1 / 40

Visions for eGovernment: Anything is Possible!

Visions for eGovernment: Anything is Possible!. Ken F. Fitzpatrick General Manager, Global Marketing Computer Associates International, Inc. CA At-A-Glance. Founded in 1976 18,000 dedicated employees 50+ worldwide development centers One of world’s largest ISVs

jada
Download Presentation

Visions for eGovernment: Anything is Possible!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Visions for eGovernment:Anything is Possible! Ken F. FitzpatrickGeneral Manager, Global MarketingComputer Associates International, Inc.

  2. CA At-A-Glance • Founded in 1976 • 18,000 dedicated employees • 50+ worldwide development centers • One of world’s largest ISVs • 99% of Fortune 500 use our solutions • Successful ISO9002 Quality Initiative • Numerous corporate and industry awards

  3. eBusiness Trends • First Generation of eBusiness • Entrepreneurial • Websites • Next Generation Of eBusiness • Moving mainstream • Connects all constituents • New business models • Business process integration • Cross-enterprise interactions • Customer-centric

  4. Enterprise Trends

  5. WW Web Presence and eCommerce Exploding Source: IDC, 2000

  6. eCommerce Driving New eBusiness Models In 2004, 7% of WW transactions will be on-line.* Source: IDC, Gartner*, 2000

  7. eBusiness Decisions Becoming Business Decisions Source: IDC, 2000

  8. eBusiness Trends Drive eGovernment

  9. eGovernment IT Challenges • Every system is different • Expertise is limited & expensive • Budget constraints • Citizen expectations –Tax filing • Security/Privacy • Regulations

  10. HIPAA ( the Health Insurance Portability and Accountability Act) • Administrative Simplification • An estimated 26% of Health Care spending is for Administrative Overhead • An estimated 11% of Health Care expenses are Fraudulent • Reduce Overhead and Fraud • Privacy and Security • Protect Individually Identifiable Health Care Information • Promote Patient Rights • Protect and Secure Electronic Transactions

  11. Electronic Signatures in Global and National Commerce Act (E-SIGN) • Emerging U.S. and State Electronic and Digital Signature legal framework • Legislative activity in all 50 states

  12. TRANSFORMATION & INTEGRATION ENTERPRISE MANAGEMENT PORTAL & KNOWLEDGE MANAGEMENT PREDICTIVE ANALYSIS & VISUALIZATION SECURITY STORAGE eGovernment Focus • Process Management • Information Management • Infrastructure Management “The Software that Manages eGovernment”

  13. eGovernment Process Management • Manages government processes within/across extended organizations • Intelligence & predictive analysis • Visualization & workflow • Change management • Monitoring • End-to-end eGovernment integration • G2C • G2B • G2G

  14. eGovernment Process Management Vision • Citizens are impressed by the speed in which their government business is transacted. • Budget excesses abound: • processing costs decrease • accuracy increases • fraud detection increases • Citizens feel safer as crime rate decreases.

  15. Technology: Predictive Analysis • Advanced Artificial Intelligence technologies • US patented Neugents technology • Software that can learn, predict, adapt, and optimize • Maximize opportunities through real-time predictions • Personalize service to increase citizen satisfaction • Sophisticated rules and inference engines • Enables intelligent eGovernment Applications • Encapsulate known expert knowledge • Learn new knowledge from data • Realtime prediction, detection, recommendation

  16. eGovernment Information Management • Manages vital government information, leveraging it for new/expanded services • eGovernment transformation and integration • Application development, life cycle management • Total eGovernment integration of processes, applications, data • Portal & knowledge management • Personalization & CRM

  17. eGovernment Information Management Vision • Citizens are more informed than ever before about the services available to them. • Citizens feel connected to their elected officials. • Public employees work more efficiently.

  18. Technology: Portals • A web service that deliversinformation to people • Any kind of information: • Services, policies, agency contact information, events • To any kind of people: • Citizens, suppliers, employees • Personalized to support their needs

  19. Technology: Portals • Single place for all information • Documents • Applications • eMail • Web sites • Reports • Personalized • What you need, when you need it

  20. eGovernment Infrastructure Management • Manages core infrastructure of government • Keeps eGovernment up, running, secure • Ensures citizen, agency, supplier, employee connectivity • Provides optimal scalability, availability, reliability and performance by managing: • Security • Networks • Systems • Storage • Databases & applications

  21. eGovernment Infrastructure Management Vision • Citizens confidently utilize eGovernment services knowing that their privacy has been safeguarded. • Increased reliance on eGovernments is justified, given that precautions have been taken to protect systems and data from outside threats.

  22. eBusiness Defense protect against the threats associated with the Internet and networked computing. eBusiness Access grant secure access to corporate applications, establish trust and ensure privacy of eBusiness operations. eBusiness Security Management minimize operating costs of eBusiness operations while consistently enforcing corporate security policies. Technology: Security

  23. What’s this Number ? SecurityNumbers • Seconds until the first intrusion attemptafter you log on to AOL 90

  24. What’s this Number ? SecurityNumbers 0 • Word, Excel and Powerpoint files on my machine after I opened the email from Suzy in marketing

  25. What’s this Number ? SecurityNumbers • Intrusion attempts on www.cai.comlast month 112

  26. What’s this Number ? SecurityNumbers Percentage increase in new viruses reported in the 2 days around New Years when compared with the 2 weeks immediately preceding Y2K 1,500

  27. What’s this Number ? SecurityNumbers Number of reported Cyber Vandalism incidents in 1999*Computer Emergency Response Team (CERT) 8,268*

  28. What’s this Number ? SecurityNumbers Number of sites on the Internet that provide hacking tools for free download 2,000

  29. What’s this Number ? SecurityNumbers Number of seconds it takes to invade your system .... 4

  30. What’s this Number ? SecurityNumbers • Number of .com executives who believe their security is sufficient 49 %

  31. What’s this Number ? SecurityNumbers • The percentage of intrusions that come from within the enterprise 70 %

  32. What’s this Number ? SecurityNumbers • The percentage of intrusions that remain undetected 85 %

  33. What’s this Number ? SecurityNumbers • Highest cost of reported single “Insider Incident” in 1999 3,000,000 $

  34. What’s this Number ? SecurityNumbers • The percentage of a security professional’s time spent on user administration 70 %

  35. eGovernment Security Challenges - Access Internet Suppliers Branch Office LAN WAN Customers Intranet Telecommuters • Viruses • Denial of Service Attacks • Hackers • Malicious Code • Authentication • Authorization • Non-repudiation • Privacy

  36. eGovernment Security Challenges - Defend Intrusion Detection Antivirus Content Inspection Firewall VPN

  37. Realizing the Vision - CA’s Contribution • Computer System Security and Privacy Board • Information Tech. Assoc. of America (ITAA) • Information Technology - Information Sharing and Analysis Center (IT-ISAC) • International Security Trust and Privacy Alliance (ISTPA) • Partnership for Critical Infrastructure Security • National Infrastructure Protection Center located at the FBI • John Jay College and CA– Joint collaboration

  38. CA’s Technology Focus • eBusiness Security Solutions • eBusiness Storage Solutions • Enterprise Management Solutions • eBusiness Transformation and Integration • Portal and Knowledge Management • Predictive Analysis and Visualization

  39. Anything is Possible!

More Related