Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Syncsort
57 views
92 slides
May 14, 2024
Slide 1 of 92
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
About This Presentation
In today's ever-evolving threat landscape, any siloed systems, or data leave organizations vulnerable. This is especially true when mission-critical systems like IBM i and IBM Z mainframes are not included in your security planning. Valuable security data from these systems often remains isolate...
In today's ever-evolving threat landscape, any siloed systems, or data leave organizations vulnerable. This is especially true when mission-critical systems like IBM i and IBM Z mainframes are not included in your security planning. Valuable security data from these systems often remains isolated, hindering your ability to detect and respond to threats effectively.
Ironstream and bridge this gap for IBM systems by integrating the important security data from these mission-critical systems into Google Chronicle where it can be seen, analyzed and correlated with the data from other enterprise systems Here's what you'll learn:
• The unique challenges of securing IBM i and Z mainframes
• Why traditional security tools fall short for mainframe data
• The power of Google Chronicle for unified security intelligence
• How to gain comprehensive visibility into your entire IT ecosystem
• Real-world use cases for integrating IBM i and Z security data with Google Chronicle
Join us for this webcast to hear about:
• The unique challenges of securing IBM i and IBM Z systems
• Real-world use cases for integrating IBM i and IBM Z security data with Google Chronicle
• Combining Ironstream and Google Chronicle to deliver faster threat detection, investigation, and response times
Size: 11.34 MB
Language: en
Added: May 14, 2024
Slides: 92 pages
Slide Content
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle Bill Hammond | Director, Product Marketing Ian Hartley | Senior Director, Product Management
Today’s Topic Threat landscape evolving Unique challenges of IBM Z and IBM Power Systems Security visibility with Google Chronicle Q&A 2
Today’s security threat landscape
Security Landscape Business-Driven Security Multi-Factor Authentication Business impacts No longer a siloed IT concern. It's a critical business service and security teams are measured on how well they protect business outcomes Not just for financial institutions... Expect to see more biometric authentication methods alongside traditional passwords and codes Boardroom Focus Cloud Integration Rising costs of data breaches driving boards to demand more strategic approaches to risk management Expect continued focus on tighter integration between z/OS security and IBM's cloud security offerings. This would allow for a more holistic view of security posture across hybrid environments. 4
Security Landscape Artificial Intelligence Product Consolidation Double edged sword – AI can assist both security professionals and the bad actors developing new threats Individual security point products being combined into broader platforms that offer a more holistic approach Regulations Driving Change Quantum-Safe Cryptography New regulations are mandating a stronger security posture, forcing organizations to invest in expertise and improve their overall cyber resilience Current encryption solutions will become vulnerable with the broader usage of quantum computing solutions. 5 Marketplace drivers
Unique challenges of IBM systems
IBM i security challenges 7 Perception of Impregnability : A false sense of security can exist due to the platform's strong foundation. Organizations may neglect essential security practices like regular updates, user access controls, and penetration testing. Integration Challenges : IBM i environments often integrate with newer, more open systems. These connections can introduce vulnerabilities if security isn't carefully managed across all platforms. Skilled Staff Shortage : Finding IT security professionals with specific IBM i expertise can be difficult. This can make it challenging to maintain a strong security posture and keep up with the latest threats. Evolving Attack Landscape : Cybercriminals are constantly developing new methods to exploit vulnerabilities. While IBM i is inherently secure, attackers may target weaknesses in custom applications, open-source integrations, or user errors. Keeping Up with Updates : Balancing the need for stability with the importance of applying security patches can be a challenge. Downtime for updates can disrupt critical business operations.
