SlideShare a Scribd company logo
CITIZEN
                           INFORMATION
GOVERNMENT
 CONSOLODATION                       TECHNOLOGY



                 WIRELESS
          CITIZEN SAFETY
 BUDGET                              CLOUD COMPUTING

        OPEN
                                     PUBLIC SAFETY
  BIG                       BYOD


                                             SECURITY
  DATA                      VIRTUALIZATION
                            DEVICE
                            MANAGEMENT
INFORMATION IS EVERYWHERE
GLOBAL MOBILE DATA TRAFFIC WILL GROW
NEARLY 100% PER YEAR FROM 2010 TO 20151
INFORMATION IS EVERYWHERE




BUT CAPTURING IT IS JUST THE START
GOVERNMENT NEEDS TO TURN INFORMATION
INTO INTELLIGENCE

70%
OF DEPARTMENTS ARE USING
                           72%
                           WANT TO USE VIDEO AND
SOME FORM OF PREDICTIVE    TEXT MESSAGES PROVIDED
POLICING2                  BY CITIZENS AT THE SCENE2
CHOOSE THE RIGHT BUSINESS MODEL
FOR YOUR ORGANIZATION




CUSTOMER                                                        COMMS
             CONTRACTED    HOSTED     MANAGED    BUILD, OWN,
OWNED                                                           AS A
             SERVICES      SERVICES   SERVICES   OPERATE
MANAGED                                                         SERVICE


 CAPITAL EXPENSE FOCUSED                         OPERATING EXPENSE FOCUSED
4 IN 10 GOVERNMENT LEADERS

PLAN TO INVEST IN
CLOUD SERVICES
OVER THE NEXT
TWO YEARS2

                    MISSION CRITICAL
SIMPLIFY NETWORK AND DEVICE MANAGEMENT


  NETWORK    CONFIGURATION   DEVICE




  SECURITY   PROVISIONING    BILLING




ONE INTEGRATED OPERATIONAL AND MANAGEMENT PORTAL DOES IT ALL
INFORMATION IS VULNERABLE


87%
WORRY
                            89%
                            CONCERNED
CRIMINALS HACK              WITH SECURITY OF
GOVERNMENT                  CONSUMER-GRADE
INFORMATION OVER A          DEVICES WHEN ACCESSING
PUBLIC NETWORK 2            PUBLIC SAFETY NETWORKS2
SECURING CRITICAL INFORMATION
INFORMATION ASSURANCE

CONFIDENTIALITY   INTEGRITY     AVAILABLITY
LEARN HOW TO MEET THE CHALLENGE OF
MANAGING THE COMPLEXITY




KEEP YOUR        MAXIMIZE      OPTIMIZE YOUR
SYSTEMS          YOUR SYSTEM   DEVICE AND
SECURE SO THEY   FROM START    NETWORK
ARE AVAILABLE    TO FINISH     EQUIPMENT
WHEN NEEDED
SOURCES
1.  ttp://images.erepublic.com/documents/CDG12_Trending+Up+Paper.pdf, page 32
   h

2. Motorola Public Safety Data Communications Technology Survey, January-February 2012

More Related Content

PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
PPTX
Cyber war a threat to indias homeland security 2015
PDF
Need for Improved Critical Industrial Infrastructure Protection
PDF
cybersecurity- A.Abutaleb
PDF
IRJET- Cybersecurity: The Agenda for the Decade
PDF
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
PDF
2019 State of Cyber Security Report
PDF
Voices of Vulnerability Disclosure Policy
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cyber war a threat to indias homeland security 2015
Need for Improved Critical Industrial Infrastructure Protection
cybersecurity- A.Abutaleb
IRJET- Cybersecurity: The Agenda for the Decade
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
2019 State of Cyber Security Report
Voices of Vulnerability Disclosure Policy

What's hot (20)

PDF
MARMARA2012_CyberTerror_ElecGrid_OK
PDF
Conférence ENGIE ACSS 2018
PPTX
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
PDF
Cybersecurity for Chemical Industry
PDF
Development of National Cybersecurity Strategy and Organisation
PPT
Cyber Warfare -
PDF
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
PDF
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
PDF
ICS Cyber Security Europe 2015
PDF
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
PDF
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
PDF
Cyber Threats that impact the US Energy Infrastructure
PPTX
Need for Improved Critical Industrial Infrastructure Protection
PDF
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
PDF
FASTRInfographic2017
PPTX
Cyber Security in the Manufacturing Industry: New challenges in the informati...
PDF
Malaysia's National Cyber Security Policy
PPTX
National Cyber Security Policy-2013
PDF
Border security: a physical and digital challenge
PDF
40 under 40 in cybersecurity. top cyber news magazine
MARMARA2012_CyberTerror_ElecGrid_OK
Conférence ENGIE ACSS 2018
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
Cybersecurity for Chemical Industry
Development of National Cybersecurity Strategy and Organisation
Cyber Warfare -
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
ICS Cyber Security Europe 2015
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Cyber Threats that impact the US Energy Infrastructure
Need for Improved Critical Industrial Infrastructure Protection
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
FASTRInfographic2017
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Malaysia's National Cyber Security Policy
National Cyber Security Policy-2013
Border security: a physical and digital challenge
40 under 40 in cybersecurity. top cyber news magazine
Ad

Similar to Manage the Complexity (20)

