SlideShare a Scribd company logo
Technology Evaluation Centers
Does the security of your business data
keep you up at night? Rest easy in the
cloud
Jorge García, Principal Analyst
www.technologyevaluation.com
Manufacturing Business Technology, January 2016
About Security
Technology Evaluation Centers
“Distrust and caution are the
parents of security.”
—Benjamin Franklin
Benjamin Franklin. (Courtesy of the U.S Library of
Congress)
A Very Brief Intro
Manufacturers are under constant
pressure to:
• Increase data/information
accuracy
• Increase production/business
process speed
• Capitalize this internal
intelligence and knowledge to
increase productivity of the
complete manufacturing process
• Make every supplier, distributor,
and service interaction optimal
Technology Evaluation Centers
Down in the Factory, Mike Knlec
Licensed under Creative Commons
A Very Brief Intro
Implementing cloud-based strategies can give manufacturing
companies a way to ease these pressures by enabling access to
systems that are faster to deploy, easier to customize, and, for the
short term, come at a lower cost.
Technology Evaluation Centers
The Value of the Cloud
Technology Evaluation Centers
“If you think you’ve seen this movie before, you are right. Cloud computing is
based on the time-sharing model we leveraged years ago before we could afford
our own computers…
…The idea is to share computing power among many companies and people,
thereby reducing the cost of that computing power to those who leverage it. The
value of time share and the core value of cloud computing are pretty much the
same, only the resources these days are much better and more cost effective.”
– David Linthicum, Cloud Computing speaker and influencer
Cloud Is a Real Trend
Technology Evaluation Centers
• The majority of manufacturers worldwide are currently using public (66%) or
private cloud (68%) for more than two applications.
• 61.6% indicated their company's posture for net new IT services is "cloud
also", and the number is only slightly lower for replacing IT existing
functionality (56.8%).
• IT operations are the primary benefactor today from manufacturers' cloud
strategy, and only 30–35% of respondents indicate operations, supply chain
and logistics, sales, or engineering expect to benefit.
• Cloud services and cloud architecture's share of the annual IT budget
allocation is going to increase 27% in the next two years for manufacturing.
• Cloud computing will become the de facto standard for new operations
(through organic or acquired growth) over the next 10 years for manufacturers
that want to operate and serve customers globally.
IDC study: Worldwide Cloud Adoption in the Manufacturing Industry, 2015
Why the Cloud?
Manufacturers are using the cloud for:
• Deploying cloud-based and two-tier ERP strategies
• Accelerating new product development and production
• Optimizing marketing automation applications
• Integrating and designing connected and embedded services
• Developing and launching supplier, customer, and collaboration portals
• Automating customer service and support
• Deploying cloud-based human resource management (HRM) systems
• Deploying and applying company-wide business intelligence and analytics
initiatives
Technology Evaluation Centers
Main Benefits and Concerns
Technology Evaluation Centers
Benefits Concerns
Cost Savings Cloud Security
Reduced Implementation Time Location of Data
Dynamic Scalability Shared Data Services
Security: On-premises vs Cloud
Technology Evaluation Centers
“ According to 53 percent of our survey respondents, data loss and privacy
risks are the most significant challenges of doing business in the cloud,
followed by intellectual property theft, which was cited as challenging or
extremely challenging. ”
Elevating Business in the Cloud Report, KPMG, 2014
Security: On-premises vs Cloud
Technology Evaluation Centers
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
Many factors have to do with security:
• The typical size of a customer/user in each
environment
• The types of workloads found in each
environment
• The diversity of each environment
• The presence of user end-points in the on-
premises environments
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
“Individual customer
environments skew to a smaller
and simpler footprint as measured
by a number of nodes and
applications, and breadth of
operating systems.
In contrast, on-premises
environments managed by the
typical enterprise span a much
broader array of endpoints,
applications and operating
systems.”
Removing the Cloud of Insecurity
Alert Logic
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
Service provider environments tend to experience a narrower range of attack vectors.
“It’s not that the cloud is inherently secure or insecure. It’s really about the quality
of management applied to any IT environment.”
