The European Identity Awards honor projects that promote the awareness for and business value of professional Identity Management and Cloud Security.
May 15, 2013 at Munich, Germany
KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
The European Identity Awards honor projects that promote the awareness for and business value of professional Identity Management and Cloud Security.
May 15, 2013 at Munich, Germany
The European Identity Awards honor projects that promote the awareness for and business value of professional Identity Management and Cloud Security.
May 15, 2013 at Munich, Germany
Right now I've gonna turn over to our founder and chief Analyst, Martin Kuppinger so we can get on with the European identity award ceremony for this wonderful year, 2013, Take away. Yes.
Thank you, Dave. And like every year at DSC, we do this European identity and cloud award. I think we started in the second year of ESE. So it's done the sixth time that we bestowed these awards. And first of all, let me say, I think the, when I really seen this year, when, when we received a significant number of nominations for that is that we, we really saw a very significant increase in maturity in many areas.
And I think that's, that's really interesting, you know, when I look back the some for five, six years right now, where projects were at that point of time, where they are right now, and those things are really maturing. So we are far more mature and a far more business aligned level for identity access governance cloud. And so that's, that's really, I think a very, very positive thing to observe that things are, are really making a significant progress. And so I want to start with the, the part of the ceremony. It was restoring the awards and different categories.
We have our standard categories such as best identity and access management project, best access governance project. We have also, I think the sort interesting this year, we really were in a situation where we saw some highly interesting projects where we said, you know, these are specific. They really added some very, very valuable things where we said, okay, we have two really bestowed them as special award due to their excellence in a particular area. And so we will have, I think in total we will have 11 awards this third today, and I trust one of directly start.
And what we will do is we always have, will have someone doing validation. So two or three minute lation, then we will hand over the awards, do some photos, etcetera, move to the next one. So that's, that's the plan. And we will try to find a good balance between really giving you some good information about the awards, having it done in a nice atmosphere and not taking too long for the dinner dinner. Okay. Let's start. And the first lation, it's not that the award goes to Mike even while he might have, yeah. Even we might, should give him an award at some point of time.
But in that case, it's really, he does the lation. And in this case, he does the lation, the best identity and access management project.
So Mike, it's your term. Thank, thank you very much, Martin.
Well, it's a great honor for me to give this award and to understand this award, you have to go back to the UK's greatest hour, which for many of us was the Olympic games last summer in summer of 2012. Now these games were well prepared. And for the most part, they went well. There was a small security alert at the very beginning when it appears that an 87 year old lady tried to bypass security in getting without a ticket by parachuting into the games. It turned out that since she was the queen, she didn't need a ticket anyway, but there we are.
So there was a lot of preparation for these games and not the least of that preparation was to do with the infrastructure and it to give you an example that in the 1948 games, the telephone infrastructure was supported by one person at a telephone with a desk in 2012, all of the world's television and everything, all of the media went through that telecommunications infrastructure. And so it required a very considerable effort. And part of the effort to do with building that was building some wifi access in, in the London tube.
Now, for those of you that haven't been to London you'll realize, or you didn't know that the tube in fact is underground. And that means that wifi access is quite a challenge. And indeed in March, 2011, the contract was put out to provide that infrastructure. And that infrastructure had to be delivered on time. And unlike much of the Olympic infrastructure, it actually had to have a life after the Olympic games. And to give you an idea of the identity challenge that, that, that Provo, that infrastructure created as trains came into the, the stations, the devices would authenticate.
There was no infrastructure in the tunnels. So every two minutes there would be another train into that particular thing.
And this, this basically boiled down to around several million authentications a day. And so it's with some pleasure that I can say that I'm announcing this award to Virgin media and Virgin media is an interesting company because Virgin media is a fusion of three.
What, we're not very good media companies into a very excellent company today. And this award, the technology was put in by Sena and the award since Virgin is not able to be here today. The award goes to Paul Edmondson, who is going to represent Virgin, please.
Paul, will you come to the front, Paul? Okay. If he doesn't come, can I have it?
I, I, I have, I've seen him, but given that you're the UK citizen on stage, you probably best then take that award. I think he should have known. And I I'm really a little bit surprised, but, but I seen most of the others which will receive an ARR today. So hopefully it's the only no show here. It's it's yeah, that's probably, maybe because the tube always is too late. Yes. You perhaps she's parachute failed. Okay. So then things happen. So no photo, bad luck let's move forward. I will do the next one myself, the next validation.
