Irrelevant Oversight: 'Presidential Administration' from ...
Top 5 Mistakes That Make IT Executives Irrelevant
-
Upload
ericka-chickowski -
Category
Technology
-
view
330 -
download
1
Transcript of Top 5 Mistakes That Make IT Executives Irrelevant
AVOIDING IT EXECUTIVE IRRELEVANCE
HOW CIOS, CTOS AND CISOS CAN STOP MAKING MISTAKES
AND START ADDING VALUE
Who We Are
Ericka Chickowski Shaun Donaldson• Experienced business and
technology journalist• Covers IT security, tech
innovation, how tech trends affect real people
• Publications include Dark Reading, DevOps.com, Entrepreneur and InformationWeek
• Chief Content Strategist at Bitdefender Enterprise.
• Responsible for supporting relationships with strategic alliance partners, enterprise customers and analysts
• 10+ years in tech world
CIO
CTO CSO
Where is IT Executive Leadership Headed?
CIO
CTO CSO
Where is IT Executive Leadership Headed?
CIO
CTO CSO
Where is IT Executive Leadership Headed?
CIO
CTO CSO
Where is IT Executive Leadership Headed?
"Feathered Tyrannosaurus model" by Marcin Polak from Warszawa / Warsaw, Polska / Poland - Tyranozaur RexUploaded by FunkMonk. Licensed under CC BY 2.0 via Commons
"VHS-cassette" by Groink - Own work. Licensed under CC BY-SA 3.0 via Commons
What’s Your Number One Directive?
What’s Your Number One Directive?
Keeping Data Center Lights On?
"CERN Server 03" por Florian Hirzinger - www.fh-ap.com - Own work (Florian Hirzinger). Licenciado sob CC BY-SA 3.0, via Wikimedia Commons
What’s Your Number One Directive?
Making Sure Endpoints Run
Smoothly?
What’s Your Number One Directive?
Building and Maintaining
Applications?
What’s Your Number One Directive?
Keeping Data Safe?
What’s Your Number One Directive?
Keeping Data Center Lights On?
Building and Maintaining
Applications?
Making Sure Endpoints Run
Smoothly?
Keeping Data Safe?
What’s Your Number One Directive?
Keeping Data Center Lights On?
Building and Maintaining
Applications?
Making Sure Endpoints Run
Smoothly?
Keeping Data Safe?
Yes?
How The CEO Sees You
YOU HAD ONE JOB
The Real IT Directive
The Real IT Directive
The Real IT Directive
The Real IT Directive
The Real IT Directive
The Real IT Directive
How The LOB Sees You
YOU HAD ONE JOB
Symptoms of IT Executive Irrelevance
Shadow IT
Symptoms of IT Executive Irrelevance
Hiring of CDOsShadow IT
You’re Doing It Wrong: Mistake #1
Ignoring DevOps and Continuous
Delivery
You’re Doing It Wrong: Mistake #2
Underestimating the Value of Automation
You’re Doing It Wrong: Mistake #3
Leaving Data on the Table
You’re Doing It Wrong: Mistake #4
Failing to Experiment
You’re Doing It Wrong: Mistake #5
Viewing Cloud as a Cost Reduction
Tool
Next Steps
CLOUDBIG DATA
MOBILITYSECURITYSOCIAL
FORCES OF CHANGETHE GREATEST
Mode One
Mode Two
Bimodal IT is Tipping the Scales
Address endpoints in isolation:ServersDesktopsLaptops, mobileBYODVirtualizedCloud
= Pain x (Linux, Mac, Windows, iOS, Android)
IT-Secured Services – Easy?
• Built for traditional, static datacenters• Deep functionality, so long as it’s
Windows• Patchwork of agents, add-ons, and
consoles• Result of “feature arms race”• Struggle to retool for virtualisation• Cloud undready
Vertical Endpoint SecurityEndpoints
• Windows laptops, desktops, servers• Linux servers
Feature Pack 1
• Anti-virus, spyware, malware, heuristics, cloud intelligence
• Basic firewall (Windows only)
Feature pack 2
• File/folder/drive encryption• Data loss prevention
Endpoints
• Advanced management (redundancy, scaling)• Central log roll-up
Traditional
• Servers• Desktops• Laptops
Mobile
• BYOD• Mobile devices
Virtualised
• Servers• VDI• Private cloud
Cloud
• Servers• PaaS, SaaS,
DaaS
• With each, the goal is protect the data• Difficult to get insight and control across the
estate
Horizontal Endpoint Security
P2V
Datacentre Virtualisation Example
Designed for traditional hardware islands
Duplicated footprint impacts performance
Unsynchronized management
Creates Usability Headaches
Element VMware vShield Integration Bitdefender SVE
Centralize, deduplicate Inspection through VMware API’s Inspection using security vendor technology
Hypervisor requirements
ESXi (vSphere) environment with vShield Endpoint license, vShield Manager
installed
ESXi, Xen, Hyper-V, KVM, etc., and any mix thereof
Endpoint footprintvShield Endpoint driver embedded in
VMware Tools. Optional BD Tools (GUI, memory & process scanning)
BD Tools (GUI, memory & process scanning)
Virtual Appliance Tied to ESXi hypervisor; one per host, no host migration
Independent of hypervisor; fail-over between hosts, migration a non-issue
Operating Systems Windows Windows, Linux
Public cloud Not technically practical/possible Yes (AWS as a Module)
A Problem that can be Solved, Carefully
Horizontal, Scalable Management - GravityZone
Management as a Cloud, in the Cloud, from the Cloud…
Questions
Ericka Chickowski Shaun Donaldson• [email protected]• Twitter: @ErickaChick
• [email protected]• @ShaunLDonaldson
Check Out The Ebook!
More About Bitdefender
http://businessresources.bitdefender.com/top_5_ways_it_executive_risk_irrelevance
http://www.bitdefender.com/business/