Leveraging Technology for Government Service Delivery
-
Upload
egov-magazine -
Category
Technology
-
view
265 -
download
0
Transcript of Leveraging Technology for Government Service Delivery
Business, rewritten by software™
Leveraging Technology for Government Service Delivery
Prashant Chaudhary
Sr. Director - Government
2 © 2014 CA. ALL RIGHTS RESERVED.
Government and PSU are using digital Transformation to improve productivity and citizen service
2
3 © 2014 CA. ALL RIGHTS RESERVED.
Trends, Opportunities and Challenges
Infrastructure• Infrastructur
e Performance Management
• Service Level Monitoring
Service Delivery• Application
Performance & End User Experience
• Social Media
Data Security• Prevention
of Insider / Outside Threats
• Strong authentication measures
• Risk Analysis
Manageability• Effective
Project Management
• Infra Consolidation
• Capex to Opex
• Automation & Cloud based service delivery
• Contract / Vendor Management
Going Forward• Mobile
Based Service Delivery
• Faster service development
• API Management
• Rapid Replication
• Service Virtualization
4 © 2014 CA. ALL RIGHTS RESERVED.
Residential Industrial Commercial
Buildings
Water ParkingStreet
Lighting WasteEnvironm
ent PeopleStreet
FurnitureSafety&Security Traffic
Street
Internet Edge WAN Agg
Wireless WAN
InternetCloud Services
Vehicles
Vehicles
Public/Private WAN
Wired/Wireless Access
Wired/Wireless Aggregation
Ruggedized Device
Compute/Storage
Security
Internet Edge WAN Aggregation
Mobility/Location Management
Wireless/Wired Network Management
Video ManagementData Center Resources
Safety&Security
Data/Event Virtualization/Aggregation
Traffic ManagementEnvironment
WasteManagement
LightingManagement
ParkingManagement
WaterManagement
TransportManagement
Monitoring Command Control Centers
City Services
Citizen Services
Apps Portal
Security
Analytics
6 © 2014 CA. ALL RIGHTS RESERVED.
Technology Landscape
6
IT Hardware& Assets Mainframe Distributed
HighDensity
Operating Systems & IT
Environments CloudPhysical Virtual
Time
Environment 81+°F77°F68°F
Power 20 Wper sq. ft.
80 W per sq. ft.
150+ W per sq. ft.
Applications & Business
ServicesData Processing
Business Users
Everyone & Everything
Facility & Data Center Space
DC, Colo & Modular
Computer Room
Data Centers
7 © 2014 CA. ALL RIGHTS RESERVED.
New Era IT Ecosystem
Monitoring Flexibility
Capacity Management
Capacity
Systems Management
System
Traffic Analysis Performance Fault
Network
Citizen Experience
App Perf Monitoring
Mobile Monitoring
Applications
Datacenter Infrastructure Management
Data Center
8 © 2014 CA. ALL RIGHTS RESERVED.
Digital Transformation requires Identity-Centric Security
ID
On Premise Apps
Cloud Services
Connected Devices
CustomersCitizens
Partners
Employees
9 © 2014 CA. ALL RIGHTS RESERVED.
Evaluate, Authenticate, Authorize, Access
Valid ID
Do you have the right credential? Is your behavior and
history as expected?
Who are you? Is this your normal device and geo-
location?
Web Portal
Mobile App
VPN Kiosk
Advanced Authentication Authorization
Access Granted
Are you allowed to access this
resource?
Is your risk level acceptable
to access this resource?
Authenticated
10 © 2014 CA. ALL RIGHTS RESERVED.
Privileged AccessThe Emerging Front Line
Hacker Malware/APT
On Premise
Employees/Partners Systems Admins Network Admins DB Admins Application Admins
PartnersSystems/NW/DB/Application Admins
EmployeesSystems/NW/DB/
Application Admins
Public Cloud
Apps
Apps
VMwareAdministrator
AWS Administrator
Microsoft Office 365 Administrator
INTERNET
ORGANIZATIONS TYPICALLY HAVE 3-4X MORE PRIVILEGED ACCOUNTS AND CREDENTIALS THAN EMPLOYEES!
11 © 2014 CA. ALL RIGHTS RESERVED.
Privileged Access Management Helps You Address Five Primary Challenges
PRIVILEGED ACCESS MGMT.
EnableCompliance
StopTargeted
Attacks
Enable Operational Efficiency
Secure the Hybrid Enterprise
MitigateInsider Threats
12 © 2014 CA. ALL RIGHTS RESERVED.
Delivering New Services Over Internet Used to be All About the Browser
WEB CONTENT EXPOSED THROUGH PERIMETER DMZ
DATA
13 © 2014 CA. ALL RIGHTS RESERVED.
Focus on APIsEnable Anything, Everywhere Application Access
OUTSIDE PARTNERS / DIVISIONS
EXTERNAL DEVELOPERS
MOBILE APPS CLOUD SERVICES INTERNET OF THINGS
API Server Data
14 © 2014 CA. ALL RIGHTS RESERVED.
Provide end-to-end security from the client to the backend API
Control access to APIs based on user, app and device
Protect exposed APIs from external threats such as SQL injections and x-site scripting attacks
Use security standards such as OAuth to provide SSO
Apply appropriate risk based controls based on context of the situation
Protect sensitive assets from compromise reducing impact to brand and regulatory compliance
What you need to do Value to your business
Fine-grained API Access Control
Threat Protection
Enterprise SSO
API
15 © 2014 CA. ALL RIGHTS RESERVED.
DEVOPS SECURITYMANAGEMENT
The disciplines that enable the Digital Transformation
Accelerate Innovation Enable GrowthRun IT like a Business
CA Technologies At-a-Glance
• US$ 4.0 + billion revenue • Leading Enterprise software company• 35+ years in Enterprise IT management• Founded in 1976• Leaders in IT Solutions, • 15,000+ employees worldwide• ITC @ Hyderabad• Serving business in 40+ countries with
150+ offices• 98% of Fortune 500 Companies & 95% of
Fortune 1000 companies are our Happy CA Customers
Sr. Director - [email protected]
@cainc
slideshare.net/CAinc
linkedin.com/company/ca-technologies
ca.com
Prashant Chaudhary