BEST PRACTICE 1| 2014 BEST PRACTICE. Issue 1⁄ 2014 WHO’S AFTER WHOM? DIGITIZATION BHF-BANK CIO CHRISTIAN PFROMM GAME CHANGERS BRIAN SOLIS IT SECURITY BSI HEAD MICHAEL HANGE POLICE SUPPORT IN CYBERWAR JEREMY RIFKIN EDITORIAL — 03 TRANSITIONING TOWARDS DIGITIZATION – TOGETHER. Photo: Mareen Fischinger Analysts agree that companies that don’t make the transition to the digital age are doomed to fail. But around half of CIOs indicate that they feel overwhelmed by the speed of digitization, and its many and various challenges. Cloud computing, mobility, big data – in the course of just a few years, the IT industry has developed technologies that are shaking up the business world in a major way. But they also present opportunities for surviving and thriving in the age of intensifying competition. Almost everything is affected by digitization – business processes, manufacturing, products and sales. As an ICT service provider, we have to keep this in mind while asking ourselves the question: what should we do to prepare for supporting our customers through this fundamental shift – especially considering that no organization will be left unaffected? One thing is certain: to support our customers through the digitization of processes, production and sales while helping them transform their businesses and explore new markets, we have to reposition ourselves. Incremental changes and gradual process optimization alone are not sufficient to master our partners’ challenges. In the future, connected thinking, end-user empowerment, simplification and partner management will be essential for both sides if we are to leverage digitization as a competitive advantage. At the same time, our standardization and automation expertise will continue to play a key role in the traditional IT space. The same applies to our ability to make cost structures more flexible while increasing quality. We at T-Systems believe that the answer lies in organizational change with a focus on the requirements placed on skills and processes. In coming years, enterprises will increasingly leverage scalable cloud-based ICT services – which will create an increased need to migrate conventional IT applications to the cloud. We have proven ourselves as an excellent partner in this area: from consulting all the way to operations. And we will work hard to further increase our all-time-high customer-satisfaction figure of 84 index points. The features on a tobacco enterprise, a glass manufacturer and others on the following pages showcase the lengths we go to deliver excellent results for our customers. At the same time, we will tailor our resources and skills towards collaborating with our customers to develop and execute new business models integrated all the way to the consumer. You will find two examples in this issue of our customer magazine: in the articles describing projects for Airbus and Allianz. With our platformbased solutions, we aim to let our customers benefit from intelligent logistics concepts, economies of scale, and a shorter time to market. Mobile devices, growing data volumes and widespread machine-to-machine (M2M) communication are going to play a decisive role in this area. This is why we are implementing and managing an end-to-end ecosystem of software partners – to equip our customers’ platforms with leading technologies. This is a further field where we are evolving. And we are already tackling the challenges associated with digitization – head on, together with our customers. Best regards, Reinhard Clemens INTRO Eye-scanning smartphones —5 EYE PIN. THE VEINS RUNNING THROUGH THE WHITES OF YOUR EYES HAVE A UNIQUE PATTERN. AN AMERICAN STARTUP HAS LEVERAGED THIS KNOWLEDGE TO DEVELOP EYE-SCANNING SOFTWARE. JUST ONE LOOK INTO YOUR SMARTPHONE CAMERA AND THE NEED FOR PINS AND PASSWORDS DISAPPEARS. Eyeprints are easy to scan using smartphone cameras. 1 1. The user holds the smartphone at a short distance from their eyes (15-30 cm). Photos: Science Photo Library/Getty Images, PR 3 3. The smartphone vibrates when it has recognized the Eyeprint. 2 2. They look to the right or the left. 4 4. Authorization is granted for the password-protected application. One look to log in: not even photos can trick EyeVerify. The software is more secure than any combination of letters and numbers. And it’s a quick learner, saving any changes to the vein pattern. In November 2013, company founder Toby Rush from Kansas won the startup competition Get in the Ring. His idea meets a widespread desire in consumer markets: to kill the password. It’s time to wave goodbye to countless reams of characters. INTRO Apple’s youngest developer —7 GAME BOY. AT NINE, THIS YOUNG MAN FROM IRELAND TAUGHT HIMSELF TO PROGRAM. FIVE YEARS LATER, HE IS A WORLDFAMOUS APPLICATION DEVELOPER, GIVING SPEECHES IN SILICON VALLEY AND NEW YORK. HIS CREATIVITY AND TECHNICAL WIZARDRY HAVE CAUGHT THE ATTENTION OF KEY MOVERS AND SHAKERS IN THE IT WORLD. “Perseverance is the key to success,” explains Jordan Casey, he knows what he’s talking about. He’s already released five apps, including TeachWare, which helps teachers organize information about their students. Casey thinks like one of the big guys – and has long been in the same league. In 2012, he founded his own company, Casey Games. Watch this space: because his story doesn’t end here. Photo: James Higgins Apple’s youngest app developer. He might still be a schoolboy, but INTRO High-tech prosthetics —9 BIONIC MAN. HUGH HERR WAS A CLIMBING PRODIGY; UNTIL HE LOST BOTH HIS LEGS BELOW THE KNEE. BUT HE WASN’T GOING TO LET THAT GET IN HIS WAY. INSTEAD, HE DESIGNED HIS OWN HIGH-TECH PROSTHETIC LIMBS. TODAY, THE BIOPHYSICIST IS A RESEARCHER AT MIT IN BOSTON, AND CLIMBS BETTER THAN EVER BEFORE. “Rediscovering my body was a whole lot of fun,” reveals Hugh Herr. Creating his high-tech prosthetics cost almost 50 million dollars. Chip-controlled electric motors mimic the functions of the continues working on technology designed to enhance the human body. In 2011, Time magazine named him Leader of the Bionic Age. He is spurred on by the belief that: “There are no disabled people in the world, there are only disabled technologies.” Photo: Chris Crisman muscles and improve the wearer’s ability to balance and walk. Herr HOW TO SURVIVE IN A DIGITAL WORLD 12 <1> 30 SOCIAL BUSINESSES. FOCUS ON DIGITIZATION 12 KEY TO SURVIVAL. DIGITIZATION. More than ever before, a high level of digitization is essential for surviving and thriving in the business world – because it acts as a springboard to the customer. Some 80 percent of CIOs believe that digital transformation will be mission-critical in their enterprise in the next two years. But the options and approaches differ for long-established players and market newcomers. We accompany them from business pain point, through IT make-over, to zero distance. PIONEER. Connected customers are becoming faster, more powerful and more numerous, according to new media expert Brian Solis. And businesses have to learn that to reach out to them, they need an ongoing social media strategy – not just a one-off campaign. 32 A STEP AHEAD. FEATURE. When Airbus, RIMOWA and T-Systems joined forces to create BAG2GO, their primary concern was “how can we make traveling easier and more efficient for passengers?” IT SECURITY ANALYZE IT. According to Forrester analyst Dan Bieler, a connected business, with all its processes tailored to the customer, needs to transform its IT and digitize both its front end and back end. IT SECURITY. Edward Snowden’s revelations have been a wake-up call for CIOs. To protect companies from cyber spying and hackers, senior management must be aware of the risks. 20 MARKET BAROMETER. TREND WATCH. What strategies are needed to pave the way for digitization? Which business objectives can benefit the most from IT solutions? And which industries are under the most pressure to evolve? The answers in figures. 22 CIO TALK AT BHF-BANK. ECONOMIES OF SCALE. Christian Pfromm, CIO of BHF-Bank, on minimizing the risk of transformation, four steps from the back office to the customer, and IT solutions that add value. 26 ONES TO WATCH. GAME CHANGERS. Yesterday, they were winning. Now, they’re surrounded by competitors. From healthcare to agriculture, established players need to watch out for smart startups that know how to leverage IT to get closer to the customer. 46 IT SECURIT Y <2> Photos: Oliver Krato, Simon Stock/Gallery Images, iStockphoto, PR; Cover: James Toppin/Image Source, Clover/Image Source 18 AVOIDING PATCHWORKS. 37 MANAGEMENT TASK. CONTENTS Issue 1/2014 — 11 <1> To ensure survival in the digital age, many CIOs must transform their IT. <2> Every second counts when a business falls victim to hackers. The police force is a strong partner when it comes to fending off these attacks. <3> Smart suitcases and IT technology are giving Airbus and its passengers a taste of future air travel. 32 <3> 42 THE SECURE BACKDOOR. CLEAN PIPE. Cyber criminals looking to attack large firms often choose a less well protected route via smaller businesses and suppliers. Clean Pipe offers these companies security solutions from the cloud. 44 CLEAN CUT. BEST PRACTICES 50 RENEWABLE ENERGY. SIMKO. The latest generation of cryptocard-protected smartphones leverages a highly secure microkernel and two separate operating systems to segregate business applications from private apps. CUSTOMERS AS SUPPLIERS. US visionary Jeremy Rifkin and Dr. Frank Schmidt, head of the energy business unit at Deutsche Telekom, talk about zero distance between suppliers and customers and deploying leadingedge technology to deliver and manage renewable power in Europe. 46 STRONG DEFENSE. 53 NEWS. CYBER SECURITY. 70 percent of German companies have already been victims of cyber attacks. To protect them in the future, IT industry association BITKOM has teamed up with police forces in Baden-Württemberg and North Rhine-Westphalia. Raffles Medical Group improves care for over one million patients with SAP applications from the cloud… Landesbank Baden-Württemberg gets digital credit card... T-Systems and RSA develop a next-generation Security Operation Center… TÜV Rheinland certifies T-Systems’ service management... Dynamic cloud platform combines IaaS and SaaS… gematik digital healthcare card uses electronic signatures... Berlin electricity supplier URBANA leverages cloud-based smart metering. ABOUT THIS PUBLICATION Published by: Thomas Spreitzer, T-Systems International GmbH Fasanenweg 5 70771 Leinfelden-Echterdingen Publication Manager: Gina Duscher Project Manager: Tatjana Geierhaas Editor-in-Chief: Thomas van Zütphen Organization: Anke Echterling Art Direction: Jessica Winter Layout: Tobias Zabell, Jennifer van Rooyen Graphics Manager: Susanne Narjes Managing Editor: Anja Sibylla Weddig Translation: Martin Crellin Copywriting and Translation Authors of this issue: Birk Grüling, Thomas Heinen, Roger Homrich, Helene Laube, Thomas van Zütphen Publisher: HOFFMANN UND CAMPE VERLAG, a GANSKE VERLAGSGRUPPE company, Harvestehuder Weg 42, 20149 Hamburg, Germany Tel. +49 40 441 88457; Fax +49 40 441 88236; Email: cp@hoca.de General Managers: Christian Breid, Dr. Kai Laakmann, Christian Schlottau Production Manager at HOFFMANN UND CAMPE: Christian Breid Production: Claude Hellweg Litho: Olaf Giesick Medienproduktion, Hamburg Printing: NEEF + STUMME premium printing GmbH & Co. KG, Wittingen Copyright: © 2014 by T-Systems. Reproduction requires citation of source and submission of a sample copy. The content of this publication does not necessarily reflect the opinion of the publisher. Read it yet? Best Practice Online: www.t-systems.com/bestpractice Downloaded it yet? Scan the code for the Best Practice+ App, or visit: itunes.apple.com Questions or suggestions? bestpractice@t-systems.com Print compensated Id-No. 1436113 www.bvdm-online.de HOW TO SURVIVE IN THE DIGITAL AGE. THE CLOUD, MOBILITY AND BIG DATA OFTEN LEAVE CIOS SCRATCHING THEIR HEADS. BUT THE LEVEL OF DIGITIZATION IS BECOMING THE NEW BENCHMARK OF A COMPANY’S CHANCES OF SUCCESS – AND SURVIVAL. <Copy> Thomas van Zütphen Find out… How CIOs are preparing for “digital Darwinism”. Why zero distance to the customer is a strong anchor in the storm. Which technologies businesses are using to transform their IT. FOCUS — 13 Digitization IT transformation WHO IS REAPING THE BENEFITS of digitization – and who has missed out on this megatrend sweeping through industry and retail? Cologne-based consultancy neuland has evaluated 233 enterprises’ degree of preparation for the digital age using a “Digital Readiness Index”. The results: automotive manufacturers including Ford, Audi and BMW and retail giants such as Otto, Macy’s and H&M have digitized many processes, and have achieved aboveaverage customer intimacy. However, organizations in industries such as pharmaceuticals and the public sector are lagging behind. Internet economy expert and neuland founder Karl-Heinz Land believes there’s a reason for this development: “Many enterprises are yet to recognize the trend towards dematerialization – a by-product of digitization – that is turning our economy, industry and society on its head.” “Take keys for example,” says the expert. “Soon, no one will be using them anymore.” In just a few years, smartphones and eye-scan technologies will be used to open doors, vehicles, lockers and desk drawers. Digital payment systems will displace cash and credit cards, logistics enterprises will no longer have their own trucks, and battery manufacturers will equip their products with sensors to support machine-to-machine communication. According to Land, all these examples illustrate that “markets are undergoing a fundamental shift. Digitization is completely changing consumer behavior – and enabling a host of new business ideas.” “Speed and flexibility in adapting to these developments are the makeor-break factors,” states Land. “The Internet economy is already bringing creative thinkers’ ideas straight to the consumer – at lightning speed.” Against this background, the expert speaks of “digital Darwinism.” He explains: “When enterprises can’t adapt to the pace of change of technology and society, they will no longer be able to connect with their customers.” And Land has identified an explanatory factor for the lacking customer focus: “lumbering IT departments that do not arm their user departments with the tools they need to survive and thrive in the digital world.” Mobility, customer support, e-commerce and digital marketing are just some of the categories Land used to analyze ten industries last year. The Digital Readiness Index provides clear indicators such as enterprises’ expected growth, plus future agility and profitability. In addition, it shows which organizations are already making inroads into the virtual world by digitizing their processes – from development to production – and boosting their customer focus. “IT TRANSFORMATION WITH NO UNDERLYING DIGITAL VISION CAN’T DELIVER ANY REAL BENEFITS.” Karl-Heinz Land, neuland And this transformation pays off – as demonstrated in a global study carried out by the Sloan School of Management at the Massachusetts Institute of Technology (MIT). It found that enterprises with a high degree of digital maturity generate more revenues than average (9 percent), are significantly more profitable (26 percent), and have a higher market valuation (12 percent). The winners – both startups and established organizations – have all made IT part of their DNA, across all processes. In addition, they are highly customer-centric. According to Forrester analyst Dan Bieler, this is partly because “The current digital mind shift means consumers and employees alike expect services to be available on the move and digitization to boost competiveness and drive the demand for scalability to a whole new level.” (see Analyze IT, page 18) For Karl-Heinz Land, social media, big data, the cloud, mobility and security are key technologies for meeting users’ “always and anywhere” expec- DIGITAL MATURITY A total of 233 organizations were studied by consultants at neuland using the Digital Readiness Index. A selection is shown below – the summary of the ranking can be found here: www.neuland.me Photos: Jung/Laif, Shutterstock Automotive Retail Airlines Ford USA 89% Otto 84% Tuifly Audi 88% Macy’s USA 68% Lufthansa 69% Opel 80% H&M 63% EasyJet 69% BMW 79% Tchibo 63% Singapore Airlines 66% VW 74% Karstadt 59% American Airlines 66% Ford 70% Ernsting’s Family 51% British Airways 65% Mercedes-Benz 70% Peek & Cloppenburg 49% Air France/KLM 64% Nissan 66% Zara 48% Emirates 60% Kia 56% Tom Tailor 41% Airberlin 59% Mini 54% Adler 36% Austrian 52% Toyota 53% TK Maxx 34% Swiss 50% Honda 52% KIK 30% Condor 50% Peugeot 50% Takko 27% Germanwings 49% Mitsubishi 34% Primark 17% Ryanair 38% Late adopters: 0–20% Developers: 20–40% Talents: 40–57% Experts: 57–80% Innovators: 80–100% 69% TRANSFORMATION ROADMAP Survival type A Traditional transformation CONVENTIONAL legacy systems must be transformed. tations. But the flexibility that sales and support teams can deliver to consumers starts in the back end – the IT. This is why Land believes that “companies need a customer-focused strategy for technology – such as T-Systems’ zero distance. The goal is to bring together and digitize front-end and back-end systems.” When it comes to transformation requirements, three types of enterprises are duking it out in nearly every industry: • On the one side, there’s the ‘old guard’ hindered by a patchwork IT landscape that has evolved over many years. The task is to overhaul this legacy infrastructure to enable the business to expand its market share and fend off competitors. These organizations are facing the greatest transformation challenge. • At the other extreme are the young startups that deploy the latest technologies to achieve zero distance to the customer. However, as soon as there’s a run on their innovative products, these market newcomers will need to industrialize their IT – which often comprises just a couple of PCs under the founders’ desks. • In the mid-field are the players who have started deploying new business models much like the young startups. This enables them to continuously update their portfolio to make it more customer-centric – without having to