Removing the Cloud of Insecurity, Alert Logic
• More standardized system
configurations
• Narrower range of use cases among
service provider customers
• Relative maturity of the IaaS industry.
Security: On-premises vs Cloud
Technology Evaluation Centers
Myth Reality
On-premises infrastructures are more
secure because they reside on-site
Most breaches are inside jobs, and a
cloud system can actually offer greater
protection from inside and outside
threats
Servers that are physically accessible are
better protected from viruses
Cloud providers can deploy a fully tested
virus response for all customers rapidly
and efficiently, without your IT staff’s
help
On-premises data centers are more
reliable, as we can solve all issues
internally
Cloud data centers are better equipped to
guarantee continuous operation, and
experience fewer service disruptions
On-premises data centers are more
reliable when it comes to data storage and
backup
Cloud data centers are better equipped to
guarantee data storage and backup of
critical information
Security: On-premises vs Cloud
Technology Evaluation Centers
Additional security advantages of the
cloud:
• Embedded multifactor authentication
• Automated/scheduled security
patching
• Stronger physical security
• Security certifications
• The cloud offers economies of scale
Looking for Balance
Technology Evaluation Centers
“ According to 53% of our survey
respondents, data loss and privacy
risks are the most significant
challenges of doing business in the
cloud, followed by intellectual
property theft, which was cited as
challenging or extremely challenging.”
“Executives feel implementing the
cloud has helped them improve:
• Business performance (73%)
• Improve levels of service
automation (72%)
• Reduce costs (70%)
• Rapidly deploy new solutions
(67%)
Source: Elevating Business in the Cloud Report, KPMG
Cloud adoption is a balancing act:
Cloud Security: Options and Variety
Technology Evaluation Centers
Cloud Security: Options and Variety
Technology Evaluation Centers
Image Source: https://www.simple-talk.com/cloud/development/a-comprehensive-introduction-to-cloud-computing/
- Management
- Cost
- IT Involvement
Cloud Security: A Call to Action
Technology Evaluation Centers
Secure cloud adoption?
A high-level roadmap to implement security best practices consists
of the following phases:
Conduct a full
risk assessment
Secure your
own
information
and identities
Implement a
strong
governance
framework
Before contracting with a cloud provider
Technology Evaluation Centers
Full risk assessment
• Interoperability and portability
• Compliance
• Vendor risk
• Supply chain and ecosystem
• Infrastructure and operations quality
Securing your own
information
• Authentication
• Encryption
• Endpoint security
Implement a strong
governance
framework
• Ensure your provider uses secure data and event
management strategies
• Monitor your own log files for devices you control
• Stipulate in your contracts that SLAs are paired with your
defined metrics and standards
• Centralize within your organization responsibility for
selecting and working with cloud providers
• Plan contingencies for what happens when a breach occurs
or a provider fails.
• Use the Security Content Automation Protocols to verify
that your providers are using the secure configurations you
defined in your risk assessment
Cloud Security: A Call to Action
Technology Evaluation Centers
Technology Evaluation Centers
Thank you!
jgarcia@tec-centers.com
@jgptec
Why the Cloud?
Technology Evaluation Centers
Credits and Links:
• The U.S Library of Congress, http://www.loc.gov/
• Image: Down in the Factory, Mike Knlec. https://goo.gl/6JXLZm licensed under Creative Commons,
https://creativecommons.org/licenses/by/2.0/
• Alert Logic Cloud Security Report, Spring 2012 https://www.rackspace.com/knowledge_center/whitepaper/alert-logic-state-of-
cloud-security-report-spring-2012
• A comprehensive Introduction to Cloud Computing, https://www.simple-talk.com/cloud/development/a-comprehensive-
introduction-to-cloud-computing/
• KPMG, Cloud Survey Report, Elevating Business in the Cloud Report, 2014.
http://www.kpmg.com/US/en/about/alliances/Documents/2014-kpmg-cloud-survey-report.pdf
• TEC 2015 Cloud BI and Analytics Buyer's Guide, http://www.technologyevaluation.com/research/TEC-buyers-guide/TEC-
2015-Cloud-BI-and-Analytics-Buyer-s-Guide.html
• IDC study, Worldwide Cloud Adoption in the Manufacturing Industry, 2015,
https://www.idc.com/getdoc.jsp?containerId=prUS25558515

More Related Content

PPTX
Revealing the State of Network Configuration Management & Automation in the E...
