elets 2nd eJharkhand Summit 2016 - Prashant Chaudhary, Senior Director & Head-Business...
-
Upload
elets-technomedia -
Category
Government & Nonprofit
-
view
116 -
download
0
Transcript of elets 2nd eJharkhand Summit 2016 - Prashant Chaudhary, Senior Director & Head-Business...
Smart Technology for Smart Cities
Prashant Chaudhary
Sr. Director and HeadBusiness Development –Public Sector
Education
Utility Services
Transportation
Waste Management
Crime Management
Elements of a Smart City
As per Government of India concept paper on smart cities
Residential Industrial Commercial
Buildings
Water ParkingStreet
Lighting WasteEnvironm
ent PeopleStreet
FurnitureSafety&Security Traffic
Street
Internet Edge WAN Agg
Wireless WAN (2G/3G/4G/Wimax)
DSRC/LMR
InternetCloud Services
Vehicles
Vehicles
Public/Private WAN
Wired/Wireless Access
Wired/Wireless Aggregation
Ruggedized Device
Compute/Storage
Security
Internet Edge WAN Aggregation
Mobility/Location Management
Wireless/Wired Network Management
Video ManagementData Center Resources
Safety&Security
Data/Event Virtualization/Aggregation
Traffic ManagementEnvironment
WasteManagement
LightingManagement
ParkingManagement
WaterManagement
TransportManagement
Monitoring Command Control Centers
City Services
Citizen Services
Apps Portal
Security
Analytics
6 © 2014 CA. ALL RIGHTS RESERVED.
Architecture for Smart Cities
Communication Layer (Links)Ac
cess
Lay
er
API
Web
Existing Govt. Applications
Smart City components
Domain ApplicationsEnergy, Water, Transport, Safe-City mgmt
Core ApplicationsERP, Workflow, BPM, PPM
Integration Services
Instrumentation Layer (smart metering, /M2M)
Hosting Infrastructure
Command Center
Integration Services
7 © 2014 CA. ALL RIGHTS RESERVED.
The practices youneed to succeed.
Develop & Test
Assure
Deploy
DEVOPS
Identities Access
APIs
SECURITY
Prioritize
Analyze
Support
MANAGEMENT
8 © 2014 CA. ALL RIGHTS RESERVED.
Leaders In The Application Economy Run IT Like A Business
MANAGEMENT
WHY CA MANAGEMENT More than 1,200 businesses worldwide manage their strategic investments with CA solutions.
CA Management Solutions scale from 200 to 50,000 devices.
CA has been recognized by industry analysts as a leader in the Management space for many years.
1CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142The information is based upon customer experiences with the CA software in the customers’ specific environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.
As a result, 88% of LOB execs in Leaders orgs report satisfaction with their IT department versus 34% for Laggards
Leaders use business metric in setting priorities for enhancing delivery of IT services:53% use topline revenue growth45% prioritize getting new applications faster
9 © 2014 CA. ALL RIGHTS RESERVED.
Technology Landscape
9
IT Hardware& Assets Mainframe Distributed
HighDensity
Operating Systems & IT
Environments CloudPhysical Virtual
Time
Environment 81+°F77°F68°F
Power 20 Wper sq. ft.
80 W per sq. ft.
150+ W per sq. ft.
Applications & Business
ServicesData Processing
Business Users
Everyone & Everything
Facility & Data Center Space
DC, Colo & Modular
Computer Room
Data Centers
10 © 2016 CA. ALL RIGHTS RESERVED.
Smart City : Infrastructure Diagram
Privilege Access Management
Application
Performance
Management
Service
Management
Unified Infrastructure
Management & NFA
H/W Asset
Management &
Discovery
NMC COO & NOC
11 © 2016 CA. ALL RIGHTS RESERVED.
New Era IT Ecosystem
Smart Monitoring
Capacity Management
Capacity
Systems Management
System
Traffic Analysis Performance Fault
Network
Citizen Experience
App Perf Monitoring
Mobile Monitoring
Applications
Datacenter Infrastructure Management
Data Center
12 © 2014 CA. ALL RIGHTS RESERVED.
DevOps is at the Core of Business Success in the Development of Domain Applications
DEVOPS1
of enterprise plan to implement DevOps (vs. 66% last year)
88%
Those implementing DevOps have seen an 18% improvement in time-to-market and a 19% increase in revenue
WHY CA FOR DEVOPSLeveraging CA DevOps solutions, customers report up to a 25-50% reduction in the typical application development schedule2
Leveraging CA DevOps solutions, customers report that 60-90% more defects are detected at least one step earlier in the software development lifecycle3
Leveraging CA DevOps solutions, customers report up to 77% faster mean-time-to-recover (MTTR)4
1CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142Voke Research, Market Snapshot Report: Service Virtualization, Lanowitz, Dronzek, Dec 20123Voke Research, Market Snapshot Report: Service Virtualization, Lanowitz, Dronzek, Dec 20124Marivi Stuchinsky, Associate VP of IT, Molina Healthcare; ANZ Bank Smart Enterprise Article (The information is based upon customer experiences with the CA software in the customers’ specific environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.)
13 © 2014 CA. ALL RIGHTS RESERVED.