And I've talked before about access governance projects, really moving closer to the business. And this project here is I think a very great example. It's sort of the, the second evolutionary phase or maybe third even, or what more. And it really moves up the stack. And it's a project which really is a business project at the end of the day. It's about how can I manage complex segregation of duty rules across divisions in a very, very large financial institution.
How can I really be successful in, in dealing with this very complex with this very complex scenario where a lot of different entities, which usually don't tend to talk with each other will talk about sods. How do I enable my business to fulfill the compliance requirements and such a complex landscape? And I think this project, from what I've seen, I've seen a lot of projects on the, the finance industries from the approach. It takes the high level and the maturity definitely very, very outstanding project. And so it's an honor for me to Beto the reward to the Deutsche bank.
And I would like to ask Mrs. Carin file to come to the stage. Thank you. Thank you.
You might, you might say some words if you, you want to like, like to there's a microphone. Yeah. Thank you. I just feel like the Oscar goes to identity and ex's governance at Doche bank. So my team and I, we are very proud, especially because this is an award coming from an expert forum, so it's a special award to us and yeah. Thanks a lot. Yeah. Okay. Thank you. Here you go. Thank you. Thanks again. Thank you. Thank you.
And yeah, by the way, it's, it's always, ah, here, here we go. We, we trust make short step back. Paul Edmondson. So come on. Yeah. Okay.
Paul, thank you. Congratulations. Thank you. Good to you as well. So here you go. Thank you.
Okay, perfect. Okay. And you gotta hand it over to version. Finally. I would like to apologize.
Yes, no, you don't need to apologize, but you might say some words. I do like to apologize because I was doing the business, but there we are. It's life. A very interesting project. I do represent Virgin media here. Unfortunately, couldn't be with us, but really good to be appreciated to represent Virgin media. It was a tremendous project and, and Mike's done a great explanation in terms of what we had to deliver. And so I'm really proud on behalf of Virgin media to accept this. So thank you very much, indeed. Thank You. Bye.
Okay, then skip through my slides and okay. You might say, okay. We had the best access governance and intelligence project this year. Yes. And there's a second one which addresses this thing from a different angle. And Peter will talk a little about it. Good. Thank you, Martin. Can everybody here? Yes. I won't be talking that long. I'm also hungry. So The next award here, this project is outstanding, both in scope and the architectural approach to it. The company here opted for using dynamic authorization management at the time of access, right?
In order to enforce segregation of duty rules and other access controls, instead of following the established approach of aesthetically assigning access rights as common access governance approach due the chosen approach, which is based on products from axiomatic and ATO directory, X is a new approach to have new challenge around risk and concept based authentication and authorizations and the approach combined with the fact that the company actually manage to roll out the innovative and complex solution. We feel qualifies for an award.
Please help me and welcome to the states, Daniel Fry from Swiss reassurance. So the award goes to Swiss free, please. Welcome Mr. Daniel. Hi. So I think the blow was very fast, so Thank you very much. Congratulations. Thank you. Thank you. Okay. Okay. The microphone is yours. Thank you.
So, first of all, thank you very much for, for this award. I'm, I'm very honored to accept that award on behalf of history and like at the Oscars I'd like to thank my mom and all, all my friends know, I actually want to thank the whole team, which is around 100 persons involved. They did a great job. We are still working on the next releases and I'm certain that next releases will be even more fantastic that the current ones already are. Thank you so much. Thank you. And you heard this nomination for the 2014 award already. Okay. Let's move forward.
The next one, the next lation again is done by Mike and it's about the best cloud security project. Mike, thank you. The view that are, are read. What I write about will know that cloud security is close to my heart and indeed cloud security is one of those areas that many, many organizations are concerned about it. And so for anyone to provide a solution to these problems is, is a great move forward.
And one area that has been much neglected in the area of cloud security is that to do with identity and access management in indeed this afternoon, I, I, I moderated a workshop on identity management as a service, and I must admit that I'm not clever enough to really fully understand it, but it seemed like there were a lot more problems than even I had been aware of.