IBM Z security challenges 8 Complexity of the Platform : This complexity can make it difficult to configure security settings correctly and maintain a strong overall security posture. An intricate web of access controls, encryption options, and security profiles needs to be meticulously managed. Skilled Staff Shortage : z/OS environments run mission-critical legacy applications. Finding security professionals with deep expertise in z/OS security can be challenging. Insider Threats : Given the high level of access granted to authorized users on z/OS systems, insider threats pose a significant risk. Rigorous access controls, continuous monitoring, and user activity audits are crucial. Integration with Open Systems : The increasing integration of z/OS with open systems and cloud environments introduces new attack vectors. Ensuring consistent and robust security across these disparate platforms requires careful planning and configuration. Evolving Regulatory Landscape : Data privacy regulations are constantly evolving, placing additional pressure on organizations to secure sensitive data residing on z/OS systems.
Visibility 9 The foundation for effective security monitoring See what's happening in your systems, identify potential threats, and take timely action to protect your valuable data and resources Without visibility, you're essentially operating in the dark, making it difficult to identify and respond to security threats
Benefits of effective security visibility 10 What's Normal? Good visibility allows you to establish a baseline for typical activity within your network. This includes user behavior, data flow, and application usage. Deviations from this baseline can indicate suspicious activity or potential threats Threat Identification Detect unusual events like unauthorized access attempts, malware infections, or data breaches. Security tools can then analyze this data to identify and prioritize potential threats Faster Response When a security incident occurs, good visibility allows you to pinpoint the source and scope of the problem quickly. This enables a faster and more effective response, minimizing damage and downtime Threat Hunting Security teams can proactively hunt for threats by analyzing network traffic and user activity for suspicious patterns. Visibility across different systems allows for a more comprehensive search and helps uncover hidden threats Better Decisions Security decisions are only as good as the information they're based on. Clear visibility provides the data and context needed to make informed choices about security investments, resource allocation, and overall security posture.
Achieving visibility Collect the right data Use a SIEM system Implement alerting Know your assets and risks Monitor continuously
Visibility with Google Chronicle
“Chronicle” … “Security Operations” 13 Google is transitioning “ Chronicle ” to “ Security Operations ” Ironstream for Google Security Operations Source: Images - https:// cloud.google.com /security
Ironstream integrates IBM Z and IBM i into today’s IT operations and security solutions Target Platforms IBM Platforms IBM Z ® IBM i Ironstream ® 14
Ironstream: For Today and Tomorrow 15 Source Target e .g. IBM i to QRadar 2024 Data Pipelines Simple set-up and control Optional mid-stream “processes” Easily switch or add sources and targets
Ironstream for Google Security Operations 16 IBM i IBM Z Source: https:// cloud.google.com /chronicle/docs/data-ingestion-flow Hub Agent Parsers Default parsers IBM AS/400 IBM i Operating System IBM z/OS Typically need “custom” requirements Logstash Grok-based Relatively straightforward Precisely looking into improvements Ironstream
Security Operations in Action with IBM i and Z 17
Security Operations in Action with IBM i and Z 18 Easily create dashboards Use out-of-the-box dashboards
Why care? Why use Google SecOps? 19 “Cover all your bases” Extended, augmented visibility “Hoarding is rewarding” Storing comprehensive data, longer “Automation station” Agility – fast response is key Source: Google Cloud – The Security Operations Ecosystem Ironstream for IBM Z and IBM i
Q & A
https:// www.precisely.com /product/ ironstream
Presentation name Changing Landscape 22 Business-Driven Security: Security is no longer a siloed IT concern. It's a critical business enabler, and security teams are being measured on how well they protect business outcomes Multi-Factor Authentication (MFA) is becoming essential for all accounts and data, not just financial institutions. Expect to see more biometric authentication methods alongside traditional passwords and codes. Boardroom Focus: Cybersecurity is no longer just an IT concern. With rising costs of data breaches, boards of directors are demanding a more strategic approach to risk management and third-party security assessments Integration with Cloud Security Solutions: Expect continued focus on tighter integration between z/OS security and IBM's cloud security offerings. This would allow for a more holistic view of security posture across hybrid environments. Double edge sward of AI Platform Consolidation: The market is seeing a consolidation of individual security point products into broader platforms that offer a more holistic approach Regulations Driving Change: New regulations are mandating a stronger security posture, forcing organizations to invest in expertise and improve their overall cyber resilience. Quantum-Safe Cryptography Roadmap: With the growing threat of quantum computing, IBM may announce updates to its roadmap for incorporating quantum-safe cryptography into its mainframe security solutions.