completely renew their IT. WHEN ICT AVAILABILITY BECOMES BUSINESS CRITICAL A significant number of CIOs believe there is an imbalance when it comes to the freedom they have to deploy their resources. “Every transformation costs time, money and effort before it delivers a return on investment,” says Johann du Plessis, CIO of Africa’s largest glass manufacturer Consol. And to ensure the growth and stable business continuity that come with the territory for successful startups, “you need a reliable provider,” he continues. “What is the benefit of migrating to the cloud if the IT service provider cannot deliver the necessary high availability or quality management nor the zero-outage guarantee that our business processes depend on?” That’s another reason, according to Karl-Heinz Land, that every digital transformation requires a digital vision. This needs to be supported by all departments – and must be implemented by the right partner. “An additional server here and a new support feature there won’t deliver any real benefits without an underlying vision and a focus on the customer and business goals. They just act as a crutch during negotiations, showing that something’s been done.” This is particularly true when there’s no guiding strategy. The examples on the following pages illustrate six enterprises’ strategies for tackling various business challenges. These organizations may not have had the same starting points, and may not have taken the same approaches, but in all QR Code cases, the goal of the digital transformation was the same: achieving zero distance. Because they Scan this code to learn more about the Digital recognized that total customer Readiness Index developed by consultants centricity is essential for survival. at neuland and watch a video interview with Karl-Heinz Land, or visit: <Link> www.t-systems.com/ zero-distance www.t-systems.com/challenge-digitalization Example tobacco company This tobacco company employs 55,000 people across 130 countries, and generated revenues of 19.3 billion euros in 2012. Consol Africa’s largest manufacturer of glass packaging has six production sites across South Africa, supplying global customers from the food, drinks, and pharmaceuticals industries, and more. Survival type B New business models PLATFORM SERVICES as a docking station for innovative apps. Airbus Founded in 1970, this European aircraft manufacturer employs 69,000 people, and in 2012, recorded revenues of 33.1 billion euros. Allianz This almost 125-year-“old” business is the world’s largest insurance company. Its 144,000-strong workforce chalked up revenues of 106.3 billion euros in 2012. Survival type C Startup models SPEED DATING in the cloud: strong support for rapid growth. Enio Founded in 2013, this startup is already Austria’s leading provider of e-mobility logistics services. Runtastic This startup develops innovative sports apps – downloaded 60 million times – and attracts 250,000 new users each day. FOCUS — 15 01 Digitization IT transformation INITIAL SITUATION HELD BACK BY AN APPLICATION SPRAWL LEGACY SYSTEM PUTS GROWTH ON HOLD TOBACCO COMPANY Where the organization once focused on the European and North American markets, today it has turned its gaze to Brazil, Central Africa and Russia. Despite increasingly stringent regulations in many countries, the company is seeking to grow and sharpen its competitive edge. “We urgently needed to consolidate our IT landscape and harmonize business processes, strengthen communication between our employees and make sure we could reach our customers quickly and directly – all while ensuring a competitive margin,” explains the CIO. Until 2012, against the backdrop of an everchanging market, the company ran ten data centers across five continents. A diverse jumble of applications and infrastructures had developed, and the organization’s multiple IT groups were operating independently of each other. It had over 100 different providers, limited IT investments, and was being held back by its own sprawling application landscape. CONSOL To ensure their products stand out from the competition, food, beverage and cosmetics producers differentiate themselves through their glass jars and bottles. That’s why Consol, Africa’s number one glass manufacturer, faces diverse and complex customer requirements, while having to deal with fluctuating order volumes. In this volatile market, Consol had been operating an inscalable IT landscape, with an infrastructure designed for 120,000 SAPS and a database system with a suboptimal compression factor. The environment lacked a sophisticated end-to-end disaster recovery system. This left the furnaces that the company uses to produce liquid glass particularly vulnerable. They run constantly over their 15-year lifecycle, and cannot be shut down for any period of time. The growth strategy adopted by Consol in 2010 included plans to expand the supply chain and construct a new factory with scope for six furnaces, doubling capacity and significantly bolstering its market leadership. DESTINATION: ZERO DISTANCE AIRBUS Airbus wants to make flying more pleasant for travelers, while offering its customers – the airlines – lighter, more fuel-efficient planes. The aircraft manufacturer identified passenger luggage as a critical factor and entered a partnership with T-Systems and suitcase producer RIMOWA. A cross-industry team developed smart suitcase solution BAG2GO, which makes the door-todoor journey from the passenger’s home to the destination all by itself. A cellphone app provides up-to-the-minute information on the location of the luggage. All data is sent to the BAG2GO server in the T-Systems cloud, where it is synchronized with the airlines’ systems. THE APP THAT BRINGS CUSTOMERS CLOSER ALLIANZ Every two seconds, Allianz Global Assistance receives an emergency call from somewhere around the world – from travelers who have injured themselves or fallen sick while skiing, surfing or visiting relatives abroad. But many vacationers only realize en route that they have forgotten to take out insurance. Last year, Allianz teamed up with Deutsche Telekom to help these customers by offering ad-hoc services to people on the road, on the train or at the airport. The insurance player provides the opportunity to take out a last-minute policy in line with individual journey requirements via smartphone. The aim is to collaborate with partners to continuously extend the service portfolio, creating a fast, straightforward and seamless connection with the customer. Illustrations: Shutterstock, iStockphoto E-MOBILITY ONLINE ENIO By 2020, the number of charging stations for electric vehicles in Austria is set to rise from 2,000 to 75,000. Enio develops software for operators that is designed to enhance the consumption-based management of these facilities. Customers want a constant stream of new business models and, above all, they expect electricity to be produced in sufficient quantities wherever and whenever it is needed. Thanks to IT-based management and precise alignment of demand with supply, electricity prices can be kept much lower than by using traditional power plants designed for peak load. In addition, Enio’s business model requires reliable software and a high degree of scalability to ensure the company can produce and deliver electricity from renewable sources to meet consumer needs. A rise in the number of customers and charging stations meant Enio’s in-house IT architecture was reaching its limits. RUNNING AT FULL CAPACITY RUNTASTIC Runtastic’s improvised IT infrastructure was not designed to handle the rapidly increasing number of users. In busy periods, such as outside conventional office hours, ambitious runners who wanted to monitor their training progress using the app brought the startup’s systems to a near standstill. In addition, special promotions created spikes in demand that put the landscape under pressure, potentially causing availability problems for users. As a result, Runtastic’s goal of delivering real-time information to its 26 million customers was at risk. And with 400,000 Facebook fans ready to voice their disdain, there was a lot at stake. 02 TRANSFORMATION THE MOVE TO THE CLOUD END-TO-END SAP OUTSOURCING TOBACCO COMPANY In a bid to enable zero distance to its employees and customers, the company “needed to transform the IT organization in order to deliver effective, rapid support for business processes,” as the CIO recalls. Number one on the list of priorities was rapid availability of applications. With 110 different processes in place for order intake alone, the first step was to standardize and consolidate the sprawling IT environment. The enterprise cut the number of providers to just five, reduced the total of data centers to four, and will have transferred its entire SAP landscape including 40,000 users to the cloud by 2016. These changes will affect around 1,500 servers with one petabyte of storage and over two million SAPS. CONSOL Following a BIS assessment and cloud readiness study, Consol CIO Johan du Plessis decided it was time for the group’s entire SAP landscape to enter the cloud. The goal was clear: “to improve business continuity, disaster recovery and scalability, while cutting IT costs.” Consol replaced its legacy data management software with a DB2/Linux system, and 35 SAP systems made the move to the cloud over the course of eight months. Sized for up to 70,000 SAPS, fully scalable and offering 99.5 percent availability, the systems now operate from the twin-core T-Systems data center in Johannesburg, which links all Consol locations via a high-availability MPLS network. This has given the glass manufacturer the additional resources it needs to grow and extend its market leadership. INTEGRATION, NOT TRANSFORMATION AIRBUS As soon as the passenger checks in the BAG2GO suitcase using the app, the bag weighs itself and communicates with departure control at the airport via an encrypted data connection. Once loaded on the plane, the case reports its status to the airline and traveler, and does the same again to inform them of its safe arrival at the other end. It is then collected by a delivery service that transports the luggage to the destination originally entered into the app. Plus, because the smart suitcase with built-in cell-phone technology uses existing networks and airport and airline infrastructures, it can be integrated without the need for IT transformation. PLATFORM SERVICES ALLIANZ Product developments such as SureNow, a smartphone app that enables customers to take out last-minute travel insurance, benefit both Allianz and Deutsche Telekom. The Telekom Laboratories subsidiary developed multiple components of the app’s front end, including payment modules – simplifying complex digitization processes and delivering ease of use. The system is operated on the SureNow app portal. As a result, Allianz’s own IT department needed only to perform small adjustments and modifications. The ad-hoc insurance products make a significant impact and strengthen customer relationships. “Toegther with our partners and Deutsche Telekom, we have developed a B2B2C model that lets us efficiently reach out to customers with tailored insurance solutions,” explains Dr. Steffen Krotsch, Head of Innovation, Allianz Worldwide Partners. IAAS AS A SPRINGBOARD TO SUCCESS DATA CENTER MANAGES ELECTRICITY FLOW ENIO Instead of running its own platform and infrastructure for its intelligent e-mobility charging stations, Enio delivers solutions that enable operators to manage demand-driven supply of power to their facilities. These are hosted at a T-Systems twin-core data center and provisioned via the cloud. A dedicated energy management algorithm running in the background aligns renewable and traditional electricity production capacity with demand at the charging stations. What’s more, energy providers, e-mobility operators and drivers themselves also benefit from the DSI-vCloud solution that supports continuous supply of electricity in line with demand, even at peak times. RUNTASTIC Runtastic now receives additional computing and storage resources at short notice from a cloud-based infrastructure-as-a-service offering. This ensures the young business’s portals and services are always available – even if demand unexpectedly rises. What’s more, the company has no upfront capital expenditure or long hardware procurement delays. Even for regular operations, Runtastic now has a redundant Internet connection with a bandwidth starting at 100 Mbit/s. A tier 3+ data center run by T-Systems Austria houses the startup’s central infrastructure. FOCUS — 17 03 Digitization IT transformation OUTCOME/BENEFITS CLOSE TO CUSTOMERS IN 180 MARKETS TOBACCO COMPANY The organization can now rapidly respond to market fluctuations, new legal requirements and tax policies, and changes in smoking habits thanks to seamless integration of its local user departments. Fast provisioning and high availability allow purchasing teams to respond quickly to developments in local markets and enable sales staff to initiate logistics processes almost immediately after an order is placed. “The efficiency gains and closeness to customers and markets that have been the result of streamlining our business processes outweigh the cost cuts by far,” observes the CIO. But the savings achieved by consolidating 180 markets on a single set of applications and a standardized infrastructure are “substantial”, he continues. Rather than deploying multiple servers operating at a load of 10 or 20 percent with up to 80 percent of outlay wasted, the tobacco player now accesses cloud services dynamically and on a pay-per-use basis. Ratings agencies and shareholders have already spotted the impact this boost is having on the company’s bottom line. DIVERSIFICATION MADE EASY CONSOL In order to respond as quickly as possible to ever-changing customer requirements, and to ensure maximum reliability however high the throughput, Consol now runs its SAP infrastructure in a PaaS environment – reducing IT operating costs by 26 percent and storage expenses by 50 percent. The additional scalability gained allows Consol employees to rapidly respond to customers’ complex glass requirements. In just four years, output has doubled. “We now have the flexibility we need, and our production processes are backed up thanks to redundancy,” sums up CIO du Plessis. “We can add new furnaces and continue to grow.” NEXT STOP: THE FUTURE AIRBUS With innovations like BAG2GO, Airbus is paving the way for smart luggage to become an air travel staple, responding to the needs of passengers, airlines and airports alike. Aircraft that no longer require overhead luggage bins will be lighter by up to a ton, reducing fuel consumption by thousands of tons each year. And if passengers stop bringing bulky baggage into the cabin because they can rely on the information provided by the app, boarding and disembarking times could be halved from 40 to 20 minutes. What’s more, this innovation could reduce the number of bags lost during transit (currently around 26 million each year) to a minimum. Illustrations: Shutterstock, iStockphoto E-MOBILITY TARGETS MET ENIO The Enio platform provides drivers with an overview of e-mobility charging stations organized by location, availability and opening times. What’s more, customers can continuously monitor charging status and conclude loyalty agreements with suppliers. Facility operators leverage the platform to manage prices, customers, and payment systems. And electricity suppliers use it to keep track of fluctuations in demand. “The vCloud solution offers our customers a high level of technical and business flexibility,” explains Enio CEO Dr. Franz Schodl. “Moreover, we can meet the high IT security and data protection requirements of the energy sector.” AD-HOC INSURANCE ALLIANZ “There are definite benefits of having insurance products that only exist virtually in IT systems,” says Dr. Krotsch. The company can deliver ad-hoc, tailored policies to its customers after just a few modifications. The insurance is valid worldwide from the moment it is taken out and costs travelers just 1.49 euros or 3.39 euros for families each day. An email confirms the policy is active and the contract ends automatically with no need for cancellation. The SureNow partnership between Allianz and Deutsche Telekom is now set to be extended to other areas, including connected houses and cars. PERFORMANCE DATA ON THE GO RUNTASTIC Managing fluctuations in demand during promotions, when the weather is good and at weekends is no longer an issue for Runtastic, thanks to a T-Systems vCloud. As a result, runners have anytime access to their training data. The system is highly scalable, which means it can even cope with 100fold increases in demand. Furthermore, the enterprise benefits from fail-safe operation and 99.9 percent availability. Runtastic no longer needs costly reserve resources and enjoys consumption-based pricing, paving the way for savings of up to 40 percent. “Transformation begins in the mind.” DAN BIELER, PRINCIPAL ANALYST AT FORRESTER, ON IT AS A BUSINESS ENABLER; THE NEED FOR ZERO DISTANCE BETWEEN CUSTOMERS, EMPLOYEES AND INFORMATION; SEA CHANGES IN ALL INDUSTRIES, AND THE MISCONCEPTION THAT B2B BUSINESSES CAN SIT BACK AND RELAX. <Copy> Thomas van Zütphen Mr. Bieler, Forrester refers to enterprises of the future as “connected businesses”. What does that mean? We want to address the issue of business transformation, including where it begins and how it progresses, in a different way. It is all about recognizing how companies need to evolve – both in terms of their culture and organizational structure – in order to embrace current developments in the technology and business worlds and keep their IT ahead of the game. Scan the code to download Forrester study: The Expectation To what extent does the need for zero distance to customers and employees call for a radical shake-up and a completely new approach? The current digital mind shift means consumers and employees alike want services to be available on the move and expect digitization to boost competiveness and drive the demand for scalability to a whole new level. What’s more, they believe the product experience should play a central role when it comes to