SlideShare una empresa de Scribd logo
1 de 48
Lance Shaw
Q3 2012
The consumer
 Web is setting
the expectations




                   2
Mobile and Cloud
technologies are giving
life to Enterprise Apps
CIOs are Under Siege
 Risks related to
  compliance and litigation
 Security threats from
  external and internal breaches
 Changes in work culture
 Demands for better
  business responsiveness
Balance Matters



       Value


                  Liability
Changes in Work Culture

               Millennial




  B.Y.O.D




             Social Media
Demand for Business Responsiveness
   Productivity




                   Time
“Enterprise Information Management
  Represents the Future of Data”
OpenText EIM Solutions
Welcome to the office - 2012

     Now where did my
       team put that
    important business
       information?                       Box
                         Dropbox
                                     SkyDrive
                                 SugarSync
                  Google Drive
                                    ShareFile
                     Huddle
What’s Missing?




                  16
 Permissions
 Metadata
 Audit Information
 Version History
 Information Management

= Enterprise Basics


                           17
Consumer needs
1. I need to access my content from
   anywhere
2. Make it easy for me to share with
   other people


                                       Enterprise needs
                                       1. We have to make sure its secure
                                       2. We need to keep it under control
Secure Sharing & Sync for the Enterprise
File Sharing meets ECM
 Retention & RM Policies on objects

        Publish in repository

Auditing, Versioning, Classification &
              Discovery

              Archiving
OpenText Tempo Editions
 Same product, different deployment configurations




Content Server Edition       Express Edition               Cloud Edition
                          Includes preconfigured,    COMING Q4
 Add-on for Content
                           limited use CS10           Beta begins in September
  Server 10
                          Tempo client UI only       Fully hosted solution
 Fully integrated
  repository              Packaged as virtual        Regionalized for data
                           machine image for easy      sovereignty
                           deployment                 Subscription model pricing
                          Can be upgraded            Available for OEM’s
So, who cares?
The impact on information management


    Huge amounts of proprietary and regulated data
    are leaking onto non-corporate devices


      Enterprise files on multi-tenanted public servers
      are potentially vulnerable to attack or
      unauthorized access.


    Some end users are backing up their laptops onto
    low-cost services that have not been verified as
    meeting corporate requirements.
What is IT Management to do?

 Three options:

Allow users to do whatever
 they want
Provide an approved and
 controlled service
Totally forbid the use of such
 services
Chief Information Officer
 My organization expects me
  to protect information and
       make sure it is readily
                    available
How important is security to your company?




“On the list of banned apps are public file-transfer services such as Dropbox;
Horan says IBM fears that using such software could allow sensitive
information to get loose.”

"We found a tremendous lack of awareness as to what constitutes a risk," says
Horan. So now, she says, "we're trying to make people aware."
Legal counsel
It’s hard enough producing
information in response to
e-discovery requests! Come on!
ECM Project Manager
We’ve invested a lot of money in
 content management, the last
        thing we need is people
    circumventing our systems!
Business users
We want applications that help
us get our jobs done – some of
us might even pay out of own
pockets!
Value   Risk
           Slide 30
Tempo @ EMP
Use Cases: Mobile access to secure
patient data, medical information and
procedural information

Competition: Dropbox




      “Realizing that DropBox did not meet our security requirements, EMP purchased OpenText
     Tempo for secure file sharing from multiple devices. OpenText is a company we can trust with
                   our secure data needs. We couldn't be happier with the solution.”
                    - David Peppard, Chief Information and Technology Officer, EMP


                                                                                            About EMP
                                           A privately-owned and managed group with over 700 emergency
                                          medicine physicians treating nearly 3 million emergency medicine
                                                    patients each year in over 60 locations in North America
Demonstration
iPhone   BlackBerry   Android
OpenText Tempo Architecture




     Tempo Engine


    Content Server

     Tempo Module
Preview customer feedback
                                                   “Tempo is very fast &
      “I have to say: Well done!                        handy!”
 Congratulations to everybody on the
 Tempo team. In my opinion Tempo is
what Steve Jobs would have referred to
          as insanely great!”
                                             “The Tempo web interface is an
                                                 easy and very intuitive
                                                       interface”
             “Sharing is very easy to use”



            “Tempo is instant and convenient! The Windows
            desktop client is fast and intuitive and the Mobile
            iPhone app is very fast and user friendly.”
Safe, Secure, Easy File Sharing…
Key Value Propositions