PPSX
Reddix Group - Quantum AI - Presentation
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
PPTX
Migrating to the Cloud – Is Application Performance Monitoring still required?
PPTX
Security Operation Center - Design & Build
PPTX
Cloud is not an option, but is security?
PPTX
Microsoft Cloud
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
Revealing the State of Network Configuration Management & Automation in the E...
Reddix Group - Quantum AI - Presentation
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
Migrating to the Cloud – Is Application Performance Monitoring still required?
Security Operation Center - Design & Build
Cloud is not an option, but is security?
Microsoft Cloud
MT81 Keys to Successful Enterprise IoT Initiatives

What's hot (20)

PDF
Webinar - Feel Secure with revolutionary OTM Solution
PPTX
Lorraine Morgan: Factors affecting the adoption of cloud computing
PPTX
4.5.cloud security
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
PDF
MT82 IoT Security Starts at Edge
PDF
MT50 Data is the new currency: Protect it!
PPT
Cloud computing adoption in sap technologies
PDF
Cloud Perspectives - Ottawa Seminar - Oct 6
PDF
Brighttalk understanding the promise of sde - final
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Optimizing Identity Governance using Perseus IAM
PPTX
Stay out of headlines for non compliance or data breach
PDF
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
PDF
Security issue in Cloud computing
PDF
Risk management for cloud computing hb final
PPTX
CCSK Certificate of Cloud Computing Knowledge - overview
PPTX
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
PDF
IT Service & Asset Management Better Together
PPTX
Cloud computing Risk management
Webinar - Feel Secure with revolutionary OTM Solution
Lorraine Morgan: Factors affecting the adoption of cloud computing
4.5.cloud security
Securing your IT infrastructure with SOC-NOC collaboration TWP
MT82 IoT Security Starts at Edge
MT50 Data is the new currency: Protect it!
Cloud computing adoption in sap technologies
Cloud Perspectives - Ottawa Seminar - Oct 6
Brighttalk understanding the promise of sde - final
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Optimizing Identity Governance using Perseus IAM
Stay out of headlines for non compliance or data breach
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Security issue in Cloud computing
Risk management for cloud computing hb final
CCSK Certificate of Cloud Computing Knowledge - overview
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
IT Service & Asset Management Better Together
Cloud computing Risk management
Ad

Similar to MBT Webinar: Does the security of your business data keep you up at night? (20)

PPTX
Cloud security and cloud adoption public
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PDF
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
PDF
EMEA10: Trepidation in Moving to the Cloud
PDF
Cloud computing for SMBs
PDF
The benefits of cloud technology for remote working
PDF
The benefits of cloud technology for remote working
POT
Automation alley day in the cloud presentation - formatted
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
PDF
More cloud less fluff
PDF
How Secure Is Cloud
PDF
Cloud Security: Perception VS Reality
PDF
Cloud Adoption in Capital Markets: A Perspective
PDF
Myths About Cloud Computing
PPTX
Cloud securityperspectives cmg
PPTX
The Cloud Challenge
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PDF
Data Privacy And Security Issues In Cloud Computing.pdf
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Cloud security and cloud adoption public
Effectively and Securely Using the Cloud Computing Paradigm
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
EMEA10: Trepidation in Moving to the Cloud
Cloud computing for SMBs
The benefits of cloud technology for remote working
The benefits of cloud technology for remote working
Automation alley day in the cloud presentation - formatted
Cloud computing - Assessing the Security Risks - Jared Carstensen
More cloud less fluff
How Secure Is Cloud
Cloud Security: Perception VS Reality
Cloud Adoption in Capital Markets: A Perspective
Myths About Cloud Computing
Cloud securityperspectives cmg
The Cloud Challenge
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Data Privacy And Security Issues In Cloud Computing.pdf
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Advanced IT Governance
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced Soft Computing BINUS July 2025.pdf
Advanced IT Governance
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf

MBT Webinar: Does the security of your business data keep you up at night?