creating zero distance to the customer. It is no longer about simply making something and selling it to consumers, but about incorporating existing experience of how a product fits in with other offerings and services in order to achieve maximum zero distance. Business And IT Leaders, or visit www.t-systems.com/ study/forrester-jul-2013 What do you need to do to become a connected business? There are four steps. First, organizations must understand that it is difficult to separate front-end from back-end processes and to single out particular technologies. In a connected enterprise, you need to transform the business and the IT sides simultaneously to enable a seamless transition. Otherwise the goal of reaching out to user departments through integration of resources, interests and objectives becomes a far-off dream. Let’s think about change management. Who is responsible for driving development? This brings us to the second stage. You need a team comprising the CIO and the individuals responsible for innovation and strategy. Photo: personal snapshot Gap Increases Between FOCUS — 19 Digitization Analyze IT The objective is to unite these three standpoints and define the biggest trends affecting your industry, and to identify hard assets and soft factors, such as brands, knowledge, data and services that you already have. The third step involves answering questions: how and where can we influence, penetrate and even shape markets? Where can we play a more passive role? Where should we keep out of it completely? And then at the end of all this, you need to ask: what technologies do we need to achieve this? Technology is always a means to an end. So you’re suggesting more strategic input when it comes to procuring IT solutions? Yes, and we shouldn’t get carried away with hype. We need to take stock and ask what have we got and where are we heading. For example, it doesn’t make sense to create lots of data center capacity without really knowing what we’re collecting the data for and what we’re going to do with it. And it’s not advisable to focus on mobility without really knowing how it can support business processes. It is unbelievable how few companies have really thought properly about their technology investments. Some enterprises haven’t even recognized that significant change is taking place in this area. You mean IT is becoming a true business enabler? Precisely. Technology is not the ugly duckling anymore. It is fast becoming a swan. Enterprise IT is no longer just a cost center but an essential part of the business – one that influences competitiveness. This realization is, however, yet to reach many senior management boards. And that is exactly where it could have the most impact. Managers that believe superficial IT cosmetic surgery can make a difference are not only kidding themselves, but also their employees and shareholders. So what happens if someone on the supervisory board recognizes this shortfall? How can they relay their insight to the management? Good question. Usually, you need some sort of an aha-moment that prompts people to think differently. For example, you need to look at your company and consider what transformation has already taken place and what you gained as a result. It could be that the CEO is foresighted and regularly thinking ahead, or it might be that a supervisory board member realizes that the company has the wrong CEO. The long, slow path to transformation also takes us via business schools that are gradually making technology a central theme for their students. But this approach will not bear fruit for another 20 years or so. Unless, of course, the young business graduates are highly attuned to technology and found startups straight away. learn to think differently or they need to bring in a new team. Traditional businesses that are resistant to change will disappear or be acquired by others. Does the question about finding the right people also apply to creating the right teams and striking the right balance between the IT and business side? Definitely. To enable IT transformation, it is very important that top management collaborates closely with employees. Moreover, it is essential that the CIO plays a role at senior level – since technology is such a key issue. Today’s companies are looking to smooth the gaps between departments by creating interdisciplinary teams to work on solutions. Enterprises need teams that include people from marketing, IT, sales and even the legal department. The cultural shift needs to impact team building, too. This is particularly true in manufacturing where, in the future, businesses will sell entire solutions and not just devices. Is there greater pressure in the B2C space than in the B2B world to transform and embrace cloud computing, mobility and big data solutions? B2B companies are riding in the slipstream of their B2C counterparts, but they are rapidly gaining ground. In the automotive industry, for instance, vehicles are increasingly offering an improved user experience. Car owners are demanding more functionality, features they know from their smartphones, so there are ever more applications on the dashboard. This makes automotive suppliers a bigger part of the overall experience. Particularly since OEMs seek to keep in-house manufacturing to a minimum. Assuming B2B players can sit back and relax is risky for two reasons: one, product cycles are becoming shorter and, two, mass customization is forcing automakers to bring their suppliers closer, right to the forefront, where the customer is. This means that, in several industries, the traditional differentiation between B2B and B2C is eroding and being replaced by an end-to-end B2B2C chain that delivers joint value to OEMs and suppliers. B2B companies can no longer ride in the slipstream. What would you advise companies that are uncertain about which technologies they actually need? It is certainly not a question of skepticism but of developing and sticking to a strategy for the solutions and services they require. But at this point, I’d underline once more: transformation begins in the mind. Because despite all this technology talk, it is, in essence, about the way people will work and interact with each other in the future. If people don’t change their mindset, IT solutions will be of no use. <Links> How are recruitment and staff policies at new companies threatening the existence of older organizations? Entire sectors are beginning to ask the same question: how will the music industry respond to Spotify, the hospitality industry to airbnb and the media and telecommunications world to Google, for example? At this pace of change, companies don’t have 20 years to react. If the attitudes of top-level managers don’t evolve, new people will be called in to fill their shoes. They either need to www.forrester.com/Dan-Bieler www.t-systems.com/zero-distance www.t-systems.com/bestpractice/transformation WHEN THE FUTURE LOOKS DAUNTING. Around half of CIOs do not feel equipped to meet the challenges of the future. This issue’s trend watch highlights how IT heads plan to tame the digital dragon. TIME FOR ACTION Attack is the best defense: an increasing number of CIOs are driving digitization. 25% 70% of CIOs have already made significant investments in public cloud, and the majority expect more than half of their company‘s business to be running over public cloud by 2020. 45% of companies have implemented agile methodologies for part of their development portfolio; although most need to go further to create separate, multidisciplinary teams, with lightweight governance and new, digital skill sets and alternative sourcing models. of CIOs plan to change their technology and sourcing relationships over the next two to three years, and many are seeking to partner with small companies and start-ups. Gartner, Executive Programs Survey of More Than 2,300 CIOs Reveals Many Are Unprepared for Digitalization: the Third Era of Enterprise IT, Gatrner press release, January 14, 2014. THE CLOCK IS TICKING When will the digital transformation of your business become a critical success factor? 27% 18% 33% 13% That time has passed – it is already a matter of survival 5% This year Within the next 2 years In 3 or more years It is never going to be important across the entire organization MIT Sloan Management Review, Research Report, 2013. THE IT RELEVANCE OF BUSINESS OBJECTIVES HARD CASH – WHICH ICT DEVELOPMENTS HAVE AN IMPACT ON PROFITS? Decision makers’ wish list: greater productivity and more customer loyalty. 83% Support overall employee productivity 75% Gather better business information Empower closer engagement Allow effective and targeted selling Customer loyalty is the development that has the fastest effect on an enterprise’s bottom line. 72% 70% Digital engagement Easy connection with partners; innovation ecosystem 67% Enhance business innovation capabilities 66% of emloyees and business partners Speed up the go-to-market process 66% Automation Attractive employer with collaborative and flexible working environment 65% Support the expansion into new product segments Expand into new geographies to benefit from business globalization 63% Digital engagement of customers Digital innovation of products, operating or business models Big data and advanced analytics McKinsey & Company, Bullish on Digital: Global Survey Results, 2013. 62% Percentage of business leaders stating “important” and “very important” “IF THIS TRANSITION SUCCEEDS AND CIOs AND THEIR BUSINESSES ‘TAME THE DIGITAL DRAGON’, MASSIVE NEW VALUE FOR BUSINESSES CAN BE CREATED, AND WITH IT, A RENEWED ROLE AND GREATER CREDIBILITY FOR THE CIO AND THE IT ORGANIZATION. HOWEVER, IF THE DRAGON ISN’T TAMED, BUSINESSES MIGHT FAIL AND THE RELEVANCE OF THE IT ORGANIZATION WILL ALMOST CERTAINLY DISAPPEAR.” Gartner, Executive Programs Survey of More Than 2,300 CIOs Reveals Many Are Unprepared for Digitalization: the Third Era of Enterprise IT, Gartner press release, January 14, 2014 <Link> www.t-systems.com/analysts Illustration: Ela Strickert Forrester Research, Inc., Business Technographics Networks and Telecommunications Survey, Q1 2013. FOCUS Digitization — 21 Trend watch AVOIDING FALSE STARTS WHAT HAS DIGITAL DONE FOR US LATELY? Lack of desire, money and IT tools are the three main reasons organizations fail to use technology to make their business better; in percent. Companies are using technology to have real, transformative impact across customer experiences, internal operations and new business models. No “burning platform” 39 Not enough funding Limitations of IT systems 28 Lack of vision 28 Unclear business case 27 Business units implementing independently Culture not amenable to change Lack of leadership skills Ensure cross-channel consistency 1255 Improve internal communication Transition Launch new products and services Improve the customer experience Enhance the producitvity of our workers Automate our operational processes Develop new business models Launch new businesses Expand our reach to new customers and markets 24 16 MIT Sloan Management Review, Research Report, 2013. Customer experience TANGIBLE GAINS Operational improvements 12% 9% 6% REVENUE INCREASE Business model change MIT Sloan Management Review, Research Report, 2013. 26% Digerati, the companies that manage digital technology most effectively, see the best financial results. 1087 Enhance our existing products and services 19 Regulatory issues 9 Our digital initiatives are helping us to… Number of responses 30 Roles are not clear 9% 1876 33 7% PROFITABILITY SHARE VALUES -4% -10% Digerati Fashionistas Conservatives Beginners -11% MIT Sloan Management Review, Research Report, 2013. -12% -7% -24% INCREASED PRESSURE TO ACT At the top of CIOs’ to-do lists. Before 2017, only 40% of CIOs will rise to the challenge from CxOs to partner in strategic planning by producing business-enhancing insights from big data and analytics. 70% of CIOs will increase enterprise exposure to risk in order to dramatically reduce IT costs and accelerate business agility through increased cloud adoption. Enterprise business mobility will require 60% of CIOs by 2017 to support an agile architecture with a diverse mix of cloud-based interfaces for legacy and next-generation mobile applications. CEOS’ VIEWS ON THE STATUS OF ‘DIGITAL STRATEGIES’ IN 2013 We have nothing we recognize as digital strategy We have some stategy in that area, but not called out as digital Our digital strategy is our business strategy The demographic shift to young and mobile customers will require 80% of CIOs in consumer-facing businesses to integrate IT with public social networks by 2015. By 2015, third platform requirements will drive 60% of CIOs to use enterprise architecture (EA) as a required IT tool to support continuous change and business innovation, but only 40% will deploy EA effectively. By 2015, 60% of CIO security budgets for increasingly vulnerable legacy systems will be 30-40% too small to fund enterprise threat assessments while maintaining existing reactive security investments. By 2017, the transfer of third platform investments from IT to line of business budgets will require 60% of CIOs to reduce the cost of infrastructure and operations to focus on business innovation and value. 1% 14% 39% 35% Digital strategy is an integrated part of our main business strategy 11% We have a digital strategy, separate to our main business strategy Gartner, CEO and Senior Executive Survey 2013: As Uncertainty Recedes, the Digital Future Emerges, March 2013. IDC, 2014 Predictions: CIO Agenda, December 2013. Résumé After completing a business degree, Christian Pfromm began his career at Dresdner Bank where he held a number of roles, including program manager for the bank’s integration into Commerzbank. In mid-2011, Pfromm joined BHF-Bank where he is responsible for the redesign of IT systems. In addition, the 49-year-old is a member of the management board for the Photo: Alex Habermehl German SWIFT Group. FOCUS — 23 Digitization CIO Talk_Christian Pfromm “Forming an alliance with the customer.” Christian Pfromm, CIO of BHF-Bank, talks to Oliver Schobert, Head of Sales at T-Systems for the Rhine-Main region, about worthwhile IT, the biggest transformation errors, and four steps from the back office to the customer. Mr. Pfromm, what were the reasons behind BHF-Bank’s IT transformation? In recent years, BHF-Bank has successfully evolved its business model to meet the precise needs of international entrepreneurs and their families. Aligning our IT with these new requirements and imperatives was a necessary next step. We have leveraged the new ICT architecture for our banking platform, to modernize our infrastructure and optimize processes. Why did you modernize your IT – because it was too slow and costly for the new business model? IT investments had been limited, we were not meeting cost benchmarks, and our landscape was a long way from stateof-the-art. We needed to standardize our back-office processes while continuing to offer high-quality tailored services to our clients. <Copy> Thomas van Zütphen What’s the fastest route from the back office to your customer? Can you give us an example? We have four clearly defined steps – starting in the back end, so in the machine room. We’ve enhanced our infrastructure based on a factory-like approach and introduced standards. As a result, we’ve streamlined processes and created economies of scale. Once the machine room is in order, you can turn your attention to application development and process design, bringing you closer to the customer and allowing you to deliver better, more personalized services. Is there a link between IT efficiency and business value? In these times of banking crises, take-overs and pressure to consolidate, CIOs must be proactive about ensuring IT plays a role in business success. IT bosses should not be defined by the size and complexity of their landscape or how big a budget they have, but by the contribution they make to business BHF-Bank Founded in 1854, BHF-Bank focuses on two key business areas: Private Banking & Asset Management and Financial Markets & Corporates. Headquartered in Frankfurt, the financial services player has 13 sites across Germany and international offices in Abu Dhabi, Geneva, Luxembourg and Zurich. With 1,100 employees (around 100 in IT), the bank’s balance sheet totaled 6.7 billion euros in 2013. Christian Pfromm uses IT to reach a new level of customer centricity. BHF-Bank is Germany’s number one for portfolio management and was awarded the Golden Bull for asset management in 2013. How important is IT when it comes to defending these titles? IT is a business enabler that should not just be pigeon-holed as a high-tech tool for specialists. Our goal is to identify change and take strategic action. And we collaborate closely and proactively with all our business units to achieve this aim. Employees should be able to concentrate on advising their customers. In a bank, almost all services and processes are based on an IT core. And we need to closely align this with our customers’ interests. Our number-one status highlights how important customer-centric IT is to us: we form an alliance with our customers, and I don’t think you can get much closer than that. As far as defending our title goes, I think that we’re on the right track, and that our current IT transformation has come at precisely the right time. How did you approach the IT make-over? We looked for strategic partners for IT infrastructure services. We needed one that could take on responsibility for missioncritical systems, such as those for foreign currency exchange, and not just cherry-pick to suit themselves. The outcome is that we have outsourced the end-to-end operation of our systems to a single provider. We don’t deliver any infrastructure services ourselves anymore – a decision that we are delighted with. BHF-Bank still manages its own specialist banking applications and, of course, coordinates providers. So our plan was a success: we benefit from excellent delivery capacity and flexible services. Everything, including disaster recovery solutions and the basis for effective business continuity management, is delivered via a private cloud. As a result, we have significantly reduced