIGHTS RESERVED.

Evolution

4 © 2014 CA. ALL RIGHTS RESERVED.

Residential Industrial Commercial

Buildings

Water ParkingStreet

Lighting WasteEnvironm

ent PeopleStreet

FurnitureSafety&Security Traffic

Street

Internet Edge WAN Agg

Wireless WAN (2G/3G/4G/Wimax)

DSRC/LMR

InternetCloud Services

Vehicles

Vehicles

Public/Private WAN

Wired/Wireless Access

Wired/Wireless Aggregation

Ruggedized Device

Compute/Storage

Security

Internet Edge WAN Aggregation

Mobility/Location Management

Wireless/Wired Network Management

Video ManagementData Center Resources

Safety&Security

Data/Event Virtualization/Aggregation

Traffic ManagementEnvironment

WasteManagement

LightingManagement

ParkingManagement

WaterManagement

TransportManagement

Monitoring Command Control Centers

City Services

Citizen Services

Apps Portal

Security

Analytics

6 © 2014 CA. ALL RIGHTS RESERVED.

Architecture for Smart Cities

Communication Layer (Links)Ac

cess

Lay

er

API

Web

Existing Govt. Applications

Smart City components

Domain ApplicationsEnergy, Water, Transport, Safe-City mgmt

Core ApplicationsERP, Workflow, BPM, PPM

Integration Services

Instrumentation Layer (smart metering, /M2M)

Hosting Infrastructure

Command Center

Integration Services

7 © 2014 CA. ALL RIGHTS RESERVED.

The practices youneed to succeed.

Develop & Test

Assure

Deploy

DEVOPS

Identities Access

APIs

SECURITY

Prioritize

Analyze

Support

MANAGEMENT

8 © 2014 CA. ALL RIGHTS RESERVED.

Leaders In The Application Economy Run IT Like A Business

MANAGEMENT

WHY CA MANAGEMENT More than 1,200 businesses worldwide manage their strategic investments with CA solutions.

CA Management Solutions scale from 200 to 50,000 devices.

CA has been recognized by industry analysts as a leader in the Management space for many years.

1CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142The information is based upon customer experiences with the CA software in the customers’ specific environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.

As a result, 88% of LOB execs in Leaders orgs report satisfaction with their IT department versus 34% for Laggards

Leaders use business metric in setting priorities for enhancing delivery of IT services:53% use topline revenue growth45% prioritize getting new applications faster

9 © 2014 CA. ALL RIGHTS RESERVED.

Technology Landscape

9

IT Hardware& Assets Mainframe Distributed

HighDensity

Operating Systems & IT

Environments CloudPhysical Virtual

Time

Environment 81+°F77°F68°F

Power 20 Wper sq. ft.

80 W per sq. ft.

150+ W per sq. ft.

Applications & Business

ServicesData Processing

Business Users

Everyone & Everything

Facility & Data Center Space

DC, Colo & Modular

Computer Room

Data Centers

10 © 2016 CA. ALL RIGHTS RESERVED.

Smart City : Infrastructure Diagram

Privilege Access Management

Application

Performance

Management

Service

Management

Unified Infrastructure

Management & NFA

H/W Asset

Management &

Discovery

NMC COO & NOC

11 © 2016 CA. ALL RIGHTS RESERVED.

New Era IT Ecosystem

Smart Monitoring

Capacity Management

Capacity

Systems Management

System

Traffic Analysis Performance Fault

Network

Citizen Experience

App Perf Monitoring

Mobile Monitoring

Applications

Datacenter Infrastructure Management

Data Center

12 © 2014 CA. ALL RIGHTS RESERVED.

DevOps is at the Core of Business Success in the Development of Domain Applications

DEVOPS1

of enterprise plan to implement DevOps (vs. 66% last year)

88%

Those implementing DevOps have seen an 18% improvement in time-to-market and a 19% increase in revenue

WHY CA FOR DEVOPSLeveraging CA DevOps solutions, customers report up to a 25-50% reduction in the typical application development schedule2

Leveraging CA DevOps solutions, customers report that 60-90% more defects are detected at least one step earlier in the software development lifecycle3

Leveraging CA DevOps solutions, customers report up to 77% faster mean-time-to-recover (MTTR)4

1CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142Voke Research, Market Snapshot Report: Service Virtualization, Lanowitz, Dronzek, Dec 20123Voke Research, Market Snapshot Report: Service Virtualization, Lanowitz, Dronzek, Dec 20124Marivi Stuchinsky, Associate VP of IT, Molina Healthcare; ANZ Bank Smart Enterprise Article (The information is based upon customer experiences with the CA software in the customers’ specific environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.)

13 © 2014 CA. ALL RIGHTS RESERVED.