  • 1. Technology Evaluation Centers Does the security of your business data keep you up at night? Rest easy in the cloud Jorge García, Principal Analyst www.technologyevaluation.com Manufacturing Business Technology, January 2016
  • 2. About Security Technology Evaluation Centers “Distrust and caution are the parents of security.” —Benjamin Franklin Benjamin Franklin. (Courtesy of the U.S Library of Congress)
  • 3. A Very Brief Intro Manufacturers are under constant pressure to: • Increase data/information accuracy • Increase production/business process speed • Capitalize this internal intelligence and knowledge to increase productivity of the complete manufacturing process • Make every supplier, distributor, and service interaction optimal Technology Evaluation Centers Down in the Factory, Mike Knlec Licensed under Creative Commons
  • 4. A Very Brief Intro Implementing cloud-based strategies can give manufacturing companies a way to ease these pressures by enabling access to systems that are faster to deploy, easier to customize, and, for the short term, come at a lower cost. Technology Evaluation Centers
  • 5. The Value of the Cloud Technology Evaluation Centers “If you think you’ve seen this movie before, you are right. Cloud computing is based on the time-sharing model we leveraged years ago before we could afford our own computers… …The idea is to share computing power among many companies and people, thereby reducing the cost of that computing power to those who leverage it. The value of time share and the core value of cloud computing are pretty much the same, only the resources these days are much better and more cost effective.” – David Linthicum, Cloud Computing speaker and influencer
  • 6. Cloud Is a Real Trend Technology Evaluation Centers • The majority of manufacturers worldwide are currently using public (66%) or private cloud (68%) for more than two applications. • 61.6% indicated their company's posture for net new IT services is "cloud also", and the number is only slightly lower for replacing IT existing functionality (56.8%). • IT operations are the primary benefactor today from manufacturers' cloud strategy, and only 30–35% of respondents indicate operations, supply chain and logistics, sales, or engineering expect to benefit. • Cloud services and cloud architecture's share of the annual IT budget allocation is going to increase 27% in the next two years for manufacturing. • Cloud computing will become the de facto standard for new operations (through organic or acquired growth) over the next 10 years for manufacturers that want to operate and serve customers globally. IDC study: Worldwide Cloud Adoption in the Manufacturing Industry, 2015
  • 7. Why the Cloud? Manufacturers are using the cloud for: • Deploying cloud-based and two-tier ERP strategies • Accelerating new product development and production • Optimizing marketing automation applications • Integrating and designing connected and embedded services • Developing and launching supplier, customer, and collaboration portals • Automating customer service and support • Deploying cloud-based human resource management (HRM) systems • Deploying and applying company-wide business intelligence and analytics initiatives Technology Evaluation Centers
  • 8. Main Benefits and Concerns Technology Evaluation Centers Benefits Concerns Cost Savings Cloud Security Reduced Implementation Time Location of Data Dynamic Scalability Shared Data Services
  • 9. Security: On-premises vs Cloud Technology Evaluation Centers “ According to 53 percent of our survey respondents, data loss and privacy risks are the most significant challenges of doing business in the cloud, followed by intellectual property theft, which was cited as challenging or extremely challenging. ” Elevating Business in the Cloud Report, KPMG, 2014
  • 10. Security: On-premises vs Cloud Technology Evaluation Centers
  • 11. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012.
  • 12. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012. Many factors have to do with security: • The typical size of a customer/user in each environment • The types of workloads found in each environment • The diversity of each environment • The presence of user end-points in the on- premises environments
  • 13. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012. “Individual customer environments skew to a smaller and simpler footprint as measured by a number of nodes and applications, and breadth of operating systems. In contrast, on-premises environments managed by the typical enterprise span a much broader array of endpoints, applications and operating systems.” Removing the Cloud of Insecurity Alert Logic
  • 14. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012. Service provider environments tend to experience a narrower range of attack vectors. “It’s not that the cloud is inherently secure or insecure. It’s really about the quality of management applied to any IT environment.” Removing the Cloud of Insecurity, Alert Logic • More standardized system configurations • Narrower range of use cases among service provider customers • Relative maturity of the IaaS industry.