costs. Were there any hiccups during transition? It’s hard to believe this but let me quote one of my IT colleagues: “We’ve migrated the mainframe and no one has noticed!” In other words, there were no problems whatsoever. After months of preparation and intensive groundwork, we performed the cutover on a weekend and everything went swimmingly. And the momentum and spirit of trust that developed helped us when it came to migrating our Unix and Photos: Alex Habermehl value. Having said that, it is not enough to simply focus on cutting costs. The IT department must offer flexible, highquality services at competitive prices. If IT can successfully model banking processes, then it can have a positive impact on competitiveness. FOCUS — 25 Digitization CIO Talk_Christian Pfromm Windows systems – a much more time-intensive project. In fact, this success continued throughout the entire undertaking: the transition phase that included integrating live systems also went off without a hitch. So what were the critical factors? Success stories like this don’t fall from the sky. You’d probably expect it to be something technical or practical, but it wasn’t. Of course, with enterprise application integration, you have to take complexity reduction into account, disconnect the modules from the interfaces and ensure data redundancy and high data quality. But the real critical success factors were trust, credibility and transparent information – from the transition teams to the steering committee. This led to a sense of discipline, hard work and a keen eye for detail among all participants. And it also helped create team spirit between our employees and their counterparts at the provider – following the example set by management on both sides. Underestimating the importance of these factors in a transformation engagement is a major error. To pull off a project like this, you need the full commitment of your user departments. What role do big data technologies play in your Asset Management, Financial Markets and, in particular, your Risk Services business lines? Big data technologies need to be an integral part of our IT architecture. Because high-quality, accurate data enables us to continually improve our products and services. These solutions help us gain valuable insight, by giving us the means to analyze and make sense of unstructured facts and figures. Thanks to big data, we can deliver better consulting services and more reliable, tailored offerings. Our infrastructures are now designed to support big data analysis. This means that our Risk Services employees, for example, can offer customers – such as asset management companies, insurance providers and pension funds – timely, accurate market and risk analyses, despite the huge volumes of data and complex algorithms involved. To achieve this, the IT side needs deep knowledge of business processes coupled with a high-performance, highly available infrastructure. We have both of these things. As part of your transformation project, your next step is to update your core banking systems for private and corporate customers. Why is that? Firstly, we want to replace our heterogeneous legacy core banking system that was developed in-house and still runs on a mainframe. We plan to introduce a new open server solution, in keeping with our “buy not make” strategy. Basically, wherever we can’t create competitive advantage, our approach is to industrialize and standardize banking business processes. <Contact> oliver.schobert@t-systems.com <Links> www.bhf-bank.com www.t-systems.com/industries/banking www.t-systems.com/bestpractice/transformation “We were looking for a partner who does not cherry-pick.” Christian Pfromm, CIO of BHF-Bank In addition to rethinking BHF-Bank’s business model, Christian Pfromm (right) and Oliver Schobert are transforming the financial service provider’s IT. MOBILIT Y TABBY, THE OPEN SOURCE CAR Screw together some metal sheets, mount the steering column and put on the wheels – and you have a brand-new car. In just one hour, the Urban Tabby is ready to be taken for its first spin – according to OSVehicle, the manufacturer behind the open source vehicle. The construction kit costs 6,000 euros and assembly instructions are available on the web. Tweaks and fine-tuning from the online community are positively encouraged. Four or two seats, electric drive or combustion engine – users have a huge range of options to choose from. The only parts not included are the roof and the windows. If this model takes off, conventional automotive players will face new competition with unbeatable production cycles and maximum scope for customization: because the consumers themselves make their own cars. Little revolutions. FROM RETAIL TO MEDICINE, MOBILITY TO FARMING – THE RANGE OF INDUSTRIES SUCCESSFULLY EMBRACING THE ZERO DISTANCE PHILOSOPHY IS GROWING. AND IT KNOWS NO LIMITS. BUSINESS MODELS ARE EMERGING THAT ARE REDEFINING THE RULES AND EXPLOITING PREVIOUSLY UNDISCOVERED POTENTIAL. OFTEN, SUCH INNOVATIVE MODELS ARE THE BRAINCHILD OF SMALL STARTUPS. THESE CREATIVE REVOLUTIONS HAVE THE POWER TO TURN ESTABLISHED, OUTDATED VALUE CHAINS COMPLETELY ON THEIR HEADS. SOMETIMES, THE RESULTS HAVE FAR-REACHING DETRIMENTAL CONSEQUENCES FOR MARKET INCUMBENTS, WHILE IN OTHER CASES, THEY DELIVER BENEFITS ALL-ROUND. <Copy> Birk Grüling FOCUS — 27 Digitization Game changers SMART SHOPPING DATA GLOVE Vendors Exchange has developed an intelligent machine, featuring SAP HANA, that is as personal as the local corner shop. There may not be a storekeeper, but the machine knows its customers’ names and their preferences. Using an interactive display, shoppers can view recommendations, purchase products or arrange for gifts to be sent directly to a friend. The items on offer vary depending on the machine’s location – be it a gym, an office or at a highway rest area – and users pay for their goods via smartphone or tablet. The machines transmit up-to-the-minute information to operators through the cloud, enabling targeted selection of products and on-time replenishment of stocks. This eliminates superfluous deliveries and reduces losses as a result of sold-out articles. The future will bring real-life, haptic shopping experiences into the digital realm. Researchers at the University of Bielefeld in Germany are working on a data glove which will allow wearers to feel objects even though they are not physically touching them. The technology works by issuing weak electrical impulses or vibrations that stimulate the nerve endings in the fingers. The glove is a long way from completion but it has potential to remove one more barrier between online and conventional bricksand-mortar stores. The European Union is funding the joint venture between ten international research institutes to the tune of 7.7 million euros. L I A RE T REPUTAMI Photos: PR, Fotolia In the digital space, customer opinions count. In just a matter of seconds, the online community can make or break a business. Cologne-based startup Reputami helps companies manage their image on the net. By analyzing feedback on social media, it enables smaller enterprises in particular to avoid negative fallout and respond effectively to criticism. Moreover, Reputami supports the development of online reputations by identifying opinion leaders in the community and helping businesses approach them. Investors have already recognized the firm’s potential: Deutsche Telekom has included it in its hub:raum program, an incubator for startups. BEAUTY KIOSK L’Oreal Paris aims to make life easier for women – with unusual ideas and suggestions. To this end, the company has launched a make-up vending machine in a subway station in New York’s 42nd Street. When someone looks into the interactive mirror, the kiosk automatically generates tailored cosmetics suggestions. Customers can purchase eye make-up, lip products and rouge directly from the machine and even sign up for a style consultation via email. The project opens up new sales channels and enables the cosmetics industry to deliver customer-specific advice, without expanding the workforce. Where do the game changers come from? € Innovations with potential can gain backing from startup incubators. Incubators are used to nurture newborn babies in their first moments on earth. They provide warmth and ensure the right level of humidity, protecting the vulnerable infant. In a similar way, business incubators for startups deliver help and support during the initial stages – offering anything from advice, to funding, to office premises. And just like in the medical world, startup incubators improve survival chances. Almost 85 BITCOIN percent of organizations nurtured in this way remain in business. Financial backing not only comes from public institutions such as universities and industry associations but also from private companies like Axel Springer or Pepsi. And this involvement delivers tangible benefits: enterprises gain innovative ideas for their own business early on. Later acquisitions turn out much more expensive – as many examples prove, not just from the US startup scene. Every day, 70,000 online transactions are made using bitcoins. Chairman of the US central bank Ben Bernanke believes that the Internet currency can pave the way to faster, more efficient global money transfers – since no fees need change hands. In 2013, the exchange rate rose from 10 to as many as 1200 dollars per bitcoin. Financial experts in Europe, however, warn investors against purchasing the virtual coinage. NC CURRE Y THE SMART PLASTER Metria, the intelligent adhesive bandage, is worn close to the skin for seven days. During this time, built-in sensors capture data on parameters such as body temperature, the number of steps taken and sleep patterns. The information can be accessed via smartphone and is automatically sent to doctors and fitness coaches. The system supports planning of long-term treatment or training programs. Currently, healthcare player Medisana is developing a version for emergency response teams that sends key facts and figures directly from the accident scene to the hospital, potentially saving lives. RE A C H T L HEA MOBILE ECG The ECG monitor from Personal MedSystems records the heart activity of patients on the go. The captured data is then analyzed using a smartphone. And a dedicated app provides tailored tips to the wearer: green – everything is fine; amber – it would be advisable to consult a doctor; red – emergency. A touch of a button can even trigger a call to first response teams. The digital disease prevention program is of high medical value: only around ten percent of patients are treated in the first hour following a cardiac arrest. Yet it is this golden hour, when the arteries can still be unblocked, that makes all the difference to the outcome. FOCUS — 29 Digitization Game changers COMBINE HARVESTER The number of assistance systems in vehicles is on the rise – and used in agriculture are no exception. Manufacturer Claas has teamed up with Deutsche Telekom and is putting farming 4.0 through its paces. Using GPS technology, the machine navigates independently around the field. And if when grain tank is full, it automatically informs a tractor to collect the load. All the while, the farmer sits in the cockpit and simply monitors the systems. SE T I R CU AG R I C U LT U R E WALL-YE Y It prunes up to 600 vines a day, highly accurately and without slowing down. With two arms, six cameras and a GPS module, the Wall-Ye robot moves around the vineyard entirely on its own. The brainchild of a French robotics startup, it can even capture accurate data on the crops. Wine growers analyze these metrics and can use them to improve processes, for example, when planning the use of fertilizer. Currently, Wall-Ye will set you back 32,000 euros. But it delivers a solution to the lack of skilled workers in agriculture, saves on salary costs and in light of its low energy consumption, is a worthwhile investment for small and medium-sized businesses. SPORTS Photos: PR, Fotolia, Image Source/Getty Images, iStockphoto FIREEYE US startup FireEye is a market leader for zero-day attack recognition software. This type of threat occurs when perpetrators exploit previously unidentified vulnerabilities to penetrate a network. Even sophisticated firewalls can only detect known viruses and malware. Now, FireEye claims to deliver the only solution in the industry that can pinpoint and ward off web and email threats, as well as malware concealed in files. In 2012, Forbes Magazine named the company “the hottest security startup”. MADE BOARDS The surfer, the board and the ocean – US startup MADE aims to perfect this harmonious relationship by means of tailored surf boards made on 3D printers. To initiate the process, the surfer ensures their smartphone is waterproof, attaches it securely to the board and takes to the waves. A dedicated app records all movements and captures weather and location data, sending it to the manufacturer. MADE then uses this information to print a customized board on a 3D printer. <Link> www.t-systems.com/zero-distance/start-ups Up close and personal. New media visionary Brian Solis on the importance of an enterprise-wide social business strategy for communications with the always-on customer. <Copy> Helene Laube FOCUS — 31 Digitization Pioneer_Brian Solis Photo: www.briansolis.com WHAT DO COMPANIES THAT SHY AWAY from social media and clocking up online friends and followers risk? “Everything,” according to Brian Solis. “Traditional customers are shrinking over time. Connected customers are gaining strength and velocity,” he explains. The analyst and social media expert attempts to hammer home just how crucial social business models are, because customers and employees behave differently in the connected world. “They become more informed. And over time, they become more demanding. They expect immediacy, attention, personalization and a more efficient and intuitive experience based on the networks, apps, and devices they use.” Solis, who has spent years studying the impact of new technologies on business and society, is a prominent thinker and author. His blog briansolis.com, is consistently regarded one of the world’s leading sources for insights into the future of business, marketing, and customer behavior. A principal analyst at market research firm Altimeter Group, Solis speaks at dozens of industry conferences each year – Le Web, SXSW and TED, to name a few. Moreover, he develops digital transformation strategies for top companies. In his latest book, What’s the Future of Business (WTF), www.wtfbusiness.com, he addresses frustrations, disorientation and ignorance in the business world when it comes to dealing with connected consumers. He designed the book as an “analog app” to present information in a way that demonstrates how customers are different. But there is no panacea for a positive outcome and ensuring better customer relationships, warns the expert from Silicon Valley: “There is a great myth that a winning formula exists for success in social media. But it all depends on business goals, the people you target, their expectations, and how customer contact is integrated with sales, marketing and other departments.” Solis continues: “The formula for success in social media begins with first defining what success is and how it will be measured.” So just because an organization has a Facebook page, a Twitter account or is active on other similar channels, it does not mean it has a social business strategy in place. Digital transformation and improved customer intimacy are rarely the direct outcome of these activities, particularly when social media is an isolated project for the marketing or HR teams. Solis observes: “In my research, I’ve found that most enterprises do not align social media strategies with business objectives. This is a problem. Without bigger thinking, without alignment, how is it possible for any company to have a major impact in an entirely new medium?” A social business strategy not only needs to be in sync with overarching goals, it also needs company-wide acceptance and support. According to Solis, few enterprises have recognized that each and every department needs to be on board. And this has led to the failure of many social media plans because they did not take key business objectives into account or senior management was not involved. The challenge with CIOs and also new media strategists is that they tend to look at these new opportunities from a technology perspective. “While that can be helpful, any technology investment should be preceded by an acute understanding of how social technology is affecting customer and employee behavior, values, and expectations. In my research, I’ve learned that too many technology investments are made without understanding the bigger vision or the opportunity social media brings for improving customer and employee engagement, communications, service and support.” And if companies invest in IT solutions, these must be capable of making the entire business social. But, says 43-year-old Solis, who himself has 210,000 Twitter followers, technology is not the key point: “The best, and most elite businesses, understand that social media is a continuum and not a campaign. And they invest in strategies that integrate the entire customer and employee journey.” <Contact> brian@altimetergroup.com <Links> www.briansolis.com linkedin.com/influencer/briansolis <Twitter> @briansolis Observer Brian Solis, 43, is a leading digital analyst, anthropologist and best-selling business author. He is principle at Altimeter Group, a Silicon Valley market research firm focused on disruptive technology. Solis has studied the impact of the Internet and consumer technology on business and society since the 1990s. Traveling light. THE SUITCASE OF THE FUTURE WILL MAKE ITS OWN WAY FROM A TO B, TRAVELING INDEPENDENTLY. THE BAG2GO BUSINESS MODEL, A JOINT VENTURE OF AIRBUS, RIMOWA AND T-SYSTEMS, IMPROVES CUSTOMER SERVICE, REDUCES THE NUMBER OF CLAIMS FOR LOST LUGGAGE, AND CUTS FUEL COSTS. Photos: Simon Stock/Gallery Images, Gallery Stock, iStockphoto, PR <Copy> Birk Grüling FOCUS — 33 Digitization BAG2GO 18 hours before departure Almost done – just one last look at the inbox: no new messages. All the day’s appointments are finished and everything is in order. The businessman leaves the office, turning off the lights as he does. The suitcase is on standby. The owner activates it by pressing a button. The case then registers with the back-end system and the display lights up, signaling that it’s ready for use. 15 hours before departure The silver metallic suitcase waits in the hall, its display blank. Laid out on the bed are two suits and a number of shirts, all ready for upcoming meetings. The man’s fingers glide across his smartphone screen. The BAG2GO app opens and, simultaneously, the suitcase display lights up. 20 minutes later, there are no more clothes on the bed and the case is full. The businessman lifts up his luggage and the built-in scale shows 18 kilograms. That’s within the limit. He breathes a sigh of relief. To determine the weight of the case, the user simply lifts it up by its handle. The value appears on the display and on the passenger’s smartphone. Once the traveler has checked in, this information is encrypted and sent to the airline’s departure control system via the BAG2GO back end. As soon as check-in is complete, the suitcase is electronically sealed. 