How to insert an image How to insert a new slide How to insert a video Choose Picture Correction to adjust the Sharpness, Brightness, and Contrast. How to insert a table Example slides Click on the Home tab in the ribbon and click on the arrow icon on the new slide button. Choose a layout from the drop down selection To change a layout of a slide, click on the Home tab in the ribbon and click on the layout button. Choose a new layout from the drop down selection Click on the icon in the middle of the placeholder and choose the amount of rows and columns you need. Click on your table, and on the Table Tools tab in the ribbon, click on the Design tab. In the Table Styles section, click on the drop down arrow to open the full selection of Table Styles. Pick the one that fits your layout the best. Use the other table style options to design the table to how you need it. You can also use tools on the Layout tab to evenly distribute your rows and columns. Click on the icon in the middle of the placeholder and choose the image from your computer. Click on the Format Picture tab in the ribbon and use the tools to edit the image. Choose Picture Color to adjust the Saturation, Tone, and Color. Choose Picture Correction to adjust the Sharpness, Brightness, and Contrast. Choose to resize and move the image within the placeholder, using the white circles in the corners of the image. Click on the drop down arrow and choose Fit to fit the image to the placeholder. We have filled a selection of example slides for you. Use these as guidance for building your own and then delete them as necessary. There are a large variety of layouts to suit your content. Each layout is customizable, you don’t have to fill each placeholder. Use a selection of different layouts to create variety in your presentation, keeping your audience engaged. Click on the icon in the middle of the placeholder and choose the video from your computer. Click on the Format Video tab in the ribbon and use the tools to edit the image. Choose Picture Color to adjust the Saturation, Tone, and Color. Choose Poster Frame to change the preview image for the video clip. Choose Crop to resize and move the video. Drag the black markers to increase the background area, then use the white markers to fit the video to the area.
Subheads need to be modified manually. Select Precisely Bold from the ribbon. Then change the Font color to purple: To move down a level for sub-bulleted lists, click on Indent More in the ribbon: Keep all headings at the default text style found on your slide Text style guide
SmartArt guide If you require additional colors , please restrict palette to the Precisely color theme by selecting accent colors only. Avoid color combinations that use non-accent colors Please try to avoid using multi-colored diagrams where possible. Precisely Purple is the preferred option and should always be the predominant color .
Presentation name Sample diagram 1 Keep it simple Restrict colors Use fine lines Boxes with straight corners 26
Presentation name Sample diagram 2 1 Keep it simple 2 Use circles or squares 3 Retain white space 4 Stick to the brand palette 27
Presentation name Sample diagram 3 28 Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor Lorum ipsum Lorum ipsum Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor Lorem ipsum dolor sit amet , cons ecte tu radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor
Sample diagram 4 Presentation name 29 Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing Lorum ipsum Lorem ipsum dolor sit amet , cons ecte tu radipiscing radipiscing elit , sed do eiusmo det tempor cons ecte incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor ecte tu radipiscing
Presentation name Sample diagram 5 30 Lorum ipsum Lorem ipsum dolor sit ametons ecte tu Lorem ipsum dolor sit amet , cons ecte turadipiscing radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor amet , cons ecte turadipiscing Lorum ipsum Lorem ipsum dolor sit ameons ecte tu Lorem ipsum dolor sit amet , cons ecte turadipiscing radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor amet , cons ecte turadipiscing Lorum ipsum Lorem ipsum dolor sit ametns ecte tu Lorem ipsum dolor sit amet , cons ecte turadipiscing radipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore radipiscing Lorem ipsum dolor sit amet , cons ecte turadipiscing elit , sed do eiusmo det tempor radipiscing elit , sed do eiusmo det tempor amet , cons ecte turadipiscing
Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Presentation name 39
Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Presentation name 40