So it is with some pleasure that I can report that there is at least one organization that has found a solution to some of these problems and indeed has deployed it, that they have deployed a solution, which brings together in a way, which is acceptable to governments, to public services, as well as businesses, a way of identifying customers and identifying citizens who are accessing cloud services in Norway. And this is a project that was run by the organization called every, and I'm pleased to announce that they are the winner and Mr.
Annie Bergen, please, will you come forward to receive the Award here is. Ah, Thank heavens for, so thank you very much and welcome. Congratulations. Congratulations. Congratulations. Thank you. Thank you. Thank you.
Okay, great. Here you go. It's always nice to be appreciated for the work one does. And it's very nice to, to receive this and thank you very much for looking to the dark places outside of the European union, where we in Norway resides on top of that, I would like to, to give our regards to net IQ, which is the producers of the software we built this platform on my team has been working very, very closely with net IQ and the feeling that we really have a partnership between net IQ and every has been given us this solution. So thank you very much. Thank you. Okay.
Another category standard category we have is the best approach from improving governance and mitigating risks, which is a fairly broad field of things which could be in there. I think Peter will talk a little bit about, I think there's a good reason to choose a broad track from that category of products in that case, in that particular industry. So Peter talk about the project. So now I've had my practice. So we'll try this again. Many of you, or some of you will probably have seen that.
I moderated a session earlier today talking about privilege management, talking about how we should do it. And therefore it is very interesting that we now have a project concerning that this project here happened at a hospital then previously in managing their account passwords on their servers around. They tried to go for a homegrown script build solution. Not very well passwords were handling planes, all the problems that we see around it and with all the regulatory requirements in the healthcare industry, obviously that needed to be changed with Lieberman's software.
This hospital managed to implement cryptographic and complex administration of the passwords. It's now been handled automated with one time passwords. And actually this is an example of how three major objectives were accomplished in one project meeting high strict regulatory compliance, securing, and auditing access to highly sensitive data and improving it productivity as a lot of free time was also freed up for their staff as a result of this, please welcome to the stage university medical center, Hamburg and Adolph represented by Y Stabler from IB informatic.
Thank Speaker 10 00:19:30 You very much. Thank you. Thank you. Congratulations. Thank you. Speaker 10 00:19:34 Thanks. Okay. Thank you. Thank you. This one. Okay. Speaker 10 00:19:50 Thank you. In the name of university in Hamburg at Endorf we as a, we as a partner of Liman made this implementation and we are very proud of, of this implementation because we implemented it in three days. So it was very short implementation time. So thank you very much for the award and have a nice day. And thank you.
And I think the, the timeframe is really something which was impressing around this project. Let's move forward, Craig, it's your term? It's about the best innovation and new standard in information security. I think this year it was a obvious choice. Wasn't it? Speaker 11 00:20:37 Correct? Yep. Move forward with the next slide. Okay. Speaker 11 00:20:43 Yeah. So over the last couple of days, we've been talking about identity management as a service identity, access governance and control.
And I think there's no question that OAuth and the things that have been done with these guys is gonna change how we look at identity management. So Mike, thanks. Okay.
Like, like all standards, there's a big team and Mike is here to represent this team. So my congratulations to all the team, all the people working on this on the standards, I think there are several ones of few here in the room withdrawals supported it. And so we asked around who will be there and then Mike or Tony Netherland said, look for Mike or someone else. And then we said, okay, Mike, it's your term.
Okay, perfect. And I think S is really one of the standards which are so influential, you know, it's new and it's influential and it's really alive even while it's a standard.
Okay, Mike, Speaker 12 00:22:00 So I'll be brief. I'll just say that I'm honored to accept this award on behalf of all the people who work to make the OWA standards real and are building useful solutions with them. Indeed. I think the value of the work is evident in just the ever increasing number of really interesting and useful solutions being deployed with it. It's quickly become the default means of accessing or of authorizing access to resources on the internet.
Indeed, this underlies the API economy, which we've been hearing so much about. So again, on behalf of all who worked on OAuth, thank you to temperature call for this recognition. So let's, let's move forward in that case.
No, Jackson is another one who receives the award. Jackson will do the lation, which does not mean that he wouldn't be a candidate, but he's, he's younger than he looks with his gray hair. So thank you, Jackson, Speaker 13 00:23:09 You know, Martin and the team asked me to do this. And of course at the time, Martin says you have three to five minutes to talk about someone's lifetime achievement.
