5
“The cloud forces us to have a different kind of discipline around data security, mostly because it breaks down the assumption that we have any kind of network security at all.” John Thielens Chief Security Officer, Axway cloud accelerators Can big data transform your business?

CA CLOUD ACCELERATOR_Axway_Executive_Profile

Embed Size (px)

Citation preview

Page 1: CA CLOUD ACCELERATOR_Axway_Executive_Profile

“The cloud forces us to have a different kind ofdiscipline around data security, mostly because it breaks down the assumptionthat we have any kind of network security at all.”

John thielensChief Security Officer, Axway

cloud accelerators

Can big data transform your business?

Page 2: CA CLOUD ACCELERATOR_Axway_Executive_Profile

About Axway• Founded in 2001• Based in Phoenix, Arizona with offi ces in over 20 countries• Specializes in managing, securing & monitoring business interactions• Operating for over a decade providing solutions to leading organizations across most industries• Over 1,700 employees • 11,000 customers in 100 countries

For more information, visit axway.com

There’s always a risk. There are risks in doing things the old way and risks with doing things the new way—the cloud way. People who just say “no” aren’t engaging in the right discussion.

Page 3: CA CLOUD ACCELERATOR_Axway_Executive_Profile

Career Highlights• 30 years of experience in the IT industry• Formerly, VP of Product Marketing at GXS & Inovis• Personal interests: attending his children’s dance recitals & baseball games, playing piano, cycling & rollerblading

Can you tell us about Axway and the services that you offer?

We describe ourselves as a business interaction networks company. Business interactions are about connecting businesses to other businesses and also about connecting the components of an enterprise together. Our services include business-to-business integrations, managed file transfer, business operations monitoring, process management, and email and identity security, which are offered on-premise or in the cloud.

We’ve been involved in the cloud since before it was called the cloud, managing services on behalf of some of our largest clients, and our data transmission solutions have been used by a number of vendors to move data in and out of the cloud. We are continuing to invest in cloud services and over the last few months, we’ve developed services around our heritage of B2B and around community management.

Cloud ACCelerAtor / JoHN tHieleNs & AlAN tAylor / AxwAy

John thielensChief Architect of Cloud Service & Chief Security Officer, Axway

Career Highlights• 30 years of experience in the IT industry • Formerly, Director of Business Development at MobileAware• Formerly, Business Development at IBM Tivoli• Personal interests: spending time with family, golfing & entertaining guests

Alan taylorAlliances Director, Axway

Page 4: CA CLOUD ACCELERATOR_Axway_Executive_Profile

what are the advantages of big data?

The cloud is an infi nitely scalable place and so this means that we’re dealing with more and more data. Businesses no longer have to throw data away. The prize of “Big Data” is of course the analytics derived from all that volume, velocity and variety of data. Data gathered from multiple sources including the cloud can be used to fi nd new insights and that analysis is quickly becoming a new wave of competitive differentiation. Being able to manage “Big Data” and deliver powerful data governance as a strategy leads all companies towards greater effi ciencies, lower risk and increased revenues. Stored data that once was deemed worthless can now allow businesses to discover new nuggets of value out of that data they already have. We can create new marketing programs to drive new business that’s quantifi able, because they can discover buying patterns and correlate information to provide data points for multiple initiatives. There are also defensive value points to big data. If you think about big data analysis in regards to security, it can help businesses fi nd gaps and risks, and close them off to prevent loss of value by enhancing the security. Today it is critical that within the enterprise and the cloud we understand how to protect the customer brand by ensuring control, compliance, information security and data protection in everything they do, including big data.

what are some of the challenges associated with big data?

Today, we can take a photograph on a device and press a button to upload the photograph on Facebook in seconds. It’s that kind of mobility and velocity with which data’s coming at us. It’s not only the amount of data that’s being uploaded; it’s the variety of data as well. Creating effective systems and processes for data standardization, information sharing, and collaboration, auditability and security across the entire business ecosystem will soon become an essential task for CIOs and their IT organizations. As big data makes its way back to these data warehouses for analytics, there are different varieties of data making their way across the network. Our job at Axway is to transform that through our gateway technology into a common denominator that then can go into and leave the data warehouse securely. So, volume, velocity and variety is really the challenge that we are now constantly responding to when we talk to customers about big data.

Are some companies using data security as an excuse not to adopt cloud?

The great thing about security is that it can play the role of an excuse very easily. That can always be kind of a “just because” reason, but that’s really an unfair game to play. I think even the word is wrong—we should be talking about risk. There’s always a risk. There are risks in doing things the old way and there are new risks with doing things the new way, the cloud way. People who just say “no” aren’t engaging in the right discussion.

Additionally, I think that the cloud forces us to have a different kind of discipline around data security, mostly because it breaks down the assumption that we have any kind of network security at all.

to learn more about Axway, visit axway.com

Our services in combination with CA Technologies products results in a powerful story for our customers.

Page 5: CA CLOUD ACCELERATOR_Axway_Executive_Profile

to learn more from cloud service providers working with CA technologies, visitca.com/cloudaccelerators

Copyright © 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document “as is” without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. The information and results illustrated here are based upon the customer’s experiences with the referenced software product in a variety of environments, which may include production and nonproduction environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.

We think about all the touch points for the data, because we assume that the environment is hostile. Now, in an on-premise world, we often will think about other types of defenses, like network-based defenses, but I think we may find that the vigilance that cloud computing forces us to have, in which we assume the data lives in a hostile environment, is actually a good discipline to bring back on-premise. As we look at some other trends around consumerization of IT and bring your own device, hostile devices entering the network and hostile people touching the network, our secure network and firewalls really are connected to a hostile environment, just like the cloud.

why is identity and access management so critical to data security?

In a lot of ways, identity and access management is the backbone of the security infrastructure for the enterprise. If we think that the major threat points in the system are, in fact, the human element, then identity and access management is really where the system and the humans connect to each other. If our security value is to mean anything in the hands of people who aren’t managed properly, then our technology is for naught.

why did Axway choose to partner with CA technologies?

We began working with CA Technologies because of a mutual customer, and our relationship has really blossomed over the past few years. We also chose CA Technologies because they are a market leader and it’s important to us that we align ourselves with the best partners in the industry.

If you look at CA Single Sign-On and CA SiteMinder®, CA Technologies is the market leader bar-none. Our solutions in combination with CA Technologies products results in a powerful story for our customers. The encryption, the data security, and the workflow process is provided by Axway software, and the authorization, identity management, credential life cycle, and the two factor mechanisms are all under the control of CA Technologies software. Not only are we a reseller of CA Technologies products, but we actually use the technology ourselves to run some of our large projects.

More recently, we’ve found ourselves drawn to the CA Technologies vision of what cloud means. Marketing people love the word, but enterprises are still trying to figure out what it means to them. I think CA Technologies and Axway have a well-aligned vision for the cloud, for the cloud, and CA Technologies can help us realize that vision through our partnership.

But when we think about securing data in the cloud, we know we’re going through public networks, and so we have to think about defending all of the points of entry. Where does the data flow? That has to be secured. Who has access? That has to be secured. Who’s taking back-up tapes? That has to be secured.