Presentation name 41
Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Click to edit Master text styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Ninth level Presentation name 42
3 column slide 1 Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Presentation name Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level 43
3 column slide 2 Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Presentation name 44
Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Click to edit styles Second level Third level Fourth level Fifth level Click to edit styles Second level Third level Fourth level Fifth level Presentation name 45
Lorum ipsum dolor 4Q 2018 4Q 2017 FY 2018 FY 2017 Lorem ipsum dolor sit amet , consectetur 70.8 70.8 70.8 70.8 Lorem ipsum dolor sit amet, consectetur 35.6 90.3 10.7 35.6 Lorem ipsum dolor sit amet, consectetur 90.3 10.7 90.3 10.7 Lorem ipsum dolor sit amet , consectetur 15.3 10.7 35.6 90.3 Lorem ipsum dolor sit amet, consectetur 23.5 90.3 35.6 35.6 Lorem ipsum dolor sit amet , consectetur 10.7 35.6 35.6 Presentation name 46
Presentation name 47
Presentation name 48
Presentation name 49
Presentation name Click to edit styles Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level 50
Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Click to edit styles Second level Third level Fourth level Fifth level Sixth level Seventh level Eighth level Presentation name 51
“It easily met all of our requirements (and exceeded them), was simple for us to install using both local and international support, and the implementation was completed within the scheduled timeframe”. Sam Bonanno Infrastructure Production Manager Auditing database activity to achieve compliance OBJECTIVE Heinz Wattie’s Australia is a subsidiary of the multi-national H.J. Heinz Company The company is extensively audited for SOX compliance Heinz Wattie’s needed audit all changes to their mission critical data CHALLENGES Wanted easy implementation without application modifications that could scale without performance impact Required coverage of all IBM i journal entries, including user-defined entries, and the ability to produce accurate, readable periodic or ad-hoc reports and alerts SOLUTION Assure Monitoring and Reporting BENEFIT Quick implementation, using primarily in-house resources, met their deadline Able to generate all the reports they need to meet their internal needs and compliance requirements – developing more over time Scales to the needs of their environment and journal handling is compatible with their HA software Presentation name 52
OBJECTIVE lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua incididunt ut labore et dolore magna aliqua CHALLENGES Lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua adipiscing elit , sed do eiusmo det tempor SOLUTION Lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua BENEFIT lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua incididunt ut labore et dolore magna aliqua lorem ipsum dolor sit amet , cons ecte tur adipiscing elit , sed do eiusmo det tempor incididunt ut labore et dolore magna aliqua incididunt ut labore et dolore magna aliqua Presentation name 53
WEBSITE Lorem ipsum: dolor sit amet consectetur 28 MAR 28 MAR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 02 APR 02 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 06 APR 08 APR Lorem ipsum: dolor sit amet consectetur 14 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 17 APR Lorem ipsum: dolor sit amet consectetur 09 APR Lorem ipsum: dolor sit amet consectetur 06 MAY 07 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 27 MAR 23 APR Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur 09 MAY Presentation name 54
Timeline 2 WEBSITE Lorem ipsum: dolor sit amet consectetur APRIL APRIL Lorem ipsum: dolor sit amet consectetur SOCIAL Lorem ipsum: dolor sit amet consectetur MAY MAY Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur JUNE JUNE Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur JULY JULY Lorem ipsum: dolor sit amet consectetur Lorem ipsum: dolor sit amet consectetur AUG AUG Lorem ipsum: dolor sit amet consectetur Presentation name 55
Presentation name 56
Presentation name 57
Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Sarah Sample Full job Title Position Presentation name 58
Dark table LORUM IPSUM DOLOR 4Q 2018 4Q 2017 FY 2018 FY 2017 Lorem ipsum dolor sit amet , consectetur 70.8 70.8 70.8 70.8 Lorem ipsum dolor sit amet , consectetur 35.6 90.3 10.7 35.6 Lorem ipsum dolor sit amet , consectetur 90.3 10.7 90.3 10.7 Lorem ipsum dolor sit amet , consectetur 15.3 10.7 35.6 90.3 Lorem ipsum dolor sit amet , consectetur 23.5 90.3 35.6 35.6 Lorem ipsum dolor sit amet , consectetur 10.7 35.6 35.6 Presentation name 59
