digital process management
TRANSCRIPT
Digital Process Management
!!
Dynamic Control of Business Transac4ons
Dynamically Controlling Business Transac6ons
• We deliver systems that gives you dynamic control of business transac4ons on the Internet.
• By dynamically controlling business transac4ons, you can secure & manage your applica4ons, systems & informa4on assets on the Internet in real 4me.
Why Manage & Secure Business Transac6ons?
• Good business transac4ons generate revenue • Bad business transac4ons destroy revenue caused by:
1. Security Viola6ons
2. Incorrect Opera6ons
3. Regulatory and Financial Non-‐Compliance
4. Low Performance
Decision-‐Zone Systems Delivery 1. Real Time cyber security protec4on system (process firewall)
for detec4ng anomalous events on the internet with root cause.
2. Real Time cyber security retalia4on system for responding to anomalous event.
3. Real 4me performance management system for detec4ng SLA (Service Level Agreement) viola4ons
4. Real 4me opera4ons or marke4ng system for detec4ng anomalous behaviors or customer trends
5. Real 4me anomaly dashboard portal for opera4ons and management strategic analysis
6. Discovery system that validates enterprise processes or unusual processes running on the internet.
Decision-‐Zone Consul6ng Services
1. Business Process Iden4fica4on Services
2. System Integra4on Services
3. SoQware Design & Implementa4on Services
4. Deployment and Support Services
Cost Comparisons IBM$STATIC$CONTROL$ DZT$DYNAMIC$CONTROL$
Sta4c control solu4ons do not provide applica4on, systems and informa4on asset protec4on
IBM Technology Comparisons
Cyber Security & Management Requirements
• Cyber security solu4ons must provide you with the ability to dynamically control business transac1ons on the internet.
• Management solu4ons must provide you with the ability to dynamically control business transac1ons on the internet.
Cyber Security & Management Solu6ons
• DPM soQware (dzShield) gives you the dynamic control for securing and managing business transac4ons on the internet. US Patent 7908160
DPM Provides Maximum Cyber Security
USER AUTHENTICATION
SYSTEM
ACCESS ALLLOWED FOR THE RIGHT USER PASSWORD
PROCESS AUTHENTICATION
SYSTEM
ACCESS ALLOWED FOR ONLY RIGHT PROCESS COMBINATIONS
DATA MINING NO AUTHENTICATION
SYSTEM ACCESSED
MATCHES ALL WRONG PROCESS COMBINATIONS TO
IDENTIFY BREACHES
DIGITAL PROCESS MANAGEMENT
The Problem
• We have lost the control of business transac6ons on the Internet.
• Current user authen4ca4on/single sign-‐on technologies/methods are INEFFECTIVE in defea4ng cyber security intrusions in systems and applica4ons.
• Current data mining technologies/methodologies provide only limited sta4c views for managing business transac4ons on the internet.
Business Transac6ons -‐ Introduc6on
• Business Processes handle business transac6ons
• The lifecycle of a business transac6on is controlled by the state of the process and events.
• The events represent informa1on exchange between systems.
• The states determine when the exchange should take place
How our DPM Technology Controls Business Transac6ons on the Internet?
• We use your business process defini6ons as a guide to
determine if previous linkages EXIST with the current business transac4on on the internet.
• Bad Business Transac4ons are ad hoc Transac6ons without Linkages. “Think Combina4on Locks”
• Causal Inference Engines can automa4cally Detect Bad Transac4ons.
• Causal Inference Engines gives DPM the ability to control business transac4ons on the internet.
Thank You Rajeev Bhargava
rb@decision-‐zone.com 647-‐6280-‐300
Internet