 Secure, enterprise-ready file sharing
 Very Simple to use – no (or little) training required
 Drives ECM adoption and leverages investment
 Ensures security and compliance of information is not
  compromised
 Fully integrated into Content Server
Tempo. Get in with the right cloud

Más contenido relacionado

La actualidad más candente

Cloud to cloud file transfer and migration guide for IT admins
Cloud to cloud file transfer and migration guide for IT adminsCloud to cloud file transfer and migration guide for IT admins
Cloud to cloud file transfer and migration guide for IT adminsShiva Remala
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
Sentri Webinar: Microsoft Lync Exchange 2013
Sentri Webinar: Microsoft Lync Exchange 2013Sentri Webinar: Microsoft Lync Exchange 2013
Sentri Webinar: Microsoft Lync Exchange 2013Sentri
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Microsoft 365 security in the cloud
Microsoft 365 security in the cloudMicrosoft 365 security in the cloud
Microsoft 365 security in the cloudNovaQuantum
 
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015IBM France Lab
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 

La actualidad más candente (16)

Cloud to cloud file transfer and migration guide for IT admins
Cloud to cloud file transfer and migration guide for IT adminsCloud to cloud file transfer and migration guide for IT admins
Cloud to cloud file transfer and migration guide for IT admins
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Emc keynote 0945 1030
Emc keynote 0945 1030Emc keynote 0945 1030
Emc keynote 0945 1030
 
Sentri Webinar: Microsoft Lync Exchange 2013
Sentri Webinar: Microsoft Lync Exchange 2013Sentri Webinar: Microsoft Lync Exchange 2013
Sentri Webinar: Microsoft Lync Exchange 2013
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Technology update
Technology updateTechnology update
Technology update
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Microsoft 365 security in the cloud
Microsoft 365 security in the cloudMicrosoft 365 security in the cloud
Microsoft 365 security in the cloud
 
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 

Similar a Tempo - Mobile access with Governance

OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015Marcel Hoffmann
 
KMWorld - The Future of Enterprise Content Management (ECM)
KMWorld - The Future of Enterprise Content Management (ECM)KMWorld - The Future of Enterprise Content Management (ECM)
KMWorld - The Future of Enterprise Content Management (ECM)Nuxeo
 
Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?John Newton
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overviewddaragh
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeeGaurav "GP" Pal
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information GovernanceJohn Newton
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure ApplicationsHelpSystems
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
AWS Customer Presentation - Mind Touch
AWS Customer Presentation - Mind TouchAWS Customer Presentation - Mind Touch
AWS Customer Presentation - Mind TouchAmazon Web Services
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend
 

Similar a Tempo - Mobile access with Governance (20)

OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
KMWorld - The Future of Enterprise Content Management (ECM)
KMWorld - The Future of Enterprise Content Management (ECM)KMWorld - The Future of Enterprise Content Management (ECM)
KMWorld - The Future of Enterprise Content Management (ECM)
 
Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
 
Final
FinalFinal
Final
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfee
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure Applications
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
AWS Customer Presentation - Mind Touch
AWS Customer Presentation - Mind TouchAWS Customer Presentation - Mind Touch
AWS Customer Presentation - Mind Touch
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Tempo - Mobile access with Governance