Lorem ipsum dolor ete sit amet , consectetur adipiscing eli Presentation name 60 Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel
Lorem ipsum dolor ete sit amet , consectetur adipiscing eli Lorem ipsum dolor ete sit amet , consectetur adipiscing eli Presentation name 61 Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel
Presentation name 62 Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel
Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel Lorem ipsum dolor ete sit Presentation name 63
Example chart These charts are provided as a style guide. They have been created within PowerPoint and can be edited/reused or just used as visual reference. To edit this chart: ‘Right-Click’ on the chart and select: Edit Data in Excel Presentation name 64
Example chart Lorem ipsum dolor ete sit Presentation name 65
Example chart Presentation name Lorem ipsum dolor ete sit 66
Example chart $78 M $325 M $2.6 B $612 M XX % CAGR XX % CAGR Lorem ipsum Dolor ete asit Presentation name 67
Sample diagram Veniam quis nostrud Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Veniam quis nostrud Lorem ipsum Lorem ipsum Lorem ipsum Veniam quis nostrud Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Lorem ipsum Presentation name 68
$10 Billion Lorem ipsum dolor ete sit $24 Billion Lorem ipsum dolor ete sit $650M Lorem ipsum dolor ete sit Big stats Presentation name 69
Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 70
Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 71
Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 72
Roadmap Investment Segment Next 3 months (Q?) Next 3-6 months (Q?) Next 6-12 months Precisely Data Product Statistics Execute Interoperability Plan Expand Geoenrichment delivery coverage Precisely Addresses Precisely Streets Precisely Points of Interest Precisely Boundaries Precisely Demographics Psyte US First release of Dynamic Demographics Presentation name 73
Lorum amet Lorem ipsum dolor sit amet , consec tetur adipiscing elit , sed do aliqua . Ut enim ad minim Lorum amet Lorem ipsum dolor sit amet , consec tetur adipiscing elit , sed do aliqua . Ut enim ad minim Presentation name 74
Presentation name 75
“Lorem ipsum dor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incid idunt ut dolor labore et dolore magna” Name Surname “Lorem ipsum dor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incid idunt ut dolor labore et dolore magna” Name Surname “Lorem ipsum dor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incid idunt ut dolor labore et dolore magna” Name Surname Presentation name 76
Presentation name 77
Journey Lorem ipsum dolor ete sit amet , consectetur Lorem ipsum dolor ete sit amet , consectetur Lorem ipsum dolor ete sit amet , consectetur Lorem ipsum dolor ete sit amet , consectetur Presentation name 78
Presentation name 79
Accuracy counts Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur . Excepteur sint occaecat cupidatat non proident , sunt in culpa qui officia deserunt mollit anim id est laborum Presentation name 80
Accuracy counts Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur . Excepteur sint occaecat cupidatat non proident , sunt in culpa qui officia deserunt mollit anim id est laborum Presentation name 81
Presentation name Consistency gets results Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et laboris nisi ut aliquip ex ea commodo consequat.irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur . 82
Lorem ipsum dolor sit Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in repre enderit in voluptate velit esse cillum dolore eu Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu Presentation name 83
Presentation name 84
Lorem ipsum dolor sit Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in repre enderit in voluptate velit esse cillum dolore eu Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu Presentation name 85
Presentation name 86
Presentation name 87 Lorem ipsum dolor sit Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugia. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut.
Lorem ipsum dolor sit Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat . Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugia . Lorem ipsum dolor sit amet , consectetur adipiscing elit , sed do eiusmod tempor incididunt ut labore et dolore magna aliqua . Ut enim ad minim veniam , quis nostrud exercitation ullamco laboris nisi ut.