QA/TESTDEV PRODUCTIONPRE-PROD
Chaotic and Complex Application Delivery
DELAYS
Work Time
Wait Time
CustomerExperience
IDLE TIME
Code | Integrate | Build
IDE SCM CI CONFIGTESTCONTAINER CLOUD
Functional & UA Testing Performance Testing Deploy to Production defect defect defect
DELAYS DELAYS
RE-WORK RE-WORK RE-WORK
SLOW AND INEFFICIENT - EXCESSIVE IDLE TIME, DELAYS AND RE-WORK
PROVISION
Manual Testing
ManualScripting
Developers Deadlocked
Too little testing, too late
in the cycleConstrained
Environments
Too many disparate
tools
Poor customer
experience
14 © 2014 CA. ALL RIGHTS RESERVED.
QA/TESTDEV PRODUCTIONPRE-PROD
Virtualize APIs and manage access
Quickly create, edit and deploy virtual services
ParallelWork
Streams
ELIMINATE DEPENDENCIES AND CONSTRAINTS TO ENABLE PARALLEL WORK STREAMS
APIManagement
Release Plan
CI/Build Functional testing UAT Integration
testing Performance
testingDeploy to pre-prod
Deploy to production
Code commit SCM
Accurately simulate constrained systems
VIRTUAL SERVICE
Design Spec
Requirements
Set up dev environment
Set up test environments
Set up pre-prod
Set up prod
CustomerExperience
15 © 2014 CA. ALL RIGHTS RESERVED.
Eliminate constraints and critical dependencies
Rapidly deliver high-quality applications and services
Create and deliver exceptional customer value
CONTINUOUSDELIVERY
DIGITAL TRANSFORMATION
Every Company is Becoming a Technology Company, Every Business a Digital Business
Re-thinking how the business operates to find new ways to create and deliver customer value
16 © 2014 CA. ALL RIGHTS RESERVED.
In The Smart Environment, Security Must Be An Enabler, Not A Constrictor
SECURITY1
Security is the #1 or #2 top obstacle to organizations becoming more
effective in the application economy
WHY CA FOR SECURITYCA security solutions are a leader in major security categories across the industry (leader in 13 industry analyst reports)
15 of the top 16 global banks trust their IT security to CA solutions.2
CA Technologies delivers high performance scalability to thousands of secure APIs across cloud and mobile.3
1CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142List reflects those companies identified in the Fortune 500 2013 list based on industry and revenue that are also CA Technologies customers that have licensed one or more CA Security software products as of March 31, 20143Source: Survey of 54 CA Layer7 customers: http://www.techvalidate.com/tvid/BF9-38E-3F5
As a result, one-quarter of all IT spending will be devoted to security in the next 3 years
A top security priority for enterprises – second only to protecting against data breaches – is improving the mobile customer experience, critical to the application economy
17 © 2014 CA. ALL RIGHTS RESERVED.
Digital Transformation requires Identity-Centric Security
ID
On Premise Apps
Cloud Services
Connected Devices
CustomersCitizens
Partners
Employees
18 © 2014 CA. ALL RIGHTS RESERVED.
Integrated Suite for Identity & Access Security
Identity Portal
Identity Management & Governance
Access ManagementPrivileged Account
Management
Identity Analytics
Cloud Services Distributed / VirtualMobile
Connected DevicesCustomers /
Citizens PartnersEmployees Administrators
Mainframe
Advanced Authentication
Full use case coverage
Simple, Scalable, Sustainable
Complete Target
Coverage
API & SDK Accessible
End-User Experience
Contextual, Risk-based intelligence
19 © 2016 CA. ALL RIGHTS RESERVED.
Application-Network level Security @ NOC/COO ( Privilege Identity Management)
Requirement :Privilege Identity Management Privileged Identity Management Solution Privileged Access Manager Virtual Appliance Privileged Access Manager Privileged Access Manager Server Control(CA PIM)
Business Value Proposition
BusinessValue Enabler
Solution Area
Enforces
security Policies
protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing policies and monitoring and recording
privileged user activity
Privileged Access Manage
Access Control for IT Resources
Unify privileged user policies across
physical data center assets, virtual
infrastructure, public cloud, and hybrid
Environments
Privileged Access Control
Fast Time to ProtectionQuickly deploy Privileged Access Manager as a hardened device or a virtual machine, protecting your enterprise resources with one scalable, agentless solution,
Privileged Access Manage
Reduced costs for privileged user access auditing
centralized access managed and improved traceability and auditing of privileged accounts Privileged User Management
20 © 2014 CA. ALL RIGHTS RESERVED.
Focus on APIsEnable Anything, Everywhere Application Access
OUTSIDE PARTNERS / DIVISIONS
EXTERNAL DEVELOPERS
MOBILE APPS CLOUD SERVICES INTERNET OF THINGS
API Server Data
21 © 2014 CA. ALL RIGHTS RESERVED.
Provide end-to-end security from the client to the backend API
Control access to APIs based on user, app and device
Protect exposed APIs from external threats such as SQL injections and x-site scripting attacks
Use security standards such as OAuth to provide SSO
Apply appropriate risk based controls based on context of the situation
Protect sensitive assets from compromise reducing impact to brand and regulatory compliance
What you need to do Value to your business
Fine-grained API Access Control
Threat Protection
Enterprise SSO
API