And I, but I thought, wow, that's a challenge. And then he introduces other people and says, you have one to two minutes to do this. So I'm gonna take my time. I know that I'm between, you know, dinner and you know, the festivities, but this deserves a couple of minutes.
And, and this is very personal for me. In 1990, I got to work on a project that reduced cost in the company I worked for by two orders of magnitude. So a quarter of a million dollars cost to $2,500. I saw some software. That to me was amazing.
I, I, I got on the phone and called my boss in Nairobi, Kenya. He was there at the time doing a, a, a deployment and said, you know, you've gotta see this. Speaker 13 00:24:06 It's, it's one of the most amazing things I've seen. And that started, you know, an amazing relationship. And a few years later, 1993, I joined the company of, of this gentleman.
And it, you know, just for me to see the influences that have occurred with some of the people, you know, in the industry that you may know some of these names, you may not know some of them, but leaders like Dean Palmero from Banon Jim Chen, who used to be a group vice president at Microsoft. But at the time was VP of engineering at Banon Tim house, the LDAP standard, the LDAP directory from university of Michigan and the Netscape great involvement and, and sway and direction with the NA the network applications, consortium companies like Becktel.
I mean, even companies that today I still talk to and they still talk about those days, Nike sprint caterpillar. I'll never forget seeing my colleague getting an order from the us Marine Corps and a discussion about his software and them saying to him, don't forget, we're armed. You are not. So it was very clear that things had to work, you know, in 1996, something amazing happened. Speaker 13 00:25:32 He presented the meta directory concept and the, and the directory join and the identity join at Burton group 96 in Colorado Springs.
Craig was there, a number of us were there to me, was the start of a whirlwind, a whirlwind of amazing, you know, evolution of identity management before, you know, we even talked about what that word was and meta directory and, you know, influence with, and by people like Craig and, and Judith and Jamie Lewis and doc circles. I was just remembering tonight that I recall having beers on a, on a, on a back porch someplace with, you know, and having all kinds of crazy discussions.
Jamie Lewis, of course, Phil Zimmerman, David Goodman, the people that he has influenced is, is, is endless, you know, in 1999, a company that I didn't even know where they were based, showed up at his door and said, we'd like to acquire you. Speaker 13 00:26:36 I had to look up where, where, where Microsoft was based.
You know, the tornado started, I got to witness a gentleman who could sit there and have a discussion as a peer with someone like bill gates and do amazing things, you know, reach a distinguished engineer status, interact with the, you know, European union, Robert Scoble, Andre Duran, all kinds of people, all kinds of luminaries. You know, I saw amazing things where a ship, the course of a ship was corrected multiple times. And Craig and I were talking about that earlier today. Things like adopting the SAML two protocol, you know, all of the things.
I mean, I'll never forget a meeting. I was in one time where some people were talking about how they were gonna build an LDAP directory that had no security controls on it. And the discussion that followed that was amazing because you know, our, our lifetime achievement awardee has such a way around him to teach people and, and enable them to understand the problems. Speaker 13 00:27:51 Sometimes that it's, it's truly amazing.
And, you know, I, I left Microsoft in 2005 and I've taken a lot of learnings and I use them, you know, from, from our man quite a lot. And you don't need to look through a set of, in oculars to see the influence he's had at Microsoft and the influence he's had in the world of identity and access management of privacy and security.
You know, he once said, and I truly believe in this in heaven, there will be no PKI. I, I hope that that comes true. The opposite of course, is that in hell, if you do go there, guess what you get to work on all day.
So, so with that, just as a great personal, you know, opportunity for me, and also to, you know, from a professional perspective to introduce the lifetime achievement award envelope, please should be hard to, to too. We do like, we, Speaker 13 00:28:50 It should be hard to add up who this would be. Yeah. I think it's really very, very, Speaker 13 00:28:54 Yes. So Where, Speaker 13 00:28:56 Where see here, Here you go. Thank you for this great novation. You're welcome, Kim lady first. Thank thank you.