5 hours before departure Between his morning coffee and shaving, the business traveler enters his latest flight information into the BAG2GO app. He’s in a hurry. But a simple touch of the ‘send’ button, and the details are already winging their way via the T-Systems cloud to the BAG2GO server – where they will be synchronized with the airline’s system. The display on the suitcase confirms the successful check-in. The airline processes the data and generates a barcode, which identifies the passenger and can be used to track the bag’s movements. Now the case is ready to go – without its owner. Just ten minutes later, there’s someone at the door. The BAG2GO driver is here to collect the suitcase. And our businessman simply grabs his hand luggage, and walks to the subway to catch his train to the airport. Airlines BAG2GO is designed to minimize the number of lost suitcases and cut the costs of baggage handling. According to figures from industry specialist SITA, Depending on whether the passenger is taking the bag to the airport or has requested it to be picked up, a barcode from the airline or logistics provider appears on the display. The BAG2GO back-end system transmits the data. one in a hundred items of luggage is lost or reaches its destination days late. This adds up to 26 million bags each year, with the most common causes being improper handling and loading errors. The annual damage to airlines runs to 2.5 billion US dollars, not to mention the negative impact on their reputation. For Airbus, another key aim of BAG2GO is to reduce the weight of passengers’ hand luggage. This in turn, lowers the weight of the aircraft, cutting fuel consumption and carbon emissions. 3 hours before departure The terminal is bustling. There are families with grouchy kids, agitated frequent flyers and excited backpackers. But our passenger can relax. His suitcase has just been registered at the BAG2GO belt. And with a spring in his step, he disappears into the belly of the airport, heading towards the departure lounge. With plenty of time to spare, he buys a coffee and settles down to answer a few emails. BAG2GO – at a glance • Self check-in • Automatic weighing of suitcases If the suitcase has been delivered to the airport by a courier, the airline’s baggage tag appears on the display the moment it is handed over. Now the case can be allocated to the right aircraft – like all the other bags in the airport’s baggage handling system. • Door-to-door transport • The suitcase alerts owners to tampering • Luggage communicates via the BAG2GO smartphone app – enabling real-time tracing • Worldwide positioning using a software module in the connected case and a cloud portal • A barcode on the display contains all relevant information on the flight and the bag FOCUS — 35 Digitization BAG2GO 30 minutes before departure His smartphone vibrates. It’s a message from the suitcase: “I’m on my way to the Airbus plane”. The traveler finishes his coffee and puts his documents back in his bag. A young flight attendant checks his boarding card. Ten meters beneath him, his suitcase is being loaded into the hold. Another message pops up: “I’m on board, just a few meters under your seat”. As the passengers switch their phones to flight mode, the suitcase module automatically turns itself off. 10 minutes after landing The plane touches down and as everyone reaches for their phones, the BAG2GO suitcase wakes from its slumber: “I’ve landed”. People make a dash for the baggage belt, some of them wondering if their belongings have made it. But our businessman has no cause for concern. He glances at his phone: “I’m on the way to the hotel”. He leaves the terminal with just his lightweight briefcase and hails a cab to his first meeting. Soon he gets another message: “I’ve arrived. I’m waiting for you in room 213”. Photos: Martin Adolfsson/Gallery Images (2), Gallery Stock, Jochen Eckel/ddp, Masterfile, Shutterstock, iStockphoto Shortly before the suitcase is loaded onto the plane and switched off for the flight, it sends a final status update to the back-end system. This information is forwarded to the airline and, if required, the passenger. Once the plane has landed, the suitcase is re-activated and sends a signal to the back-end system, indicating its status. If the passenger has requested delivery of the luggage, a tag from the transport service appears on the display. When it has arrived at its final destination, it sends another status update. All data is now analyzed and compared, ready to send to the passenger. Scan the code <Contact> torsten.chudobba@t-systems.com for more on BAG2GO, or <Links> www.airbus.com visit: http://vimeo.com/ www.t-systems.com/pm/telekom-bag2go 67801379 Interview “BAG2GO BRINGS US A STEP CLOSER TO THE FUTURE OF AIR TRAVEL.” Airbus Innovation Manager Jan Reh discusses how the company’s cross-industry partnership with RIMOWA and T-Systems is ‘going places’. Jan Reh, 37, joined Airbus in 2007 as Head of Product Design. Today, he works as an Innovation Manager at the company. After graduating in industrial design, he began his career at Lufthansa in 2001, where he stayed until he moved to Airbus. His tasks at the airline included developing the interior of the VIP jet. What are Airbus’s strategic aims with regard to developing smart baggage solutions such as BAG2GO? One advantage is that removing overhead lockers from an aircraft saves as much as one metric ton in weight. A saving of just one kilogram in each aircraft of an entire fleet reduces kerosene consumption by up to 30 metric tons per year – equivalent to up to 40,000 dollars. And passengers benefit, too – they don’t have to worry about their luggage any more, but they still know exactly where their bag is at any given moment. BAG2GO will speed up boarding and disembarking. As it stands, the average aircraft turnaround time is around 40 minutes. This is largely because so many passengers take carryon baggage with them, even though they have no real use for it during the flight. We want to trim turnaround time to 20 minutes, and alleviate the stress and hassle of air travel. This will make flying a more attractive prospect – boosting airline passenger numbers but also cutting fuel consumption. These developments will give the air travel industry a crucial competitive edge in the long term, and could generate significant financial benefits, too. But BAG2GO would have to gain a strong foothold in the market to have the impact you describe. How long could that take? That depends on how quickly airlines choose to adopt a business model based on baggagefree travel. Carriers would be able to purchase the suitcases when placing orders for new aircraft, and could, for instance, market the cases to frequent flyers. They could leverage the cases to strengthen customer loyalty. And we would cooperate with partners in other industries, opening up a range of new sales channels for all stakeholders. In light of trends such as M2M communications and the Internet of Things, is Airbus looking to develop innovative solutions in any other areas? We are looking into, for example, direct interaction between passengers and cabin crew. We could expand the functionality of our cell-phone app to include the entire in-flight magazine, with information on what passengers can buy and eat on board, how to switch on their reading light, and so on. Passengers would be able to ask the crew for a print copy if required. This simple change would enable airlines to drastically reduce the amount of paper they use. Essentially, our task is to encourage aircraft manufacturers and airlines to take a fresh, multidimensional look at the way the industry works. These businesses need to consider how these new technologies could be used to enhance their operations – and once they understand the benefits, they will be able to work with other industries to make flying simpler. BAG2GO is a shining example of this partnership in action. The T-Systems Innovation Center has combined this vision of future air travel with a prototype that stands up to the rigors of the real world. And we have been able to take the M2M module for the suitcase, and evolve it for use as a standard solution for airfreight containers – forming an end-to-end system for air cargo transportation. How will Airbus ensure compliance with the European Aviation Safety Agency’s strict regulations? It is important that baggage can be tracked and traced. In the future, we can expect to see a wave of new solutions – but few of them will gain approval for air travel. We only work with manufacturers of high-quality products that fulfil our stringent security and safety requirements. This approach allows us to work closely with the IATA* Baggage Working Group to spearhead the industry’s drive towards standardized baggage solutions. <Link> www.airbus.com * International Air Transport Association (http://www.iata.org) Foto: PR What role could BAG2GO play in Flight Path 2050, Europe’s vision for aviation? BAG2GO illustrates how we work with a variety of partners to develop innovative solutions that could make this vision a reality. The aim is to enable air passengers to reach any destination in Europe within four hours, door to door. Luggage shipment is one aspect of the process we’re looking to improve. SCHWERPUNKT FOCUS — 37 Titel des Schwerpunkts IT security Lorem ipsum dolor Cybercrime 38 IT security: complex task for management 41 BSI head Michael Hange 42 Clean Pipe: security from the cloud 44 SiMKo 3: high-security smartphone 46 LKA centers of excellence IT security: a management task. DESPITE RECENT HIGH-PROFILE INCIDENTS OF INDUSTRIAL ESPIONAGE AND SURVEILLANCE BY INTELLIGENCE SERVICES, THE MAJORITY OF BUSINESSES Photo: plainpicture/Cultura, iStockphoto BELIEVE THEY ARE SAFE FROM CYBER SPIES AND HACKERS. THE INTERNET CRIMINALS THEMSELVES, HOWEVER, HAVE A DIFFERENT STORY TO TELL. <Copy> Roger Homrich IT ALWAYS HAPPENS TO SOMEONE ELSE A study by Ernst & Young confirms the naïve attitude of many businesses. Shortly after surveillance by US and UK intelligence agencies came to light, 90 percent of 400 surveyed managers estimated the risk of industrial espionage or data theft to be very low to medium. And they believed security mechanisms at their enterprise to be sufficient. Nevertheless, three quarters of them also acknowledged that the threat of cybercrime is growing. Bodo Meseke, IT security and forensic expert at Ernst & Young, speculates on why so many businesses are blind to the cybercrime tsunami: “People are simply not aware that this kind of industrial espionage goes on. Very few organizations go public. And if attacks do come to light, then usually unintentionally. The number of incidents is higher than you’d think. We’re seeing a lot of data theft and product imitations, and it is by no means just large corporations that are affected.” The European commission estimates that around 80 to 90 percent of all companies have been a victim of cyber attacks. And then along came Edward Snowden. The publication of his inside knowledge on NSA and GCHQ surveillance changed everything. Suddenly, data security and protection were the words on everyone’s lips – whether in politics or business. And IT security became a concern for top managers. According to a survey by Price Waterhouse Coopers (PwC) conducted for the September 2013 study Industrial Criminality and Corporate Culture, a quarter of enterprises now estimate the risk of espionage to be higher than before Snowden’s revelations. HACKING AS A PROFESSION But even before all this, hacking was a lucrative service delivered “WHEN CYBER ATTACKS HAVE A SIGNIFICANT IMPACT ON SHARE VALUES, IT IS NOT ALWAYS COLLATERAL DAMAGE. RATHER, IT IS OFTEN WHAT THE HACKERS SET OUT TO ACHIEVE.” Klaus Beucher, Freshfields Bruckhaus Deringer Photos: plainpicture/Oliver Jäckel, Petrovicha/Getty Images, Alex Telfer/Getty Images WHEN SOLDIERX, HACK3R.COM AND CODE2600 HIT, the consequences of their actions are felt on stock exchanges around the world. Between 2010 and 2012, publically-listed companies lost around 53 billion US dollars in value as a result of hackers. On average, it takes a whole day for share prices to recover from these scares – which is plenty of time for rumors to circulate. These astounding revelations are the result of a study by international corporate law firm Freshfields Bruckhaus Deringer that underlines the negative impact of cyber attacks on financial markets. “What’s more, we’re seeing the first cases of investors suing senior management because not enough was done to prevent Internet criminals getting their hands on data,” explains Klaus Beucher, cyber security expert at the law firm. However, until mid-2013, many companies seemed to turn a blind eye – believing that they were right on top of things. Only a small number trusted the figures regularly published by IT security providers, indicating that the frequency and sophistication of these attacks is growing each year. Most of the organizations wanted transparent, reliable proof. As Thomas Tschersich, head of Deutsche Telekom’s 105-strong team responsible for securing data, explains, “Even today, most companies’ risk analyses only include conventional threats, such as production downtime and nonpayment of loans. They’re not expecting cyber attacks. They think if everything’s been fine up until now, there’s no reason it won’t continue in the same vein.” FOCUS — 39 IT security Cybercrime professionally and promoted on the Internet and at dedicated events. A prime example is Chinese group Hidden Lynx. Its defined mission: cyber spying. For many years, groups of up to 100 hackers have been responsible for hundreds of attacks on companies around the world. For a fee, the criminals attempt to penetrate IT systems that are not protected by the latest security solutions. And they’re successful. In late 2012, for example, Hidden Lynx targeted almost 1,000 businesses and government agencies with a watering hole attack. They placed malware on websites that employees at the organizations regularly visit. Then these Trojans infiltrated the corporate networks and pilfered all the data they could find. A favorite target is the banking sector. Over half of the world’s 50 largest banks have had their websites hacked. According to a study by Swiss organization High-Tech Bridge, some 15 percent of these attacks made a serious dent. For example, in spring 2013, eight hackers got into the IT systems of British bank Barclays and made off with 1.3 million pounds sterling. An IT employee, himself one of the criminals, had installed a device in one of the branches that could penetrate the network independently. But the would-be successors of the Great Train Robbers were foiled in their attempt: Scotland Yard managed to identify and arrest them, a rare victory for justice in the cyber world. ADVANCED CYBER DEFENSE SERVICES Organizations that do not tailor their intrusion detection and response solutions to actual current threats will never be able to get on top of complex, targeted attacks. To eliminate frustration and risk, they need an end-to-end security management plan. This needs to support the targeted capture of information and deliver real-time insight. A proactive approach not only protects against known threats but also helps ward off unknown dangers and initiate appropriate action. T-Systems and RSA have joined forces to implement advanced cyber defense services. RSA’s intelligence-driven security approach is based on capturing, consolidating and analyzing all security-relevant information from networks, systems and applications. Security is a key challenge of big data analy- IT SECURITY AS AN INVESTMENT CRITERION sis. A combination of state-of-the-art IT For cyber security expert Klaus Beucher: “The attacks we know about are just the tip of the iceberg. They mask the true extent of the issue.” In his opinion, many investors are yet to recognize the high risks associated with cyberspace. And this is a prime opportunity for businesses to make IT security a concern for senior management. Beucher continues: “Victims of these attacks have to tousle with far-reaching consequences: lost competitive advantage, disruption to business processes, a drop in revenue and damage to their reputation.” Security experts from PwC agree. They too warn of the faceless bullies in cyberspace. In its worldwide study The Global State of Information Security in 2014, PwC observes: “Today’s businesses are still using yesterday’s security strategies. And they are fighting a losing battle against highly skilled individuals who are already deploying tomorrow’s technologies.