Welcome!

Cloud Expo Authors: Esmeralda Swartz, Paige Leidig, Elizabeth White, Xenia von Wedel, Liz McMillan

Related Topics: Cloud Expo, SOA & WOA, Virtualization, Web 2.0, HP, Security

Cloud Expo: Article

Delivering Security ‘as a Service’

In the Boardroom with... Mr. Bryan Coapstick, Director, Mobile Innovations, HP Enterprise Services, U.S. Public Sector

Bryan Coapstick is the Director of Mobile Innovation, where he is responsible for ensuring that HP's mobility initiatives help enterprises improve communications and interactions with customers, employees, constituents and partners. He also serves as the industry chair for the Advanced Mobility Working group for the American Council for Technology/Industry Advisory Council (ACT/IAC), whose mission is to "foster collaboration and communication on issues regarding mobile computing in the Federal Government.

SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn't mind, please tell us a little bit about your background and your role at HP.

Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP's mobility initiatives successfully help enterprises improve communications and interactions with customers, employees, constituents and partners to ensure they have the data they need, when they need it, and in a format that is easy to interact with and consume. Additionally, I serve as the industry chair for the Advanced Mobility Working group for the American Council for Technology/Industry Advisory Council (ACT/IAC), whose mission is to "foster collaboration and communication on issues regarding mobile computing in the Federal Government, including citizen services, remote connectivity, employee services, workforce productivity, digital publishing, and enterprise mobility."

Prior to joining HP, I spent nearly two decades in both the public and private sectors, focused on emerging technologies and the critical intersections between business strategy and technology. I've worked with several Fortune 200 companies to increase their market presence and effectively leverage their mobile and digital channels. Additionally, I have built interactive teams, worked to guide digital mobile strategies, and led an Innovation Lab focused on accelerating digital interaction models, the convergence of big data analytics with context aware applications, and emerging mobile payments and transaction capabilities.

SecuritySolutionsWatch.com: Society is becoming increasingly mobile. Tethered to our personal devices around the clock, we can work, shop and take care of tasks - anywhere, anytime. But the real question becomes, how do enterprises manage the delicate balance of providing the right information, into the right hands, at the right time?

Bryan Coapstick: Mobile technology and devices are advancing at a rapid pace thanks to widespread adoption across consumer and commercial markets. These solutions provide real-time connectivity and feature content-rich applications that combine several data inputs (both user and environmental) to effectively communicate the situation (or context) of the user. This enables more effective decisions on the what, when, and where around the delivery of information; and how the information is delivered for consumption. This construct enables individuals to make more effective decisions on how to optimize their time and the interaction in order to derive the greatest value. HP's goal is to deliver the right information into the right hands, at the right moment so that the context is optimized, regardless of the form factor.

SecuritySolutionsWatch.com: Mobility has the power, it would seem, to actually define one's brand. And as the old saying goes, you only get one chance to make a first impression. What do you perceive is the value of a mobile strategy in regards to making a positive impact on society in general?

Bryan Coapstick: A successful mobile strategy means connecting people to each other or to the applications and information they need. You begin by focusing on getting a better, more intimate understanding of your customers. I define customers very broadly, as too often people get hung up on B2C, B2B, and B2E. Regardless if they are my employer or my customer, my audience members drive and determine what they think is useful, valuable, and desirable - and that is the cornerstone of any successful mobility strategy. If we focus on the cornerstones of the user experience, there is no limit to the positive impact that can be delivered to society as a whole, whether it is transforming a patient's experience, or helping a mother order dinner on her way home from work.

In reality, there is no business value in an application that is not used. I see mobility as a means to remove the distance barrier between people and bring them closer than ever before. Everyone, regardless of function, needs to focus on the customer experience - evaluating the interaction as the centerpiece in designing their overall mobility strategy. Leading organizations understand that the strategic use of digital technologies enhances their ability to interact directly with customers, employees, and partners alike, and to strengthen those relationships.