PPTX
Sw keynote
PDF
IT Security Trends 2013
PDF
SYMCAnnual
PPT
Opening Keynote and Welcome
PDF
Motorola Solutions: Using Your Data to Create Safer Cities
PDF
SYMCInvestorPresentationDec2008II
PDF
SYMCInvestorPresentationDec2008II
PDF
RSA 2012 Presentation: Information Protection
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PDF
Barclaycard Payment Security Newsletter Jan11
PPTX
Technology Forecast 2013: What State and Local Government Technology Programs...
PDF
The global cyber security market
PDF
IBM zEnterprise: Government
PDF
Etude sur le marché de la cyber sécurité (2011)
PPTX
State of Cities & Counties 2012
PDF
Hawaii Pacific GIS Conference 2012: Plenary Session Keynote - Next Generation...
PPTX
Securing Mobile - A Business Centric Approach
PDF
Enterprise Strategy for Cloud Security
PPTX
Big data security the perfect storm
PDF
Opening up government
Sw keynote
IT Security Trends 2013
SYMCAnnual
Opening Keynote and Welcome
Motorola Solutions: Using Your Data to Create Safer Cities
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
RSA 2012 Presentation: Information Protection
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Barclaycard Payment Security Newsletter Jan11
Technology Forecast 2013: What State and Local Government Technology Programs...
The global cyber security market
IBM zEnterprise: Government
Etude sur le marché de la cyber sécurité (2011)
State of Cities & Counties 2012
Hawaii Pacific GIS Conference 2012: Plenary Session Keynote - Next Generation...
Securing Mobile - A Business Centric Approach
Enterprise Strategy for Cloud Security
Big data security the perfect storm
Opening up government
Ad

More from Motorola Solutions (7)

PPTX
Critical Infrastructure and Cyber Threat
PPTX
RESPONDING TO THE NEW COMMUNICATIONS REALITY
PPTX
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
PDF
Proceed with Intelligence: The Street Never Stands Still
PPTX
Motorola APX Accessory Audio Demo
PPT
Case Study: Motorola Brings Rural Broadband to Nova Scotia
PPTX
3 Steps to Safely Bringing Your Own Devices (BYOD)
Critical Infrastructure and Cyber Threat
RESPONDING TO THE NEW COMMUNICATIONS REALITY
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Proceed with Intelligence: The Street Never Stands Still
Motorola APX Accessory Audio Demo
Case Study: Motorola Brings Rural Broadband to Nova Scotia
3 Steps to Safely Bringing Your Own Devices (BYOD)

Manage the Complexity

  • 1. CITIZEN INFORMATION GOVERNMENT CONSOLODATION TECHNOLOGY WIRELESS CITIZEN SAFETY BUDGET CLOUD COMPUTING OPEN PUBLIC SAFETY BIG BYOD SECURITY DATA VIRTUALIZATION DEVICE MANAGEMENT
  • 2. INFORMATION IS EVERYWHERE GLOBAL MOBILE DATA TRAFFIC WILL GROW NEARLY 100% PER YEAR FROM 2010 TO 20151
  • 3. INFORMATION IS EVERYWHERE BUT CAPTURING IT IS JUST THE START
  • 4. GOVERNMENT NEEDS TO TURN INFORMATION INTO INTELLIGENCE 70% OF DEPARTMENTS ARE USING 72% WANT TO USE VIDEO AND SOME FORM OF PREDICTIVE TEXT MESSAGES PROVIDED POLICING2 BY CITIZENS AT THE SCENE2
  • 5. CHOOSE THE RIGHT BUSINESS MODEL FOR YOUR ORGANIZATION CUSTOMER COMMS CONTRACTED HOSTED MANAGED BUILD, OWN, OWNED AS A SERVICES SERVICES SERVICES OPERATE MANAGED SERVICE CAPITAL EXPENSE FOCUSED OPERATING EXPENSE FOCUSED
  • 6. 4 IN 10 GOVERNMENT LEADERS PLAN TO INVEST IN CLOUD SERVICES OVER THE NEXT TWO YEARS2 MISSION CRITICAL
  • 7. SIMPLIFY NETWORK AND DEVICE MANAGEMENT NETWORK CONFIGURATION DEVICE SECURITY PROVISIONING BILLING ONE INTEGRATED OPERATIONAL AND MANAGEMENT PORTAL DOES IT ALL
  • 8. INFORMATION IS VULNERABLE 87% WORRY 89% CONCERNED CRIMINALS HACK WITH SECURITY OF GOVERNMENT CONSUMER-GRADE INFORMATION OVER A DEVICES WHEN ACCESSING PUBLIC NETWORK 2 PUBLIC SAFETY NETWORKS2
  • 9. SECURING CRITICAL INFORMATION INFORMATION ASSURANCE CONFIDENTIALITY INTEGRITY AVAILABLITY
  • 10. LEARN HOW TO MEET THE CHALLENGE OF MANAGING THE COMPLEXITY KEEP YOUR MAXIMIZE OPTIMIZE YOUR SYSTEMS YOUR SYSTEM DEVICE AND SECURE SO THEY FROM START NETWORK ARE AVAILABLE TO FINISH EQUIPMENT WHEN NEEDED
  • 11. SOURCES 1. ttp://images.erepublic.com/documents/CDG12_Trending+Up+Paper.pdf, page 32 h 2. Motorola Public Safety Data Communications Technology Survey, January-February 2012