“ According to the report, the number of security incidents in 2013 was 25 percent higher than in the previous year. But, says PwC principal analyst Mark Lobel, “One reason the number has increased is because companies have invested in technologies that enable better detection of cyber attacks – which is, of course, a positive development.” Small and midsize enterprises are at particularly high risk. They mostly deploy simple mechanisms such as firewalls and passwords – and these present no real obstacle to experienced hackers. “Systems such as firewalls are based on defined rules and only work when attacks follow a specific pattern,” explains Tschersich. “But in the long term, this isn’t enough, because professional hackers constantly change their tactics to ensure success.” technology, expert knowledge and access to HIGH INTEREST IN SECURITY SOLUTIONS THAT ARE MADE IN EUROPE A third of all companies is now looking to verify the security of their IT and communications systems. Some 15 percent of them are data sources such as internal early-warning systems pave the way for establishing new security systems. At the heart of advanced cyber defense is a next-generation security operations center (NG SOC). This is where experts gather information on attack scenarios. In the NG SOC, specialists seek out existing and potential chinks in the armor of corporate IT and telecommunications systems. In addition, they investigate hackers’ motives, methods and tools. As a result, they are able to identify patterns and scenarios before they are even applied. SCHWERPUNKT FOCUS — 41 Titel des Schwerpunkts IT security Lorem ipsum dolor Interview_BSI President_Michael Hange Interview A WAKE-UP CALL FOR GERMAN BUSINESS. The days of the German Federal Office for Information Security (BSI) crying out as a lone voice in the wilderness are over. Almost overnight, Edward Snowden’s revelations about the surveillance by the US and British intelligence services turned BSI President Michael Hange into a sought-after advisor to both government agencies and businesses. <Interview> Roger Homrich Interest in the BSI skyrocketed after the NSA scandal last year – but why did it take something like this to make that happen? Up until summer 2013, many enterprises had underestimated the extent and threat of cyber attacks and industrial espionage. In certain corporate circles, IT security experts were seen as scaremongers. Now, this subject is firmly on the agenda of board and management meetings. Edward Snowden’s revelations were a wake-up call for many – including German businesses. How have cyber attacks become more advanced? In 2013, we recorded a significant rise in the number of standard attacks. Between 10 and 20 percent of these were highly sophisticated operations, orchestrated by professionals. Cyber criminals’ goal is to infiltrate and take control of systems. Then they can steal and sabotage data, and have the power to cause untold damage to companies. Photos: Natalie Bothur, dpa Are enterprises out of their depth when it comes to fending off professional hackers? There are some great ways to significantly reduce the risk. Unfortunately, these methods are often neglected. Ensuring that connections and data are encrypted, for example, would go a long way to stopping cyber spies in their tracks. But ask providers of encryption techologies how many businesses were interested in their products before Snowden came along. It certainly wasn’t many. But is software not intrinsically vulnerable? Is that not a fact of life in our digital world? IT always has its weaknesses; software in particular. It is estimated that in larger applications, around 0.2 percent of the code contains errors, or in other words, vulnerabilities. And if you have millions of lines of code, there are more than enough chinks in your armor where hackers can sneak malware in and systematically attack. It would be a great start if software vendors would tackle known soft spots by issuing updates. However, it must also be said that many users don’t help matters by not, or infrequently, installing patches, leaving themselves open to cybercrime. How can businesses protect themselves from the dangers of industrial espionage? First of all, there needs to be someone reponsible for IT security; someone who has a say at top management level. Then, you need to develop a strategy. That includes defining which information is particularly sensitive – such as patents or business-critical systems and data. These must take first priority, and every effort must be made to protect them. With this in mind, the BSI has developed a collection of recommendations and best practices that, if reliably put into action, safeguard against standard attacks. Deutsche Telekom recommends that, as far as possible, we exchange data via connections within Germany and the EU. What’s your take? I think it’s a very wise suggestion. Encryption and national routing would certainly be a step forward in terms of cyber security. Another possibility is De-Mail, which solves two key problems with the web: firstly, the fact that it doesn’t provide any protection for confidential information, as regular emails are as open as a postcard. Secondly, today’s Internet standards make it is impossible to know whether the sender’s email address is genuine or fake. De-Mail is designed as a secure communication platform – with encrypted emails and strong verification in the form of two-factor authentication, using a physical token and a memorized PIN code. Examples like this demonstrate how the government is supporting secure online communication by creating a legal framework. <Links> www.bsi.bund.de/EN www.t-systems.com/zero-distance/ict-security Attack by the back door. IN COMPARISON TO MAJOR CORPORATIONS, MANY SMALL AND MEDIUM-SIZED BUSINESSES CONSIDER THEMSELVES WELL-ARMED AGAINST THE THREAT OF ONLINE EAVESDROPPING AND HACKING. BUT THEIR CONFIDENCE IS MISPLACED: THEY ARE THE TARGET OF CHOICE FOR NINE OUT OF TEN CASES OF INDUSTRIAL ESPIONAGE REPORTED IN GERMANY. <Copy> Roger Homrich FOCUS — 43 IT security Clean Pipe E-CRIMINALS ARE NOT SHY about coming forward. In fact, they openly market their skills, and even set up stalls at trade fairs, with the promise of made-to-order cyber attacks. And SMBs are the targets for some three quarters of all computer crime. Michael George, of the Bavarian intelligence agency (Verfassungsschutz), explains the hackers’ rationale. “Attackers tend to choose the path of least resistance. Why waste time and effort attempting to break through a corporation’s firewall, when they can get their hands on exactly the same valuable data via suppliers or external service providers?” Unfortunately, SMBs often possess limited manpower and financial resources, leaving them relatively vulnerable in comparison to larger organizations. But criminals pay little heed to the size of their target – the priority is the end result and the big payday that follows. And many clients are only too happy to foot the bill for their mischievous undertakings, as the potential rewards are substantial. More than 1,200 world-leading SMBs are based in Germany – and according to analysis by GE Capital, the financing arm of engineering giant General Electric, they hold some 44 percent of the world’s mid-market patents. Companies of this size are often more leery of the costs of fighting cybercrime than the potential losses. But the figures don’t add up. A successful attack typically costs 70,000 euros in lost data and expertise; by way of comparison, security specialists Kaspersky Lab estimate that SMBs only spend between 27 and 38 euros per employee and year on IT security – including consultancy, hardware and software. For an enterprise with a headcount of 500, this adds up to a maximum of 19,000 euros annually. Photos: Gallery Stock, alxpin/Getty Images A WALK IN THE PARK FOR EXPERIENCED HACKERS Half of SMBs deploy piecemeal, stand-alone security solutions, such as basic firewalls and antivirus software – but overcoming these obstacles is child’s play for a seasoned hacker. Industrial espionage experts at the intelligence agency of North Rhine-Westphalia confirm that SMBs are easy targets, even for relatively unaccomplished online criminals. There is a reluctance to invest in greater levels of IT security – time and budgets are tight, and corresponding solutions are becoming increasingly unwieldy and difficult to use. But this somewhat laissez-faire approach could have disastrous consequences – threatening the viability of the business as a whole. The story of one attack in North Rhine-Westphalia in 2013 is a case in point. Cyber criminals eavesdropped on the email traffic of its target company and one of its international suppliers. They gained access to the financials system, and set up a new bogus payables account. Payments due to the supplier were diverted straight to the criminals – and this continued for several months before detection. The SMB had little option but to file for bankruptcy – despite otherwise being in robust financial health. This back-door method – targeting suppliers and partners – can also imperil far larger corporations. Chinese hacking group Hidden Lynx used malicious code to compromise the digital code-signing certificates of security outfit Bit9, gaining access to key customers in the US defense industry. As a result, SMBs are under mounting pressure to strengthen their defenses. But doing so could potentially entail enormous consultation, software and staff training costs. With this target group in mind, specialists at Deutsche Telekom and its ICT subsidiary T-Systems have focused on making enterprise security more affordable. The crack team of IT, sales and compliance experts has concluded that cloud security services provide the answer – with a variety of powerful functions including managed firewalls and web and mail security, and intrusion and DDoS protection for mobile workers and entire business sites. site. This handles all two-way Internet traffic, and has already received the seal of approval from the German Federal Office for Information Security (BSI). The router forwards data to Deutsche Telekom’s cloud-based platform via a secure connection. An array of mechanisms is then deployed to ‘cleanse’ the data, freeing it from viruses, worms, trojans and other forms of malware. Clean Pipe has been tested and certified by TÜV Rheinland, and is the first enterprise security offering to leverage the strengths of cloud computing in this way. And it focuses on prevention first, cure second: state-ofthe-art technologies, such as honeypots, identify the latest cybercrime weaponry at an early stage, ensuring that users are protected before an attack actually takes place. For businesses looking to defend themselves against the perils of e-crime without large-scale capital expenditure on in-house IT security, Clean Pipe ticks all the boxes. If a hacker can install viruses onto a user’s PC, all the data stored on that machine is at risk. To combat this threat, Clean Pipe includes web protection to block employees from accessing infected websites. The modular securityas-a-service offering draws on information gathered by expert organizations for over 15 million websites, comprising billions of content pages. The websites are analyzed for dangers in near real time (200 milliseconds on average), allowing almost instant detection of contamination and spyware. This knowledge is used to answer over 50 million requests for website assessments per day. Clean Pipe could have saved Clearaudio from a nasty surprise. This family-owned company, based in Erlangen, southern Germany, produces high-end audio equipment sold in 91 countries. It is the world’s leading manufacturer of magnetic cartridges for audio systems, and has won a host of awards for its innovative products. On its website, Clearaudio describes its products as ‘heaven’ for TV and hi-fi aficionados – but when a Chinese rival recently gained acclaim at the High End show in Munich for its new turntable bearings, it came as a highly unpleasant bolt from the blue. Clearaudio had developed and patented the corresponding components, and was preparing to unveil the new technology itself. It later came to light that Chinese hackers had managed to steal the designs from Clearaudio’s database. <Contact> bernd.koenig@t-systems.com <Links> www.t-systems.com/security www.t-systems.com/zero-distance/ict-security CLEAN PIPE SERVICES • Detects and defends against e-crime • Protects against malware-infected emails and websites • Blocks websites with illegal or criminal content • Provides secure connections for laptops • Protects websites and web services from DDoS attacks • Ensures a secure network infrastructure SECURITY STRAIGHT FROM THE CLOUD This cloud-based security solution, named Clean Pipe, is elegantly simple. A highly secure router, manufactured by LANCOM Systems, is installed on- across multiple business sites No more compromises. CAN’T DECIDE BETWEEN ENTERPRISE-GRADE SECURITY AND FLEXIBLE ACCESS TO PERSONAL APPS AND SERVICES? WITH THE NEW SIMKO3 CRYPTOPHONE FOR SECURE MOBILE COMMUNICATIONS, THERE’S NO NEED TO COMPROMISE ON EITHER. MICROKERNEL TECHNOLOGY SUPPORTS TWO OPERATING SYSTEMS, WHICH RUN IN PARALLEL ON ALL SIMKO3 DEVICES. ONE OS OFFERS IRON-CLAD PROTECTION, PERFECT FOR CORPORATE USE. THE OTHER IS A STANDARD ANDROID SYSTEM FOR PERSONAL USE. <Copy> Thomas Heinen WORK CONFIDENTIAL AND SECURE. SIMKO3 COMBINES THE ANDROID OPERATING SYSTEM, virtualization technology, a secure app store, and data encryption. In just three swipes, users can switch from the regular smartphone OS to a highly secure environment, where they can communicate and store data – safe from prying eyes and eavesdropping. Hi #þĕ≠∆ Aber das SECURE EMAIL: Users can send and receive encrypted messages, and their address book and contact data are completely protected. This means that sensitive information, for example the date of a product launch, remains classified. •Confidential, secure email communications •End-to-end encryption in line with S/MIME •Compatible with all leading email systems ENCRYPTED ACCESS TO BUSINESS DATA: Employees can call up data from the corporate network – encrypted and via a highly-secure VPN tunnel. This is only possible if the user inserts the cryptocard that has been personally registered to them. •Encrypted access to corporate data •Highly-secure VPN tunnel to corporate network •Data encryption and user authentication via cryptocard SECURE APP STORE: T-Systems pre-installs diverse business apps on the device, giving users everything they need to work. Companies can deliver their own industry- or role-specific applications via a secure app store. •Secure business apps •Additional apps via company’s own app store TAP-PROOF PHONE CALLS: Encrypted Voice over IP communications ensure that users can make confidential business calls on the go – even to landline networks. •Encrypted VoIP telephony, even to landlines •SRTP and ZRTP protocols •German government SNS standard available soon SCHWERPUNKT FOCUS — 45 Titel IT security des Schwerpunkts Lorem ipsum dolor SIMKO WHAT MAKES SIMKO STAND OUT VPN MICROKERNEL TECHNOLOGY A highly-secure microkernel is central to SiMKo3. It creates two completely segregated Android operating systems that run in parallel on the device: a protected OS for corporate use, and a standard Android system for personal applications. CRYPTOCARD The cryptocard encrypts all data and login details. It features a dedicated cryptoprocessor that generates unextractable keys. The MicroSD card is a vital component of all SiMKo devices, storing security certificates and creating a digital ID. VPN TUNNEL The smartphone boasts an integrated VPN client for safeguarding data transfer. All voice and email communications from the corporate OS are encrypted and transmitted via a highly-secure VPN tunnel. The security certificates from the cryptocard are deployed for this. LIFE PERSONAL AND CUSTOMIZABLE. Photos: T-Systems, PR APPS AND CLOUD SERVICES MAKE SMARTPHONES the perfect mobile devices. But public apps aren’t always secure: they request permissions that allow them to use certain data and functions. For instance, a simple flashlight application might require access to the user’s entire address book, copying it to a server in the cloud. Users decide for themselves which apps they download to their personal environment – while corporate data and applications remain safe and sound in the secure OS. CONSUMER APPS: Users can access apps from multiple stores and can authorize additional sources. In contrast to SiMKo2, this device supports full customization of the personal OS environment in line with user requirements. Emails, instant messaging (IM), games – everything’s possible. •Customizable environment •Flexible access to apps •Complete segregation from business data SHARED EXPERIENCE: Smartphones are always to hand, ready to capture any moment and record any event. A couple of taps is all it takes to send a photo to an album in the cloud, or upload it to a social network. But once content has been shared, users have no control over what happens to it. When using this OS, however, smartphone owners decide for themselves which information they share – while their sensitive data remains protected. •Photo sharing •Access to social networks •Support for cloud-based apps ALWAYS ON: IM apps are extremely popular. With access to local address books and contacts in the cloud, they allow users to stay in touch with family and friends. However, most messaging apps copy contact lists to an external server. On this OS, users decide for themselves whether to share their address book. Their business contacts remain secure at all times. •Anytime, anywhere messaging •Arrange appointments •Constantly in touch <Contact> stephan.maihoff@t-systems.com <Links> www.t-systems.com/security www.t-systems.com/safety-security Crime-fighting partnership. The close collaboration between the ICT Industry and police forces in germany enables rapid responses to cybercrime. <Copy> Thomas van Zütphen FOCUS — 47 IT security LKA North Rhine-Westphalia “OK, team – get ready!” Police inspector Thomas Becker has flown the BK 117 chopper at 250 km/h through the night. At this speed, the journey from Düsseldorf to Bielefeld takes just 40 minutes. The helicopter belongs to the air support unit of the North Rhine-Westphalia police department. It hovers briefly over a patch of fallow land in the neighboring industrial park. Becker stops the rotors and lands, safely delivering his four passengers. They open the door, duck their heads, and use their GPS device to find their way to their final destination. The officers pause in front of the factory