Additionally, I think we need to take a lesson from commercial brand managers in developing a strategy for mobility. In the past, brand managers have strived for consistency via the digital experience, with a largely uniform presentation in the marketplace (destination vs. distribution marketing). The organizations' websites house most, if not all, of their content and serve as the one-stop shop for accessing it. This approach to online brand management historically has been possible as long as users can access a brand's online assets through just one platform-the computer (desktop, laptop or netbook) and, even then, through only a handful of operating systems. Now the paradigm has changed, and how people want to consume content, goods, or services has also morphed and may need to be combined with any other number of other pieces of content, goods/services, to deliver a potentially more complete and holistic experience that is optimized for every user. Recognizing the paradigm shift, HP recently launched a unique integrated, end-to-end customer experience ecosystem to enhance its overall application portfolio.

SecuritySolutionsWatch.com: Recently we read your blog The Next-Generation Mobile Enterprise: Rethinking your core DNA. In this piece you wrote, "For an enterprise to gain access to the real advantage of the next generation of end-user computing, it will not only need to rethink how these devices are employed to transform business transactions, but how also it much transform to enable the next-generation mobile enterprise. I often hear people talking about ‘mobilizing applications' and I picture them paving the same road by simply doing a literal translation of their current IT onto mobile devices. It makes me cringe because applications should not be ‘mobilized" - transactions should be ‘mobilized'." Care to elaborate on this comment?

Bryan Coapstick: I touched upon this topic in the previous question when discussing composites and the ability to combine content, goods, and services with additional components in order to deliver the right experience, personalized to the user, within the context they seek. Mobility is an interaction model that centers around fit-to-form computing. Moving applications to mobile requires a lot more than merely taking your web content and pushing it down to be rendered on a mobile device. Too many people are looking at mobility as a bolt-on to their existing strategy (both business and IT), or conversely looking at mobility and as a standalone strategy. Mobility is a component in the broader digital strategy that enables the organization's goals and objectives, which are translated into the applications and infrastructure, fulfill customer needs. HP in fact, recently published a video discussing the rise in mobility as a term we have coined, the ‘People Renaissance'.

SecuritySolutionsWatch.com: Today's cyber environment has never been more challenging with threats on the horizon 24/7 from organized foreign governments to the lone wolf - and they are constantly probing for the weakest link to gain access to networks and data. What is your perspective on security best practices related to mobility that clients should be considering in today's climate?

Bryan Coapstick: From my perspective, network and data security has been broken in several ways, before mobility took hold; mobility merely accelerated the problem. The old adage in security has been to put up a wall around your perimeter and keep making it stronger and stronger by adding more layers of security from the perimeter inward s network, server, PC.

Now, with the advent of mobility, there is no perimeter. It has been extended by definition and, therefore, is more fractured and porous. In a cloud-ready, highly mobile, highly distributed environment, security threat vectors grow exponentially. In the last two to three decades, we have heard about malicious network acts. Often, malicious behavior is only discovered by constantly reviewing what is on your network and re-evaluating what bad is.

Too often, organizations are always reactive and playing catch up. Most forward-thinking enterprises are moving towards risk- or behavior-based detection - what we call ‘Security in Context'. Certain behaviors or activities outside of established individual parameters are deemed suspicious and, therefore, merit greater examination of the types of applications a user is running and the context in which they run these apps (i.e., Financial Transactions systems). To help automate the detection process, HP has developed a continuous monitoring capability that supports this Security in Context approach. In my opinion, security in the future will be delivered "as a Service" through a vendor like HP who can provide a more holistic view that extends from the corporate data center, to the cloud and all the way to the individual device.

SecuritySolutionsWatch.com: Congratulations on HP's recent announcement regarding a mobile application which HP developed for the U.S. Department of Housing and Urban Development (HUD) which will allow "citizens to easily access useful information regarding housing discrimination, file complaints with HUD, and find regional contact information via their iPhone." Can you tell us a little more about this new mobile application and how it benefits the agency and its constituents?