QA/TESTDEV PRODUCTIONPRE-PROD

Chaotic and Complex Application Delivery

DELAYS

Work Time

Wait Time

CustomerExperience

IDLE TIME

Code | Integrate | Build

IDE SCM CI CONFIGTESTCONTAINER CLOUD

Functional & UA Testing Performance Testing Deploy to Production defect defect defect

DELAYS DELAYS

RE-WORK RE-WORK RE-WORK

SLOW AND INEFFICIENT - EXCESSIVE IDLE TIME, DELAYS AND RE-WORK

PROVISION

Manual Testing

ManualScripting

Developers Deadlocked

Too little testing, too late

in the cycleConstrained

Environments

Too many disparate

tools

Poor customer

experience

14 © 2014 CA. ALL RIGHTS RESERVED.

QA/TESTDEV PRODUCTIONPRE-PROD

Virtualize APIs and manage access

Quickly create, edit and deploy virtual services

ParallelWork

Streams

ELIMINATE DEPENDENCIES AND CONSTRAINTS TO ENABLE PARALLEL WORK STREAMS

APIManagement

Release Plan

CI/Build Functional testing UAT Integration

testing Performance

testingDeploy to pre-prod

Deploy to production

Code commit SCM

Accurately simulate constrained systems

VIRTUAL SERVICE

Design Spec

Requirements

Set up dev environment

Set up test environments

Set up pre-prod

Set up prod

CustomerExperience

15 © 2014 CA. ALL RIGHTS RESERVED.

Eliminate constraints and critical dependencies

Rapidly deliver high-quality applications and services

Create and deliver exceptional customer value

CONTINUOUSDELIVERY

DIGITAL TRANSFORMATION

Every Company is Becoming a Technology Company, Every Business a Digital Business

Re-thinking how the business operates to find new ways to create and deliver customer value

16 © 2014 CA. ALL RIGHTS RESERVED.

In The Smart Environment, Security Must Be An Enabler, Not A Constrictor

SECURITY1

Security is the #1 or #2 top obstacle to organizations becoming more

effective in the application economy

WHY CA FOR SECURITYCA security solutions are a leader in major security categories across the industry (leader in 13 industry analyst reports)

15 of the top 16 global banks trust their IT security to CA solutions.2

CA Technologies delivers high performance scalability to thousands of secure APIs across cloud and mobile.3

1CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142List reflects those companies identified in the Fortune 500 2013 list based on industry and revenue that are also CA Technologies customers that have licensed one or more CA Security software products as of March 31, 20143Source: Survey of 54 CA Layer7 customers: http://www.techvalidate.com/tvid/BF9-38E-3F5

As a result, one-quarter of all IT spending will be devoted to security in the next 3 years

A top security priority for enterprises – second only to protecting against data breaches – is improving the mobile customer experience, critical to the application economy

18 © 2014 CA. ALL RIGHTS RESERVED.

Integrated Suite for Identity & Access Security

Identity Portal

Identity Management & Governance

Access ManagementPrivileged Account

Management

Identity Analytics

Cloud Services Distributed / VirtualMobile

Connected DevicesCustomers /

Citizens PartnersEmployees Administrators

Mainframe

Advanced Authentication

Full use case coverage

Simple, Scalable, Sustainable

Complete Target

Coverage

API & SDK Accessible

End-User Experience

Contextual, Risk-based intelligence

19 © 2016 CA. ALL RIGHTS RESERVED.

Application-Network level Security @ NOC/COO ( Privilege Identity Management)

Requirement :Privilege Identity Management Privileged Identity Management Solution Privileged Access Manager Virtual Appliance Privileged Access Manager Privileged Access Manager Server Control(CA PIM)

Business Value Proposition

BusinessValue Enabler

Solution Area

Enforces

security Policies

protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing policies and monitoring and recording

privileged user activity

Privileged Access Manage

Access Control for IT Resources

Unify privileged user policies across

physical data center assets, virtual

infrastructure, public cloud, and hybrid

Environments

Privileged Access Control

Fast Time to ProtectionQuickly deploy Privileged Access Manager as a hardened device or a virtual machine, protecting your enterprise resources with one scalable, agentless solution,

Privileged Access Manage

Reduced costs for privileged user access auditing

centralized access managed and improved traceability and auditing of privileged accounts Privileged User Management

20 © 2014 CA. ALL RIGHTS RESERVED.

Focus on APIsEnable Anything, Everywhere Application Access

OUTSIDE PARTNERS / DIVISIONS

EXTERNAL DEVELOPERS

MOBILE APPS CLOUD SERVICES INTERNET OF THINGS

API Server Data

21 © 2014 CA. ALL RIGHTS RESERVED.

Provide end-to-end security from the client to the backend API

Control access to APIs based on user, app and device

Protect exposed APIs from external threats such as SQL injections and x-site scripting attacks

Use security standards such as OAuth to provide SSO

Apply appropriate risk based controls based on context of the situation

Protect sensitive assets from compromise reducing impact to brand and regulatory compliance

What you need to do Value to your business

Fine-grained API Access Control

Threat Protection

Enterprise SSO

API

22 © 2014 CA. ALL RIGHTS RESERVED.

23 © 2014 CA. ALL RIGHTS RESERVED.

Prashant Chaudhary

[email protected]