Okay, So picture. Yeah, exactly. Okay. Thank you. You can go there and also say some words. Thank you. Trexon Speaker 11 00:29:45 Well, I really don't know what to say. Thank you very much. Thanks to everybody in the room. So many friends here, I feel overwhelmed. Okay. Okay. Speaker 11 00:29:58 Thank you. Great. Thank you. You do not. Okay. Let's move forward. And we end, not at the end for a while. There are some, some others, and the next one is again, one where I will do the speech.
So that's, I think one of these, these very, very interesting projects I've seen, I've seen a lot of projects I've been involved in some way or another, just looking at them or being a little bit closer to them. And, and in many, many situations I said, okay, you know, sort of technology follows organization, technology follows organization, processes, the guidelines, all the things you need to have these things in place to do technology, right. And that's always a, if a project starts and many situations, it's really a challenge because projects are run of significant technology focus.
In this case, it's an org that goes to the organization team to sort of the, the people really looking and caring for how do I enable my organization to really do access governance rights, which people do I need in the business organization, setting up these processes, cetera, a project that has been supported by the management, which I think is a very important thing to be successful in such type of projects.
But it's from my perspective, the project, this is that is, I would say really most focused on, on changing organization on a broader scale, really implementing organization structures, moving it forward to a new level and enabling really a successful access governance and successful implementation of technology in a later stage stage in that case, the project and the, the award really is focused on this business.
It alignment and the organizational aspect, well defining processes, well defining guidelines, really having a, a pyramid of documents, which are consistent, which has cost a lot of work, but which really enables to move forward with successful access governance in a high sensitive environment. In this case, in the finance industry, even while the name looks like an automotive vendor, the special award on bridging the organizational gap in between business. And it goes to Volkswagen financial services. This is the, the bank, the insurance, the leasing company of Volkswagen.
And it goes to Marek B, please. Welcome Mr. Marick. Bingo. So congratulations. Thank you very much. Speaker 15 00:33:38 Okay. Speaker 16 00:33:44 Yes. Thank you very much, Martin, for the great words. I think you describe our challenge between business and it, when we are talking about excellent management at first, thank you very much to the experts, to give us this positive signal, to do the right things on the right time. And I can say this prize is going to my team. I am the captain, but with the wrong team, you cannot play this game.
And I say, thank you very much to everyone. And I wish you a great conference and you and your team do a great job this week. Thank you very much. Thank you. Okay. And let's move forward. The next one validation will be held by Sasha.
Oh, Sasha. Where are you? Probably he's gone with Paul somewhere else. He brought Paul. So maybe he has left.
Now, here he goes. SA it's your turn. Need to take this one. Speaker 14 00:34:58 Thank you, Martin. So I think we need to, oh, sorry for that. I think we need to speed up the process of this award ceremony by somewhere or the other. So the special award, I have two special awards actually, which are related to project management competency.
So this, that I have to tell you something about, and the first one is about speed. So getting things done in really fast time. So the company that is going to award to get the award is a company that trades energy at a global scale, such trading business involves significant risks. Furthermore, it is part of highly. It is part of a highly regulated industry in general, with specific regulations applying to the trading business itself. So I've been now in a number of trading environments and looking at the people how they work there.
This is amazing trading energy is much more amazing than trading at a stock market. Speaker 14 00:35:58 So you really, if you have a chance to go there and see this it's really astonishing after an initial phase in which the requirements were defined and various solution approaches were evaluated, a vendor selection process took place. The vendor cross ideas afterwards had less than four months time for a fully operational solution. This solution was delivered in time meeting the defined deadlines and delivering the requirements of the auditor.
A specific challenge in the environment of that company was very specific applications in use. The core business of the company runs on specialized business applications and highly nonstandard. So it is really homemade and very specialized company. So very close to nuclear plant type of software. So due to its lean approach, achieving the targets in a short period of time, this project is a great example for running access governance projects, lean and efficiently, and the award goes to Ian global communities. Please welcome. That's Speaker 17 00:37:19 A good question. Thank you.
Thank you. I will be quick. Speaker 17 00:37:49 So thank, thank you very much. And actually, I, I shouldn't be here on stage because today actually one of my colleagues should be here, jerk Passaic, but he had to be and see the doctor. So he couldn't join the conference. Unfortunately again, to say also he shouldn't be here because the team should be here and the whole team, or a good amount of the team is already here, but they cannot be all on stage unluckily.