Bryan Coapstick: The Fair Housing Equal Opportunity complaints application enables citizens to report and file a housing discrimination complaint to HUD easily, in real-time. The app is an automated tool that helps ensure that all persons living in the United States are afforded the same rights, laws and protections that prohibit housing discrimination on the basis of race, color, religion, sex, national origin, disability and familial status. HUD sees the app as benefitting fair housing groups and other civil rights advocacy organizations that help individuals pursue their housing rights and for industry, to educate members on their responsibilities.

SecuritySolutionsWatch.com: Are there additional examples of mobility successes within government you'd like to share with us today to underpin the relevancy of how mobility has been used to enhance agency missions and services?

Bryan Coapstick: HP has had numerous customer successes with regards to implementing mobility as a tool to do business with stakeholders. However, the ones that really resonate for me are those that leverage the power of while - the ability to deliver the good or service more effectively while still reducing costs. We developed an app for the city of Anaheim that enabled more effective reporting of 311 types of incidents through geo-location - eliminating time traditionally wasted driving around looking for the service area. Or, our investments in context-aware, real-time location services that leverage sensor technologies within integrated health systems which create more efficient and effective clinical workflows and improved patient care. We talk about these successes and many others in our Mobility in Government-Industry Edge magazine and discuss how HP is effectively helping to transform the delivery of government services through a thoughtful approach to mobility.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Pat Romanski

