Our live coverage is now over. Check out highlights from the two day event below.
IP EXPO, one of the UK's number one enterprise IT events, gets underway today at London's Earls Court 2 exhibition centre and you can follow all the action live right here.
We'll be bringing you breaking news and analysis from the exhibition floor, as well as keynote and seminar highlights throughout the two days so you don't miss a thing.
You should also check out the freshly launched Technology.info - a joint venture between ITProPortal publisher Net Communities and ICT event specialist Imago Techmedia - which will be keeping close tabs on IP Expo before giving IT professionals cutting insight and information all year round.
So keep this live coverage open in your browser today for updates as they happen, and be sure to nip over to Technology.info for the in-depth breakdowns.
Enjoy the show, but if you can't make it, be sure to follow all the action from the main keynotes and seminars via the Technology.info IP EXPO 2013 live stream.
- 17 October
Cluley: "The next huge war will feature cybercrime"
Cluley: "Spying on someone using technology is not only cost effective, but it's also safer. You have deniability."
Cluley: "In the early days, viruses were really about electronic graffiti"
Now we're at a keynote by independent security analyst, Graham Cluley: "How Cybercrime Evolved from Back Bedroom Hackers to State-Sponsored Espionage"
BREAKING: New initiative to help early-stage ventures rapidly scale sees Rackspace and DataStax offering cloud and software stack support to UK startups
Sivasubramanian: "We need to have an infrastructure that fully automates all components of that infrastructure."
Sivasubramanian: "Physical servers still represent a great proportion of the number of servers shipped to businesses."
Keynote with Balaji Sivasubramanian of Cisco!
Microsoft's updated Windows 8.1 is making its international release today, and we're getting a hands-on demonstration nextdoor to the ITPP Lounge!
Packed hall today...
Advice from Jimenez: "1. Know your data, and its potential value. 2. Get vision and question the status quo. 3. Deeply understand the technical paradigm shift that is underway. 4. Hire or grow data scientists. 5. Clear the path to operationalisation. Above all - 6. Manage the disruption, rather than reject it."
General Electric are planning on achieving "zero unplanned downtime." That means getting electricians out to a problem before it even occurs.
Jimenez, on The Internet of Things: "I'm willing to be that there are more things than webpages. That might be controversial."
"Companies like Comscore are going from having one or two data scientists on team, to having 10 per cent of their employee workforce being made up of people working with data analytics."
Jimenez: "Software is eating the world. Every company is to some degree becoming a software company."
Jimenez: "the goal of data science is to drive automated responses to events of interest. Now you're in the territory of value-adding."
Now on to Annika Jimenez and a keynote called "Beyond Digital: the data science frontier"
Slightly dry keynote from Microsoft... let's hope the Windows 8.1 release was a bit livelier!
Now we're getting a demonstration of the Windows Azure Pack. and how to set up a virtual machine.
"Windows Azure can give you a value-adding overlay to your on-premises machines."
"45% of total IT spend will be cloud-related by 2020, while 45% of the 2,000 top companies will have their IT operations onsite. Hybrid cloud is here, and hybrid cloud is here to stay."
"Three out of four cloud servers use Windows operating system. We're learning every day what it takes to operate cloud services on this kind of scale, using over a million servers worldwide."
"Our focus is to enable you to engage in cloud computing at the rate and pace that fits your business. There's no one size fits all."
Schutz: "the amount of data on the planet is doubling every year, and 90 per cent of all the data in existence was created in the last two years."
Now onto our first keynote, with Microsoft's Mike Schutz, and "Transforming IT in the Era of Cloud OS."
Don't forget to come visit us in the ITPP lounge. It's full of coffee, refreshments and friendly people.
Welcome back to another day of IP EXPO 2013, coming to you live from Earls Court. We're kicking off in half an hour with a keynote by Mike Schutz from Microsoft, telling us about MS Cloud OS.
- 16 October
That's all from IP EXPO today folks - time for a quick kip and then back again tomorrow with more from the UK's number one enterprise IT event
Also at IP EXPO today stirring things up: NextiraOne staged the first live demonstration of its new OneCockpit solution to the adoring IT masses
News courtesy of our snazzy new sister site Technology.info - in 2014, IP EXPO will expand and feature two co-located events, one dedicated to data centres and one enterprise security
Robson: "2010 was a wake-up call for public services, but the 'multi-force shared service' revolutionised how we worked as a force."
Robson: "'multi-force shared service' revolutionised how we worked as a force."
Now on to a talk by Andy Robson of the Cheshire Constabulary, and the "multiforce shared service centre."
Chalmers: "the digital explosion is pushing the limits of the data centre. If you have a problem with data in your business right now, I can promise you it's going to get worse."
"We're moving away from a paradigm of bring your own device, and into a world of choose any device. Pick up a device, and it becomes your device, because it knows who you are. That's going to make the smartphone-tablet debate look a little outdated."
