Digital trust: The currency of the digital enterprise
Optimize and transform your IT environment in becoming a digital enterprise
CA World 2017 crackled with energy! If you weren’t able to join us, I want to share one of the most critical discussions we had: how you can establish digital trust and become a digital enterprise.
Trust is hot right now. Rachel Botsman, a leading thinker in the field, defines trust as “a confident relationship with the unknown”. As she describes, for a long time trust flowed upwards, to CEO’s and experts and established companies. But today, trust flows sideways, distributed between friends and peers and other informal networks.
The success of your business, then, depends on the level of digital trust consumers have in your digital enterprise. You cannot assume that if you had that trust “flowing down” in the past, that you’ll have it in the “sideways” future. In today’s marketplace, composed of billions of connected devices and users, digital trust is the primary currency of the digital enterprise.
The best news for many companies is the simple fact that digital enterprises are made, not born. Don’t worry if you have mission-critical legacy applications or only have one foot in the cloud. That is irrelevant. By using digital technologies such as mobile, social, web, artificial intelligence (AI), and the Internet of things (IOT), you can optimize your existing business as well as transform your technological profile to capture new growth.
Optimizing and transforming your business to become a digital enterprise involves prioritizing around six key objectives: ensure resources, assure systems, deliver a digital experience, verify people, protect data, and establish digital trust.
First, to ensure resources, you need to optimize the platform on which your business operates. This includes optimizing capacity, leveraging specialty engines, and standardizing your software, which we’ve found yields $1.4M on average in license savings.
Second, it is critical to assure your systems by leveraging the self-driving datacenter. This involves managing service level agreements (SLAs) and addressing skill needs by:
We were delighted to have Southwest Gas join us at CA World to explain how our Mainframe Operational Intelligence solution transformed IT operations. Southwest Gas, which provides natural gas to two million customers, had difficulty with a high number of false positive alerts. Consequently, they were wasting time and resources investigating useless alarms. The company came to CA with the desire to be alerted proactively when key system metrics started to trend out of the norm.
Now, CA proactively and efficiently manages Southwest Gas’ production environment by predicting problems and remediating them swiftly through machine learning. IT efficiency at the company has increased due to faster problem triage and a reduced mean time to resolution. The skills gap has been addressed by leveraging a modernized interface and an intelligent and interactive dashboard.
The third component to creating a digital enterprise is to deliver applications via an agile-driven DevSecOps toolchain. To deliver your mission critical applications at cloud speed, you need to:
HSBC is one customer who is doing exactly that. Using CA Endevor Software Change Manager to configure a fully-automated CI/CD pipeline, HSBC has moved to weekly release cycles with 2,000 deployments per month. The results are truly staggering – HSBC manages over 6 million artifacts, has 6,000+ developers, and is making 750k element changes per year.
To drive a consistent, cloud-like experience on a DevSecOps foundation, Project BrightSide helps developers access the mainframe just like they would any other platform, be it mobile, cloud or distributed. So, in the same way a developer creates an S3 service on AWS or a language analytics service on IBM Bluemix, developers can now provision a CICS region, create a database instance, connect a Spark service, or create a Blockchain sandbox. They can reuse a wide variety of commercial as well as open source tools. Everything can be done in seconds, without developers leaving their desktop or learning mainframe specialized skills and concepts.
Fourth in the journey to become a digital enterprise is the need to verify people through identity-centric security. This involves implementing multi-factor advanced authentication and identity management, and reducing risk by employing trusted-user management. By doing so, you can verify all access to critical assets and resources and reduce insider threats.
The fifth component in the digital enterprise evolution is protecting data through data-centric security and compliance. This requires the ability to:
Finally, a digital enterprise establishes digital trust at scale by leveraging pervasive encryption and blockchain. According to IDC, by 2021, almost one-third of major banks, manufacturers, retailers and healthcare companies will be using blockchain for digital trust at scale. At CA, we have worked closely with IBM and the Linux Foundation on blockchain in the Hyperledger project, which has the power to revolutionized industries. We are focusing our energy and efforts to:
VISA is a great example of a company which has evolved to become a powerful digital enterprise. As the largest retail electronics payment network in the world, they have 3B cards and millions of users, processing 17k transactions per second.
VISA optimized and transformed their existing infrastructure, including mainframe. Not only are they making revenue on every transaction, but they are also benefiting from the data and insights about their users. The last time their systems were down was 22 years ago.
The main message I want to transmit to you from CA World is this: you can deliver digital trust and become a digital enterprise. You can optimize and transform your IT environment to achieve every objective. Now is the time to ensure that your systems work anytime and anywhere, protecting all users and data and delivering experiences that will rock your customers’ world.
 CA Core Systems Consulting Program Analysis