building. Ten minutes later, the server is secured. The cyber attack has been foiled. Police records later confirm that some 20 officers at the Landeskriminalamt (LKA), the state criminal police office in North Rhine-Westphalia, had spent the previous 18 hours gathering vital information on the case. They had analyzed the source codes for a variety of software programs, run system tests, checked hundreds of log files, detected two backdoor programs and dissected almost 100 extremely complex binaries. As a result, they were able to identify the two servers being deployed in the attack. They then traced the server host, and established the individual actually responsible for the criminal act. They placed 357 phone calls in total, to executives at the targeted company, prosecutors, judges and fellow team members. They discussed canceling leave for all staff, the composition of the four-man team that would visit the site, tactics, recalling the off-duty specialist back to the office, obtaining a search warrant and getting the specialist to program a script for the operation. The on-site deployment would end at 3:00am. Photo: Oliver Krato Convention on Cybercrime The police have their own made-to-measure human resource software to document and manage over 500 man hours’ worth of departmental meetings, staff deployments and video conferences. But it is not just about efficient internal teamwork. It is also about working hand-in-hand with IT security chiefs at the organizations undergoing the attack. “Run-of-the-mill” crime, such as trafficking of drugs, weapons or humans, can involve as many as ten different agencies on both sides of a national border. And it can be weeks before the front-line police actually go into action. But e-crime demands a rapid response – the criminal activity could involve a Polish IP address or Swedish servers, for instance, or be perpetrated by hackers in Estonia. In these scenarios, officials can seek a preservation order or make a subsequent mutual assistance request, based on the international Convention on Cybercrime. Cyber attacks must be detected rapidly and countered swiftly; when firstline-of-defense mechanisms such as firewalls and spam filters have failed, every second counts. And it can often take a long time just to identify the source of the threat, due to the complexity of the programs used. As Michael Bartsch, Head of Sales for secure mobile communications at T-Systems, explains, “Time is of the essence if a company has suffered a security breach – they fear losing crucial data and invaluable knowledge.” Bartsch chairs the working group on public security at BITKOM, Germany’s leading IT industry association. He also played a pivotal role in establishing a partnership between the network of German IT organizations and the LKA of North Rhine-Westphalia. The alliance – which welcomed the LKA of Baden-Württemberg in March 2013 – benefits both government agencies and businesses. As Bartsch emphasizes, “Police authorities have front-line experience and operate a nationwide computer crime reporting service. This means they are generally far quicker at identifying and understanding the new technologies that these criminals use for their damaging activities.” Thousands of attempted security breaches are neutralized by firewalls, spam filters and other mechanisms. But as Bartsch continues, the specialists at Thanks to BITKOM’s engagement with the LKAs, <1> the criminological <2> and forensic knowledge and expertise <3> of the police force become tools in businesses’ fight against cybercrime. <2> <1> Cyber attacks are vastly underreported However, enterprises often attempt to fend off digital enemies themselves – sometimes spending days doing so. They only contact official government agencies at a late stage. Their reluctance is often due to concerns about potential negative publicity. As Dieter Schneider, president of Baden-Württemberg’s LKA explains, “Many companies wait until a Friday before contacting the authorities, when crucial time – and data – has already been lost. It is essential that enterprises and security agencies work together in a spirit of trust. This is the only way to combat e-crime without losing valuable time when an attack first takes hold.” Experts believe that such breaches of security are vastly underreported, because many organizations fear for their reputation as a reliable partner if investigations are made public. This is why the two LKAs make concerted efforts to build confidence in the professionalism of the police and the justice system in dealing with such sensitive situations. However, German law requires businesses to at least inform their own customers about an incident of this nature. Some 70 percent of German businesses have already suffered at the hands of cyber criminals – including the theft of credit card details, DDoS attacks and the crippling of company websites. Thousands of SMBs are targeted every day, and a quarter of private households have been compromised at least once. Dieter Kempf, President of BITKOM, explains: “Cybercrime is rife – and in our increasingly always-on society, it’s going to be really tough to eradicate. The list of victims reads like a Who’s Who of big brands. Nowadays, when a new case comes to light, other companies are more likely to say “Welcome to the club!” than to point the finger of blame.” And when lightning strikes, says Kempf, the chief concern is damage limitation. In these situations, state-of-the-art security technology is in high demand – as are specialists with the expertise to put it to good use. Security alliance strengthens defenses The LKAs and BITKOM collaborate to exchange insights and resources; the LKAs can offer first-hand knowledge of criminal activities, while BITKOM grants access to specialists in the world of business and IT. What’s more, these partners gain crucial experience from jointly-run workshops. Uwe Jacob, head of Düsseldorf’s LKA, explains the benefits of this alliance: “It enables us to defend businesses from attacks more effectively, to identify the causes, and to pursue the perpetrators. This means that companies have the support they need if they are attacked – but they can also count on our assistance when developing preventive measures.” The alliance recently traced a case of cybercrime back to the USA. After the operation, the specialists in North Rhine-Westphalia were able to identify, locate and detain the human perpetrators. The investigators in Düsseldorf made their final phone call to the FBI at dawn the following day. But within hours of the US authorities arresting the hackers, anonymous activists had posted a video online. And their message was simple: “We are growing, you cannot stop us. We do not forgive, we do not forget – just expect us.” <Contacts> cybercrime@polizei.bwl.de cybercrime.lka@polizei.nrw.de michael.bartsch@t-systems.com <Links> www.t-systems.com/security www.t-systems.com/bestpractice/report-cert <3> Photos: Oliver Krato Düsseldorf’s e-crime center of excellence and the ‘cybercrime and digital footprints’ department in Stuttgart can gain crucial insights from these failed attacks – in addition to the information obtained by police. “Every day, we learn more about how these criminals upgrade their systems and evolve their methods. This information can help the industry arm itself at an early stage, developing the technical weaponry necessary to strike back in the cyberwar.” In contrast, experience shows that IT departments at BITKOM’s partners tend to be more familiar than police forces with large-scale corporate infrastructures that fall victim to online crime. As Bartsch highlights, “Thanks to their networks of contacts, our people can call a software engineer in the middle of the night, or a core product specialist in the USA. This enables us to take faster and more targeted action.” The LKA centers of excellence in Stuttgart and Düsseldorf operate around the clock, and can set up task forces to handle incidents affecting major IT environments at a moment’s notice. And if needed, they can bring external experts on board, thanks to the partnership with BITKOM. FOCUS — 49 IT security Interview_Usable security expert_Prof. matthew Smith Interview “iT securiTy needs To work around The user – noT The oTher way around.” We need to invest more time and money into making IT security easier to use. Otherwise people won’t use it, says Professor Matthew Smith. The IT specialist and expert in usable security and privacy talks about the complexities of app permissions, vulnerabilities in program codes, and a lack of IT security education in universities. Professor Smith, IT security solutions aren’t a new concept. Encryption and other tools to make IT more secure have existed for years. Why don’t we use them more often? Up until now, most security developments have been based on the idea that the user needs to work around the technology. They have to learn how to use the tools correctly – and service providers don’t seem to be interested in whether their customers manage that or not. This attitude needs to change – if you want to develop useful IT security solutions, the technology has to fit to the user’s requirements. We need systems that are so smart and intuitive that users can operate them without any problems. Generation Easy is putting pressure on IT departments and external providers. They want intuitive software. Does IT security need to fit in with these demand too? I’m thinking in terms of apps for smartphones and tablets. Apps are key when talking about usable privacy. When people install apps, they rarely read through the security settings for the app permissions. And that’s where it says exactly what data an app can access. It’s intentionally unclear. Many companies that offer free apps still want to make money – for them, the user is the product, not the service. For instance, they sell the app user’s data. Photo: personal snapshot So would you ban these apps? No, that’s not what I mean. It’s fine for the user to decide for themself to share personal data. But what data apps can access needs to be more transparent. We have developed an application for Android that clearly shows what information an app can call up. If it uses your contacts, then our program selects a contact from your phone book and shows something like, “This app can see your mom’s telephone number”. If the app can access images and the Internet, our application selects a random picture and displays the message: “This app could send this picture over the Internet.” And will this help? We conducted a study that demonstrated that transparency has a significant influence on users’ installation patterns. This was especially true of apps you wouldn’t think use personal data. For example, why would a torch app need to collect your contact data? You might want an app to be able to capture information on your current location – but if it can turn the camera on, our application will display your camera image during installation. In our study, this deterred people from downloading these apps. Doesn’t security come into the picture a little too late? Aren’t we just trying to patch over holes instead of stopping them forming in the first place? That’s to do with usability as well. Many problems are caused by the complexity of software development. Over the course of several studies we’ve questioned hundreds of developers and administrators and evaluated different systems. We were forced to conclude that many developers and administrators have no idea where the security vulnerabilities in their systems are. That’s the root of the problem. Have developers and administrators just got too much on their plates? We have to defend the developers – they are normally under huge time and cost pressure. The systems are extremely complex. It’s practically impossible for them to pinpoint weaknesses and fi x them in millions of lines of code. But an attacker only needs one mistake to be able to get into the system. It is unbelievable what kind of weak spots professional attackers find – and how they exploit them. What can we do to prevent this? Security codes are highly complex and difficult to program. We need to provide user-friendly programming tools and APIs that can be used to reduce the number of security weaknesses. And we must provide future programmers with better IT security education. In many universities it isn’t even a compulsory subject – but it needs to become an integral part of any basic IT course. It’s the human aspect in particular that we need to be aware of if we want to get the problem of unsecure systems under control. <Links> www.uni-bonn.de www.t-systems.com/security “The energy Internet is coming.” VISIONARY JEREMY RIFKIN TALKS TO DR. FRANK SCHMIDT, HEAD OF THE ENERGY BUSINESS UNIT AT DEUTSCHE TELEKOM, ABOUT THE CONVERGENCE OF ELECTRICITY AND COMMUNICATIONS NETWORKS, ZERO DISTANCE BETWEEN UTILITIES AND CONSUMERS, AND THE TECHNOLOGY PLATFORMS BEHIND IT ALL. <Copy> Thomas van Zütphen Mr. Rifkin, are you pleased with the current pace of the third industrial revolution – the convergence of communications, information and energy technology? Jeremy Rifkin: Absolutely. The European Union has made a formal commitment to establishing the necessary technology infrastructure. And Germany, with its conscious political decision to move away from fossil fuels, is a driving force of this development. But I think Dr. Schmidt can elaborate further. Frank Schmidt: Energy companies’ business processes are undergoing significant change. Traditional utilities are evolving into service providers. The value a customer generates is no longer about how much electricity they use, but more about how much they are willing to pay suppliers to manage the overall energy consumption for their household. The industry is facing the same decisions and turning points that the ICT sector has already been through. You mean that in the future, ‘content’ will be provided by consumers in the energy sector, too? Schmidt: Precisely. Energy providers are currently going through the same transformation as IT players over the last decade. Back then, it was all about consumers producing Internet content themselves. Now it’s customers generating electricity. At first glance, this doesn’t seem like a good thing for utilities. But development is unstoppable – and it brings great opportunities. I am certain that the central grid will continue to play a significant role. Rifkin: Yes, the electricity grid is more important than other networks. Only by interlinking the five pillars of my plan, can we create a completely new technology platform. And this will become the first intelligent infrastructure in history. First, we need to convert every building in Europe into a personal power plant – just as you have a personal computer or cell phone. Solar energy can be captured on the roof, wind energy from the sides of the building, and geothermal heat from beneath the foundations. Even waste can be converted into electricity. And energy companies need to be sufficiently fit and agile to manage this colossal number of suppliers. In Germany alone, we’re talking about 40 million households. So large-scale solar parks, high-voltage power lines and huge offshore wind farms are only the tip of the iceberg? Schmidt: Utilities need to bring the entire energy generation and supply system down to a smaller scale. They need to decentralize it and view regions as micro grids that communicate with each other and exchange electricity. A key element of this is the integration of ICT and energy networks. This is the only way to support truly smart metering. BEST PRACTICES — 51 Discussion Jeremy Rifkin On the same page. Jeremy Rifkin (left) and Dr. Frank Schmidt expect to see millions of new micro markets emerge in the energy sector. Rifkin: That’s right. And it will pave the way for a European ‘energy Internet’ where millions of stakeholders produce tiny amounts of green energy and trade it with each other. They store this power in hydrogen, in the same way we store data in digital media. If they don’t need all of the electricity, they sell it, simply by opening a mobile app on their cell phone and transmitting the excess through the energy Internet – from the Irish Sea all the way to eastern Europe, for example. It is just the same as when you create information, store it in digital form, and then post it online. Schmidt: Yes, energy is for sharing. Thousands of small markets will emerge at micro grid level. And consumers will interact with each other. But they need someone to deliver the communications infrastructure, provide applications and manage billing. And that is where energy companies and ICT players come in. The energy market of the future American Jeremy Rifkin is advising the European Union and the German government on the country’s transition from fossil fuels to renewables. For him, Europe will be the first continent to enter the third industrial revolution. And he has created a five-pillar infrastructure plan for the development of the corresponding technology platform: 1. Switch to renewable energies 2. Turn buildings into micro power plants that generate their own electricity from sustainable sources 3. Create repositories in all buildings and at key points of the grid to support the storage of surplus energy 4. Deploy Internet connectivity to transform every Photos: Heiko Laschitzki continent’s electricity grid into an energy-sharing How will this affect utilities’ customer relationships? Schmidt: When customers become suppliers, contractual partners and competitors, we call them prosumers – which is a portmanteau of consumer and producer. By the same token, utilities will become energy service providers, delivering tips on how to generate electricity at home. Based on accurate consumption data, they will be able to advise customers on how system (inter grid) so that excess power can be made available to others 5. Replace conventional transport fleets with electric and fuel cell vehicles that can buy and sell power via a smart, interactive network Networker Dr. Frank Schmidt, head of Deutsche Telekom’s energy business unit, is a specialist for networks and infrastructure-based markets, and has advised regulatory bodies across Visionary