David Chalmers, VP and Chief Technologist at HP: "staying local will be a major part of how companies will adapt in the future."
More news out of IP EXPO 2013: Chinese telecoms giant ZTE has announced a new video conferencing solution based on the ZTE TS700S terminal that has been fully customised to meet the needs of the European market.
There's a plethora of intriguing announcements coming out of IP EXPO today, and as well as the launch of our new sister site, Technology.info, SDS architecture specialist DataCore Software previewed its new SANsymphony-V storage virtualisation solution
Rounding off his address, Morgan pointed out one of the pivotal things organisations should work their security policy around - key data. Companies must identify the specific data sets that are most crucial to the running of their business, and focus security infrastructure around that. Data will always leak, and breaches will always happen, Morgan says, so it's about prioritising certain data commodities and doing everything possible to protect them.
Giving LogRhythm's own tech a bit of a plug, Morgan described the firm's 'smart response' tool built in to its solutions, which can track suspicious behaviour - perhaps a user from a foreign nation - and instantly block them out of the company's network. Morgan says swift action like this is crucial to limit damage when an attack is already underway.
Crucial to any organisation's security preparations, Morgan says, is investment in big data analytics. An effective platform should closely monitor all activity in a company's network and break down the statistics in a digestible way for business analysts and CISOs - so they can then create the solutions most applicable to the specific security needs of their organisation.
We've dropped into the the Cyber Attack Remediation and Mitigation zone to hear an address from Glyn Morgan of security firm LogRhythm. Morgan started by emphasising the old adage - it's a matter of WHEN not IF your organisation will suffer a cyber-attack. In the current threat landscape, you simply have to be prepared.
Kevin Mitnick opens IP Expo 2013: "Anti-virus software isn't going to save you" - check out our run down of the key issues addressed by hacker turned security expert Kevin Mitnick during his keynote address.
We've just weaved through a packed show floor to meet the team from Steljes - manufacturer of productivity solutions for schools and offices.
The firm's new Smart Meeting Pro looks a real winner, enabling the user to scribble notes all over documents, web, pages, spreadsheets, and more, with handwriting tech converting annotations to usable text. Meeting notes can then be gathered and ordered via an extremely responsive UI, before being sent out via email. No more time-consuming typing up and distribution of hand-written minutes...
There's a whole lot more it can do too, so swing by and have a scribble if you're here at Earls Court today.
Great keynote from Kevin Mitnick! Stay tuned.
"We have to improve detection, too. Most companies don't even notice us in their network until we hand them the report."
So where do companies go wrong in their approach to IT security?
"Companies don't audit their security enough. They might do a penetration-test once a year, because it's part of regulations, but they'll release an update every month. That gives us hackers our opening... you could buy all the technology at this expo, but if one guy at your enterprise makes a mistake, you'll have malware spreading through your network. You have to identify your weak links."
"Snowden's disclosures were extremely damaging for the US government, because now the adversary is aware of the risk. People though that you could go out and get a pre-paid SIM card, and be anonymous. But thanks to Snowden, we know that the NSA can identify those phone users."
Mitnick: "When I'm researching a target, I'm primarily using social media to discover their social connections, their position, who they trust. Even peer-to-peer networks. What people don't realise is that when they connect to one of these networks, the entire contents of their hard drive is visible to that network."
Mitnick: "Social engineering was important back in the 70s, but it's just as important now."
Mitnick: "the attacker has to find just one victim within a company who will open a .pdf. My favourite method is to use LinkedIn. I'll target sales and marketing, spoof communications from a trusted source. I could even register a domain that's similar to someone I know is one of their contacts. I send the .pdf, and once the target opens it - Game Over."
Mitnick just hacked a computer and stole someone's password using a word document. Now he's installing a rootkit using a .pdf. Scary stuff!
Mitnick: "the number one problem for companies is sloppy egress. That's letting too much out."
Mitnick: "They told a federal judge that not only do they have to detain me, but they have to keep me away from any phones, because I could call up NORAD, whistle some codes down the line, and launch an ICBM. The judge believed them, and I ended up in solitary confinement for a year."
Kevin Mitnick: "I was addicted to hacking the way kids nowadays are addicted to computer games."
Kevin Mitnick: "I was addicted to hacking the way kids nowadays are addicted to computer games."
Most importantly, be sure to come visit us in the exclusive ITProPortal.com lounge, which is stand V4, just next to the Microsoft Hybrid Cloud area
In the meantime, get your head in the game by checking out our IP EXPO 2013 preview
First up this morning is an opening keynote from former fugitive hacker turned white hat security guru Kevin Mitnick - watch this space as we've got two of our crack writers over in the Keynote Theatre as we speak
Good morning from Earls Court! We're now live from IP EXPO 2013
- 17 October
IP EXPO is officially over for another year. We hope you enjoyed our coverage of the show and got a chance to visit the team over in the ITProPortal lounge on the exhibition floor. Scroll down for the best of the keynotes, seminars and announcements from a packed two days in West London.