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Cloud Expo Breaking News
The revolution that happened in the server universe over the past 15 years has resulted in an eco-system that is more open, more democratically innovative and produced better results in technically challenging dimensions like scale. The underpinnings of the revolution were common hardware, standards based APIs (ex. POSIX) and a strict adherence to layering and isolation between applications, daemons and kernel drivers/modules which allowed multiple types of development happen in parallel without hindering others. Put simply, today's server model is built on a consistent x86 platform with few surprises in its core components. A kernel abstracts away the platform, so that applications and daemons are decoupled from the hardware. In contrast, networking equipment is still stuck in the mainframe era. Today, networking equipment is a single appliance, including hardware, OS, applications and user interface come as a monolithic entity from a single vendor. Switching between different vendor'...
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuity, speed, mobility, data access and connectivity are staples of the cloud and always will be. But cloud providers that plan to not only exist tomorrow – but to lead – know that security must be the top priority for the cloud and are delivering it now. In his session at 14th Cloud Expo, Kurt Hagerman, Chief Information Security Officer at FireHost, will detail why and how you can have both infrastructure performance and enterprise-grade security – and what tomorrow's cloud provider will look like.
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and organize their digital life through a brand new cloud service, starting from infrastructure to the users’ interface. A revolution that began from inventing and designing our very own infrastructure: we have created the first server network powered solely by ARM CPU. The microservers have “organism-like” features, differentiating them from any of the current technologies. Benefits include low consumption of energy, making Cynny the ecologically friendly alternative for storage as well as cheaper infrastructure, lower running costs, etc.
Cloud backup and recovery services are critical to safeguarding an organization’s data and ensuring business continuity when technical failures and outages occur. With so many choices, how do you find the right provider for your specific needs? In his session at 14th Cloud Expo, Daniel Jacobson, Technology Manager at BUMI, will outline the key factors including backup configurations, proactive monitoring, data restoration, disaster recovery drills, security, compliance and data center resources. Aside from the technical considerations, the secret sauce in identifying the best vendor is the level of focus, expertise and specialization of their engineering team and support group, and how they monitor your day-to-day backups, provide recommendations, and guide you through restores when necessary.
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud. In her session at 14th Cloud Expo, Courtney Behrens, Senior Marketing Manager at Brother International, will discuss how issues that had previously been out of your control, like performance, advanced administration and compliance, can now be put back behind your firewall.
Cloud scalability and performance should be at the heart of every successful Internet venture. The infrastructure needs to be resilient, flexible, and fast – it’s best not to get caught thinking about architecture until the middle of an emergency, when it's too late. In his interactive, no-holds-barred session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will dive into how to design and build-out the right cloud infrastructure.
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and security architects need to continue to develop a deep understanding about API security and how it differs from traditional web application security or mobile application security. In his session at 14th Cloud Expo, Sachin Agarwal, VP of Product Marketing and Strategy at SOA Software, will walk you through the various aspects of how an API could be potentially exploited. He will discuss the necessary best practices to secure your data and enterprise applications while continue continuing to support your business’s digital initiatives.
You use an agile process; your goal is to make your organization more agile. What about your data infrastructure? The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver on new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for application developers and slow performance for end users. Further, as data sizes grow into the Big Data realm, this problem is exacerbated and becomes even more difficult to address. A seemingly simple schema change can take hours (or more) to perform, and as requirements evolve the disconnect between existing data structures and actual needs diverge.
SYS-CON Events announced today that SherWeb, a long-time leading provider of cloud services and Microsoft's 2013 World Hosting Partner of the Year, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. A worldwide hosted services leader ranking in the prestigious North American Deloitte Technology Fast 500TM, and Microsoft's 2013 World Hosting Partner of the Year, SherWeb provides competitive cloud solutions to businesses and partners around the world. Founded in 1998, SherWeb is a privately owned company headquartered in Quebec, Canada. Its service portfolio includes Microsoft Exchange, SharePoint, Lync, Dynamics CRM and more.
The world of cloud and application development is not just for the hardened developer these days. In their session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, will pull back the curtain of the architecture of a fun demo application purpose-built for the cloud. They will focus on demonstrating how they leveraged compute, storage, messaging, and other cloud elements hosted at SoftLayer to lower the effort and difficulty of putting together a useful application. This will be an active demonstration and review of simple command-line tools and resources, so don’t be afraid if you are not a seasoned developer.
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based BUMI (Backup My Info!) is a premium managed service provider specializing in data backup and recovery. Founded in 2002, the company’s Here, There and Everywhere data backup and recovery solutions are utilized by more than 500 businesses. BUMI clients include professional service organizations such as banking, financial, insurance, accounting, hedge funds and law firms. The company is known for its relentless passion for customer service and support, and has won numerous awards, including Customer Service Provider of the Year and 10 Best Companies to Work For.
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected world, the enterprise needs to leverage the capabilities of the web and be ready to innovate without fear of DDoS attacks, concerns about application security and other threats. Organizations face great risk from increasingly frequent and sophisticated attempts to render web properties unavailable, and steal intellectual property or personally identifiable information. Layered security best practices extend security beyond the data center, delivering DDoS protection and maintaining site performance in the face of fast-changing threats.
From data center to cloud to the network. In his session at 3rd SDDC Expo, Raul Martynek, CEO of Net Access, will identify the challenges facing both data center providers and enterprise IT as they relate to cross-platform automation. He will then provide insight into designing, building, securing and managing the technology as an integrated service offering. Topics covered include: High-density data center design Network (and SDN) integration and automation Cloud (and hosting) infrastructure considerations Monitoring and security Management approaches Self-service and automation
In his session at 14th Cloud Expo, David Holmes, Vice President at OutSystems, will demonstrate the immense power that lives at the intersection of mobile apps and cloud application platforms. Attendees will participate in a live demonstration – an enterprise mobile app will be built and changed before their eyes – on their own devices. David Holmes brings over 20 years of high-tech marketing leadership to OutSystems. Prior to joining OutSystems, he was VP of Global Marketing for Damballa, a leading provider of network security solutions. Previously, he was SVP of Global Marketing for Jacada where his branding and positioning expertise helped drive the company from start-up days to a $55 million initial public offering on Nasdaq.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 14th Cloud Expo, Marc Jones, Vice President of Product Innovation for SoftLayer, will explain how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.