Germany and Europe for many years. Industry expert Jeremy Rifkin has published 17 books to date on the technical and scientific developments that impact the world of work, business, the economy, and society. to save energy, rent out micro-cogeneration units and help them manage household appliances. Customer relationships will not get much closer than in the energy sector – this is zero distance in action. Rifkin: I agree. And these developments won’t end here. Many aspects of capturing and marketing excess energy will become automatic. Consumers will set up their computers and cell phones to monitor the grid while they are at work. As soon as demand and prices rise, the device will sell the excess energy back to the grid – with no intervention from its owner. So we’re talking about an Internet of Things, that... Schmidt: ...manages my personal end-to-end energy needs – yes, you’ve got it. Small generation units will communicate with appliances and devices independently, including with millions of cars. Rifkin: Correct. This new platform will combine communications, energy and logistics. It will allow us to reach out and connect everything to everything using sensors and software. By 2020, the Internet of Things will comprise somewhere in the region of 50 billion devices, and a trillion sensors will be in place within the next 30 years. There is no limit to the data that can be gathered in this way. You can find out what is happening in warehouses and distribution centers; how traffic is moving on the road, and how it’s affecting your deliveries and electricity prices; how weather conditions will change in the next two hours; how many people bought wellington boots and how many bought espadrilles at which department store – and the list goes on. This provides us with a nervous system; a neural network for continental markets. And just like the Internet, this network must be open source. Schmidt: This is where the whole issue of big data gets really exciting – when not only companies but consumers, too, are leveraging data from multiple industries. Combining consumption facts and figures with other structured and unstructured information will reveal new insight and enable more efficient energy management for each and every household. value chain in real time, for example by using advanced analytics to create algorithms – just like Facebook does. And whether you are a household, a small business or a large enterprise, those algorithms enable you to create software for monitoring and managing your thermodynamic efficiencies, dramatically increasing your productivity. These figures are going through the roof. The real mission of the Internet of Things is not just to monitor processes using IT – but to translate data into value. You mentioned open source technology as one of the key elements of the inter grids of the future. But how can you protect customer data and ensure the tight security of these IT infrastructures? Rifkin: The idea of creating an inter grid that is as open as the Internet means that we have to implement stringent security measures. But this isn’t rocket science either. And the technology can be used by large and small enterprises. We need a self-governing model where the business community, not-for-profit organizations, and governments work together to ensure everyone sticks to the rules. The key really is selfmanagement. Schmidt: Security is a critical success factor of the new energy markets and data protection is key if these models are going to be accepted by the public. Segregating consumption data presents no problems from a technology perspective. What’s more, it is relatively simple to set up standardized interfaces with universal protocols that enable micro grids to communicate with each other and not function as standalone silos with their own algorithms. This is exactly our approach. We provide standardized platforms that help manage the cost of switching to renewable energies. We should not lose sight of the long-term objectives. And our own smart solutions will help us meet these goals. <Contact> zitta.moncada@t-systems.com <Links> www.foet.org/JeremyRifkin.htm What you’re saying, then, is that big data can benefit everyone when it comes to personal energy management? Rifkin: That’s right. And it’s not rocket science. You can do this in your own home using an app or other software. It allows us to exploit the potential of big data across the entire www.t-systems.com/zero-distance/energy Photos: Heiko Laschitzki intelligente-netze.telekom.de/energy BEST PRACTICES News — 53 Eco-friendly electricity generation SMART METERING INFRASTRUCTURE FOR BERLIN APARTMENTS. A forward-looking, decentralized energy concept involving electricity generation at home is beginning to take shape in Berlin. Utility company URBANA delivers electricity and heat to tenants in the German capital using eco-friendly technologies. Now, the company is raising the bar by installing co-generation units at selected rented properties. The systems meet all heating requirements and around half of electricity demand for the households. Deutsche Telekom is providing the infrastructure and fitting the smart meters. The telco’s services range from the capture and secure transmission of meter data, to processing, right through to billing, leveraging a cloud-based SAP application. The project aims to connect around 2,000 meters, with plans afoot to extend its scope to 10,000 in the future. <Contact> sabine.bednarzik@t-systems.com Zero outage in place of chaos IT QUALITY MANAGEMENT Photos: T-Systems, iStockphoto ENSURES SATISFIED CUSTOMERS. The quality of IT services is a make-or-break factor when it comes to customers’ satisfaction with their provider. As such, it forms the basis for long-term partnerships built on trust. Reliability and peace of mind are top priorities for today’s enterprises. T-Systems Zero Outage program guarantees high quality support for business processes and highly available IT services. Back in 1994, the Chaos Report published by Swedish consultancy the Standish Group revealed that a third of all IT projects fail. And this figure remains unchanged to this day. But how do providers gauge the quality of their offerings? A recognized method is the TRI*M index from TNS Infratest. The triple M stands for measuring, monitoring and managing. This scale provides insight into how satisfied a company is with its provider. IT players with a high score boast the happiest customers. T-Systems has over 20,000 certified employees and delivers 99.999 percent availability from secure, fail-safe twin-core data centers. These statistics were enough to win the Deutsche Telekom subsidiary 84 points in the latest TRI*M survey, putting it among the top 10 percent of European providers for customer satisfaction. The Zero Outage IT quality management program played an important role in achieving this score. <Contact> stephan.kasulke@t-systems.com Interview RECOGNIZING EXCELLENCE. Best Practice spoke to Dr. Monika Bias, in charge of certification for individuals at TÜV Rheinland. Dr. Bias, what requirements do service managers need to fulfill to receive a certificate? We test individuals’ skills and award certification based on defined criteria. Of course, the quality of the courses and the instructors plays a key role. And we work closely with organizations such as T-Systems to ensure effective knowledge transfer. We also take candidates’ experience from their education or careers into account. We openly publish all criteria for our certification programs in our database at www.certipedia.com. The certificate is only valid for three years. Why’s that? In today’s world, knowledge becomes outdated fast. Similarly, legislation, processes and even values change rapidly. For this reason, individuals must prove that their skills are up to date. They can acquire the required expertise from training courses or from their day-to-day work. Have you noticed a rise in the demand for certification? Definitely. The demand for our certificates is increasing all the time. Requirements are evolving at an ever-faster pace in to- day’s business world. Yet there is a great deal of knowledge that cannot be acquired from universities and other conventional educational institutions that are sometimes a bit behind the times. What’s more, enterprises are becoming more international and are working with a growing number of external partners. This creates an even greater need to establish quality standards for employees and other stakeholders. TÜV Rheinland’s certification programs help companies meet these demands – independently, transparently and for the long term. Since mid-September 2013, 56 employees from T-Systems have been certified as senior and executive service managers. Certified staff Almost 60 T-Systems service managers have already completed the certification program run by Dr. Monika Bias for TÜV Rheinland. Photos: Wolfgang Pientka, PR, Marcus Brandt/ddp, andresr/Getty Images Businesses that focus on the customer throughout the entire CRM lifecycle are a step ahead of the competition. Professional service managers align their company processes with the needs of their users. And TÜV Rheinland recognizes excellence in this field – by awarding certification to individual employees. After successfully completing a training course, T-Systems staff receive a certificate, acknowledging their service management skills. BEST PRACTICES News — 55 Healthcare card PUTTING GERMANY’S NEW HEALTHCARE NETWORK THROUGH ITS PACES. It’s the second day of your vacation and you’re in pain. The wisdom tooth causing the trouble is due to be removed in six weeks and your own dentist has all the details, including the x-rays. But you’re not in your home city, so to treat the current problem, new images will probably be needed, which means additional radiation exposure. In a just a few years from now, situations like this will be a thing of the past for German health insurance customers. In the future, the vacationer will simply enter their next-generation healthcare card into a dedicated reader. And the dentist will insert a card proving that they are an authorized healthcare professional. By keying in a PIN, the patient will then be able to share the existing x-ray images stored in a secure personal file with the dentist. All records are encrypted before they are sent. In contrast to email communications, the system never transmits or saves data that has not been encrypted. To pave the way for this development, initial trials of the application will run this year. The focus will be on verifying and updating insurance customers’ master data online, on qualified electronic signatures (QES) and secure Internet access for doctors and dentists. The QES provides a solid foundation for future medical applications. These digital signatures are legally compliant, enabling doctors to sign important documents such as referral letters and send them electronically via a dedicated healthcare network. gematik, the German association in charge of developing solutions for the electronic healthcare card, has tasked T-Systems with testing two key features: secure PIN-protected access to patient data, and the electronic signatures that enable medics to digitally sign PDF documents. The Deutsche Telekom subsidiary will deliver all necessary components for the upcoming pilot project to over 500 doctors, dentists and psychotherapists, plus five hospitals in Bavaria and Saxony. The equipment includes a device which provides access to a VPN, and the card reader. Moreover, T-Systems is developing identity cards for doctors and other healthcare employees that will allow staff to log on to the digital healthcare network. And the ICT provider is designing an online portal where medical professionals can order their cards. In April 2013, gematik also tasked T-Systems with the development of an operating system for the next generation of healthcare cards. This project is currently in full swing. <Contact> martin.goedecke@t-systems.com Raffles Medical Group MORE TIME FOR PATIENTS. At medical facilities around the world, administrative tasks are eating away at employees’ precious time. The Raffles Medical Group in Singapore recently opted to introduce an SAP system to benefit its million-plus patients. Over the course of two years, T-Systems will roll out SAP ERP and BI to all members within the Group, including specialist doctors, insurance providers, and a hospital. The latter will also receive the SAP industry solution IS-H and the hospital information system i.s.h.med – delivered by T-Systems. As a result, the medical facility will be able to better manage its finances and materials, streamline billing of doctors’ services, and trace orders of medicines to the moment they are given to a patient. What’s more, the new system will enable staff to request blood tests or treatments directly from the bedside. <Contact> amit.mahajan@t-systems.com Dynamic cloud platform Cloud-based services have become commonplace in the business world. Many IT heads have already placed their SAP operations in a private cloud. And they leverage infrastructure-asa-service (IaaS) offerings to transfer virtual servers between their own data center and that of their ICT service provider – as and when they need to. But many workloads are still run inhouse. This is why IT departments have long sought a standardized platform to manage all applications. This would combine infrastructure- and software-as-a-service models, enabling data to be exchanged between various workloads in a central infrastructure, with no impact on performance. To this end, T-Systems is implementing a dynamic cloud platform at its data center in Munich. For the first time, this gives customers standardized access to all cloud offerings from infrastructure-, to collaboration-, to software-as-a-service solutions. The new platform delivers unlimited scalability and can quickly and flexibly integrate new services via automated processes. Moreover, updates and maintenance work are carried out with no disruption to ongoing operations. NO MORE CLOUD SILOS. <Contact> christiane.prutscher@t-systems.com Arrival Control ACCURATE ARRIVAL TIMES. When plumbers or service teams arrive late, customers are naturally angry. To provide better insight into the estimated arrival times, Deutsche Telekom has developed a free app: Arrival Control. Via text message or email, the app sends a link to a map which shows the precise location of the person as well as their ETA. Users do not need to install the app: they simply open the map in a browser. Moreover, all data remains on their device and is automatically deleted once the person or goods have ar- Download the app for free from Google Play or the Apple App Store. rived. The solution can be integrated into existing deployment and logistics systems. Allianz Global Assistance (AGA), for example, uses Arrival Control to inform drivers who have experienced a breakdown when assistance will reach them. <Contact> mario.riedel@t-systems.com BEST PRACTICES News — 57 RSA PARTNERS IN THE FIGHT AGAINST CYBERCRIME. Detectives that work alone to ward off cyber attacks are of no real benefit to businesses. That’s why T-Systems has teamed up with RSA, the security division of IT company EMC, to provide large corporations with even more comprehensive solutions. These offerings range from risk analysis, to security strategies, to highly developed cyber security services. The first step is to combine both partners’ expertise and knowledge and jointly develop a next-generation Security Operation Center (SOC) – a facility designed to monitor enterprises’ IT security and ensure that they have the latest tools to combat attacks. This collaboration with RSA was initiated by T-Systems’ new cyber security business unit, founded to consolidate the ICT provider’s expertise in this field. <Contact> gerd.enste@t-systems.com App BEST PRACTICE TO GO. Best Practice is also available on the move. BP+, the Best Practice app for iPad, can be downloaded free of charge from iTunes. The virtual magazine offers even more information and content. In CIO Talk, for example, Christian Pfromm, CIO of BHF-Bank, stresses the pivotal role of IT as a business enabler in 360-degree transformations. Dan Bieler, Principal Analyst at Forrester, says that “change has to come from the top,” and underlines that corporate IT is no longer just a cost center but an essential part of the business. Moreover, we profile five startups that are changing the rules of the game and challenging established value chains. Innovative solution BAG2GO shows that long-standing market players have not lost their touch: Airbus, RIMOWA and T-Systems have teamed up to create a smart suitcase that travels independently of its owner and makes lost luggage a thing of the past. In addition, the Best Practice app features the latest on the public debate on privacy. A report highlights how today’s ICT security solutions are not just designed to prevent cyber attacks and industrial espionage but can also protect government organizations thanks to highly secure cloud-based applications. <Contact> bestpractice@t-systems.com Scan the code to download the Best Practice+ app, or visit: itunes.apple.com Landesbank Baden-Württemberg FASTER PROCESSING OF LOANS WITH DOCU- Photos: T-Systems (2), PR, iStockphoto (2) MENT MANAGEMENT. People who are financing a house do not want to wait long for their money. Now, advisors at Landesbank Baden-Württemberg (LBBW) can process loan applications efficiently on screen in a dedicated electronic file. To this end, T-Systems has tailored document management solution Alfresco Workdesk to the bank’s needs – adding support for electronic loans and integrating it with the existing enterprise content management system (ECMS). In the past, financial advisors and their clients filled out forms on paper. Thanks to the new system, they can now do this digitally. As a result, applications can be processed immediately and there is no unnecessary paperwork. What’s more, quality has also improved: the new-look ECMS gives advisors greater visibility into the entire loan application – from initial request through to payment. <Contact> tobias.wolf@t-systems.com Illustration: Peter Thulke CARTOON