  • 2. The consumer Web is setting the expectations 2
  • 3. Mobile and Cloud technologies are giving life to Enterprise Apps
  • 4. CIOs are Under Siege  Risks related to compliance and litigation  Security threats from external and internal breaches  Changes in work culture  Demands for better business responsiveness
  • 5. Balance Matters Value Liability
  • 6. Changes in Work Culture Millennial B.Y.O.D Social Media
  • 7. Demand for Business Responsiveness Productivity Time
  • 8. “Enterprise Information Management Represents the Future of Data”
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Welcome to the office - 2012 Now where did my team put that important business information? Box Dropbox SkyDrive SugarSync Google Drive ShareFile Huddle
  • 17.  Permissions  Metadata  Audit Information  Version History  Information Management = Enterprise Basics 17
  • 18. Consumer needs 1. I need to access my content from anywhere 2. Make it easy for me to share with other people Enterprise needs 1. We have to make sure its secure 2. We need to keep it under control
  • 19. Secure Sharing & Sync for the Enterprise
  • 20. File Sharing meets ECM Retention & RM Policies on objects Publish in repository Auditing, Versioning, Classification & Discovery Archiving
  • 21. OpenText Tempo Editions Same product, different deployment configurations Content Server Edition Express Edition Cloud Edition  Includes preconfigured,  COMING Q4  Add-on for Content limited use CS10  Beta begins in September Server 10  Tempo client UI only  Fully hosted solution  Fully integrated repository  Packaged as virtual  Regionalized for data machine image for easy sovereignty deployment  Subscription model pricing  Can be upgraded  Available for OEM’s
  • 23. The impact on information management Huge amounts of proprietary and regulated data are leaking onto non-corporate devices Enterprise files on multi-tenanted public servers are potentially vulnerable to attack or unauthorized access. Some end users are backing up their laptops onto low-cost services that have not been verified as meeting corporate requirements.
  • 24. What is IT Management to do?  Three options: Allow users to do whatever they want Provide an approved and controlled service Totally forbid the use of such services
  • 25. Chief Information Officer My organization expects me to protect information and make sure it is readily available
  • 26. How important is security to your company? “On the list of banned apps are public file-transfer services such as Dropbox; Horan says IBM fears that using such software could allow sensitive information to get loose.” "We found a tremendous lack of awareness as to what constitutes a risk," says Horan. So now, she says, "we're trying to make people aware."
  • 27. Legal counsel It’s hard enough producing information in response to e-discovery requests! Come on!
  • 28. ECM Project Manager We’ve invested a lot of money in content management, the last thing we need is people circumventing our systems!
  • 29. Business users We want applications that help us get our jobs done – some of us might even pay out of own pockets!
  • 30. Value Risk Slide 30
  • 31. Tempo @ EMP Use Cases: Mobile access to secure patient data, medical information and procedural information Competition: Dropbox “Realizing that DropBox did not meet our security requirements, EMP purchased OpenText Tempo for secure file sharing from multiple devices. OpenText is a company we can trust with our secure data needs. We couldn't be happier with the solution.” - David Peppard, Chief Information and Technology Officer, EMP About EMP A privately-owned and managed group with over 700 emergency medicine physicians treating nearly 3 million emergency medicine patients each year in over 60 locations in North America
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. iPhone BlackBerry Android
  • 45. OpenText Tempo Architecture Tempo Engine Content Server Tempo Module
  • 46. Preview customer feedback “Tempo is very fast & “I have to say: Well done! handy!” Congratulations to everybody on the Tempo team. In my opinion Tempo is what Steve Jobs would have referred to as insanely great!” “The Tempo web interface is an easy and very intuitive interface” “Sharing is very easy to use” “Tempo is instant and convenient! The Windows desktop client is fast and intuitive and the Mobile iPhone app is very fast and user friendly.”
  • 47. Safe, Secure, Easy File Sharing… Key Value Propositions  Secure, enterprise-ready file sharing  Very Simple to use – no (or little) training required  Drives ECM adoption and leverages investment  Ensures security and compliance of information is not compromised  Fully integrated into Content Server
  • 48. Tempo. Get in with the right cloud

Notas del editor

  1. SPEAKER NOTESContent is EvolvingAnd as the volume of content is growing, it is also evolving. Today, users expect to have content available, on demand, anywhere and anytime. Social networks have created a new dimension of content collaboration with the ability to share files at the push of a button. Smartphones and tablet computers have enabled content to be mobilized and to be carried in your pocket. And cloud computing is changing the conventional ideas of in-house data archiving. There has never been a more exciting time to be in the content business, but these new concepts pose many challenges to Enterprise business users. Security, privacy and intellectual property management are huge concerns. Making these new content apps ‘safe’ for enterprises is one of OpenText’s primary strategic objectives.
  2. There is a key dilemma in enterprise today. The business users just want to get their jobs done and for the most part, they have the ability to do so but Legal departments have concerns about the security, compliance and legal risk implications of their activities. That tends to slow things down which is counterproductive.Striking the right balance is at the heart of ECM – and has been since the beginning.
  3. Top business challenges they were experiencing: Needed mobile access to the latest procedural documents, patient info, drug and medical info. Wanted a system that is very easy to use and automates delivery of documents to training teams and physiciansInformation security is critical and content must be kept in-houseTempo Differentiators:Tempo addresses the same ease of use concerns that Dropbox had, but delivers a much higher level of information security.Tempo allows users to track who has read documents, who has edited content and track version historyTempo easily integrated within their existing infrastructure and corporate directoryTempo offers selective control over who can share with external (non-EMP) peoplePerceived Value / benefits realized:A secure alternative to consumer tools like Dropbox that were invading their organization.Quote: “Realizing that DropBox did not meet our security requirements, EMP purchased OpenText Tempo for secure file sharing from multiple devices. OpenText is a company we can trust with our secure data needs.  We couldn't be happier with the solution.” David Peppard, Chief Information and Technology Officer, Emergency Medicine Physicians.