I'm very honored to take this because of the speed of things, because yesterday my boss was here and he was mentioning in the keynote a little bit that couldn't, couldn't it be a little bit quicker? Well, apparently it couldn't.
Oh, it can always come. Speaker 17 00:38:32 And we've got, I've got two project managers of the project here and maybe that's one of the reasons why we were so quick. So we had two project managers twice as quick. I'm glad that we are not compared with the Olympic games in London, like in the first load show, because although the games were perfect and everything, the one thing that I didn't like was I applied for 12 tickets and getting on, so this is much better. So thank you very much and have a great evening. Okay. So the next lation will be done by Rob Newby.
And I thinking Peter and Rob, you're seeing that our team is growing. Yes.
And, and as well from that perspective, I will skip the, the newbie joke I've used Skipp before we've done. So Rob your turn. Speaker 18 00:39:30 So this award it's a special award for what I think is a truly impressive feat it's for the rapid redesign and reimplementation of an entire IM it's made all more impressive by the numbers involved. It's a truly global company.
It's got 85 group companies operating in a hundred countries with 45,000 employees achieved by creating a complete and comprehensive roadmap, full integration with HR processes and consolidation of 72 separate ad domains into one using quest one identity manager, which would all be very impressive in itself, but it not only met project timelines implemented in new windows version as it went. So for these reasons, the European identity award for rapid redesign and reimplementation of IM goes to Shindler.
Yeah, please VO Rini and Gary Edwards Stewart on stage. There he goes. Come both. Thank you. Congratulations. Thanks. Speaker 15 00:40:43 So thank you. Okay. It's your turn. Thank Speaker 19 00:41:06 You. Yeah. So just a few words. I hope that I would be the first person to make a reference to thinking their mom and the Oscars, but somebody else already took that. But there's another name up there, which is RTO Tomas, who is over here sitting on this table over here. And he's really the key to our success. He created a team that believed in it and, and drove the strategy.
And that's the reason why we were able to really consolidate and achieve this project globally. And it's a special thanks to this guy over here, and I'm up here accepting it, but really it's this man over here that, so thank You.
So, and if I count it right, we're now at award number 11, again, a special award. I think again, a very, very interesting thing Sasha will talk about and clearly it's last but not least. It's really one of these again. Very impressive. Speaker 14 00:42:12 Yeah.
Again, it's a project management related award, which excels this time, not in speed, but in complexity, the project started in Q1 2012. It combines the functionality of a classical identity management system with search services, workflows and approvals with the functionality of identity and access governance. The goal is to cover more than 1200 bank applications today, approximately 200 are already managed by the service. And up more than eight hundreds are still on the roadmap until the end of this year.
So 1200 in two years, the first phase of the project we've processed selves and approval went live in September, 2012. It supports more than 20,000 users in London, New York, Singapore, Tokyo, Hong Kong, Milan, and more besides the German headquarters and subsidiaries technically wise the product built on the IADA identity suite and Microsoft forefront, identity manager, the overall approach, the rapid delivery and onboarding concept and the successful deployment of this complex project qualified this project for European identity award. The award goes to Huify. This will That's.
Speaker 20 00:43:51 Thank you for much. That's okay. So thank you very much as a special owner for us. And it's it's for my team.
So, and I, I like to dedicate this, this trophy, this award to my team, because otherwise it will be not happened. The only thing I have to do was to organize the budget. So it's the minor part of the project. The work is done by the team members. Yeah. Speaker 20 00:44:43 So thank you very much. Thank you for the audience and I wish you nice evening. And I think after that, you can go to dinner.
Yeah, Just, just a moment, but you're right overall. So before you all run out, there are several reports out on this project.
So we, for most of the projects, we have written a short report sort of executive view, which gives them some more insight into this project. And as I've said at the beginning, I, I think there's the number of projects and type of project really show just things are really going forward. We're seeing really significant process progress in the maturity of what happens in the broad IM IHT space. And I think seeing that that many, many of these projects in fact, were, were more business than, than pure it projects are really business driven and, and pushed by the business.
I think this is really the, the fundamental change when I go back some five or six years where it was far more about technology first, handing the technology. And I think that aligns well with the keynote at it, where he said, you know, we have a great opportunity of creating business well and supporting business, and we should keep this in mind.