  • 15. Security: On-premises vs Cloud Technology Evaluation Centers Myth Reality On-premises infrastructures are more secure because they reside on-site Most breaches are inside jobs, and a cloud system can actually offer greater protection from inside and outside threats Servers that are physically accessible are better protected from viruses Cloud providers can deploy a fully tested virus response for all customers rapidly and efficiently, without your IT staff’s help On-premises data centers are more reliable, as we can solve all issues internally Cloud data centers are better equipped to guarantee continuous operation, and experience fewer service disruptions On-premises data centers are more reliable when it comes to data storage and backup Cloud data centers are better equipped to guarantee data storage and backup of critical information
  • 16. Security: On-premises vs Cloud Technology Evaluation Centers Additional security advantages of the cloud: • Embedded multifactor authentication • Automated/scheduled security patching • Stronger physical security • Security certifications • The cloud offers economies of scale
  • 17. Looking for Balance Technology Evaluation Centers “ According to 53% of our survey respondents, data loss and privacy risks are the most significant challenges of doing business in the cloud, followed by intellectual property theft, which was cited as challenging or extremely challenging.” “Executives feel implementing the cloud has helped them improve: • Business performance (73%) • Improve levels of service automation (72%) • Reduce costs (70%) • Rapidly deploy new solutions (67%) Source: Elevating Business in the Cloud Report, KPMG Cloud adoption is a balancing act:
  • 18. Cloud Security: Options and Variety Technology Evaluation Centers
  • 19. Cloud Security: Options and Variety Technology Evaluation Centers Image Source: https://www.simple-talk.com/cloud/development/a-comprehensive-introduction-to-cloud-computing/ - Management - Cost - IT Involvement
  • 20. Cloud Security: A Call to Action Technology Evaluation Centers Secure cloud adoption? A high-level roadmap to implement security best practices consists of the following phases: Conduct a full risk assessment Secure your own information and identities Implement a strong governance framework
  • 21. Before contracting with a cloud provider Technology Evaluation Centers Full risk assessment • Interoperability and portability • Compliance • Vendor risk • Supply chain and ecosystem • Infrastructure and operations quality Securing your own information • Authentication • Encryption • Endpoint security Implement a strong governance framework • Ensure your provider uses secure data and event management strategies • Monitor your own log files for devices you control • Stipulate in your contracts that SLAs are paired with your defined metrics and standards • Centralize within your organization responsibility for selecting and working with cloud providers • Plan contingencies for what happens when a breach occurs or a provider fails. • Use the Security Content Automation Protocols to verify that your providers are using the secure configurations you defined in your risk assessment
  • 22. Cloud Security: A Call to Action Technology Evaluation Centers
  • 23. Technology Evaluation Centers Thank you! jgarcia@tec-centers.com @jgptec
  • 24. Why the Cloud? Technology Evaluation Centers Credits and Links: • The U.S Library of Congress, http://www.loc.gov/ • Image: Down in the Factory, Mike Knlec. https://goo.gl/6JXLZm licensed under Creative Commons, https://creativecommons.org/licenses/by/2.0/ • Alert Logic Cloud Security Report, Spring 2012 https://www.rackspace.com/knowledge_center/whitepaper/alert-logic-state-of- cloud-security-report-spring-2012 • A comprehensive Introduction to Cloud Computing, https://www.simple-talk.com/cloud/development/a-comprehensive- introduction-to-cloud-computing/ • KPMG, Cloud Survey Report, Elevating Business in the Cloud Report, 2014. http://www.kpmg.com/US/en/about/alliances/Documents/2014-kpmg-cloud-survey-report.pdf • TEC 2015 Cloud BI and Analytics Buyer's Guide, http://www.technologyevaluation.com/research/TEC-buyers-guide/TEC- 2015-Cloud-BI-and-Analytics-Buyer-s-Guide.html • IDC study, Worldwide Cloud Adoption in the Manufacturing Industry, 2015, https://www.idc.com/getdoc.jsp?containerId=prUS25558515