.png)
Belgium 10-3-26 All Members Physical english
From modular business design to AI-driven pipelines, architectures, and operationsA composable enterprise is built on modular processes, API-driven ecosystems, low-code platforms, and cloud-native services. It promises speed and adaptability by allowing organisations to reconfigure their capabilities as conditions change. However, modular design alone does not guarantee resilience; the way these systems are engineered and operated is just as important.This is where AI is beginning to make a difference. Beyond generating snippets of code, AI is already influencing how entire systems are developed and run: accelerating CI/CD pipelines, improving test coverage, optimising Infrastructure-as-Code, sharpening observability, and even shaping architectural decisions. These changes directly affect how quickly new business components can be deployed, connected, and retired.In this session, we will examine how CIOs can bring these two movements together:Composable design is the framework for flexibility and modularity.AI-augmented engineering is the force that delivers the speed, quality, and intelligence needed to sustain it.The pitfalls of treating them in isolation: composability that collapses under slow engineering cycles, or AI that only adds complexity without a modular structure.The discussion goes beyond concepts to practical implications: how to architect organisations that can be recomposed at speed, without losing control or reliability. The outcome is an enterprise that is not only modular in design but also engineered to adapt continuously under real-world conditions.
Read More
Belgium 12-3-26 Physical english
Tomato! Tomato! Tomato! Get your tomato now! Every vendor sells security. And every company depends on vendors, partners, and suppliers. The more digital the business becomes, the longer that list grows, and so does the attack surface. One weak link, and there is always one, or one missed update, and trust collapses faster than any firewall can react. What used to be a procurement checklist has become a full-time discipline. Questionnaires, audits, and endless documentation prove that everyone’s “compliant,” yet incidents keep happening. So it’s clear: the issue isn’t lack of policy, or maybe a bit, but mostly lack of visibility. Beyond a certain point, even the most secure organisation is only as safe as its least prepared partner (or an employee who hadn’t had their morning coffee). So how far can you trust your vendors? How do you check what you can’t control? And when does assurance become theatre instead of protection? Does it come at a different cost? Let’s exchange what works and what fails in third-party risk management: live monitoring, shared responsibility models, contractual levers, and the reality of building trust in a chain you don’t own. A closed conversation for those redefining what partnership means when risk is shared but accountability isn’t.
Read More
Belgium 19-3-26 Country Members Physical french
Moins de Partenaires : La consolidation vaut-elle le risque ? Le problème est la prolifération des fournisseurs : trop d'outils causant de la complexité, une taxe d'intégration paralysante et de la redondance. La Taxe d'Intégration est le coût caché (en temps, en échecs et en ressources) d'essayer de faire fonctionner ensemble des systèmes disparates. Cet échange se concentre sur des stratégies éprouvées pour simplifier de manière agressive le parc technologique, consolider les fournisseurs et élever certains fournisseurs clés au rang de partenaires stratégiques.
Read More
March 12, 2026 Squad Session Invitation Only Physical english
Tomato! Tomato! Tomato! Get your tomato now! Every vendor sells security. And every company depends on vendors, partners, and suppliers. The more digital the business becomes, the longer that list grows, and so does the attack surface. One weak link, and there is always one, or one missed update, and trust collapses faster than any firewall can react.
Read More
March 24, 2026 Squad Session Invitation Only Physical english
Every organisation has them, projects that keep running long after their purpose has faded. No one remembers who asked for them, but shutting them down feels riskier than keeping them alive. And eventually, people stay assigned, budgets stay allocated, and energy drains into work that no longer matters. Inertia at its finest.
Read More
March 26, 2026 Squad Session Invitation Only Physical english
AI projects continue to multiply, but proving their value remains difficult. Most organisations can track activity, not impact. Dashboards count pilots and models, yet few translate to measurable business outcomes. The result is familiar: success stories without clarity on what they actually delivered.
Read More
CIONET Trailblazer: CISO: The Shift from Prevention to Resilience: Turning Visibility into Execution
Published on: January 28, 2026 @ 9:48 AM
CIONET Trailblazer: AI Transformation: Bridging the Cultural Divide to Achieve Competitive Advantage
Published on: December 17, 2025 @ 9:16 AM
Constructs a secure, user-friendly learning environment that uses VDI, utilizes multiple OS, and minimizes server load
OVERVIEW
By making multiple OS used on one PC and equalizing the uses of each terminal, Kansai University wanted to improve the learning environment and optimize infrastructure. When a Windows environment was migrated to a VDI, it was essential that incidents such as virus infections of terminals were prevented from occurring. The university was looking for a security product that minimizes load on servers in order to shorten login times for the Windows VDI and start lectures smoothly.
The University achieved an anti-virus solution which offloaded processing via virtual appliances without increasing load on VDI servers. Start-up times were reduced by 30%. Trend Micro’s solution updates anti-virus software pattern files and applies them automatically thereby greatly reducing workload for operational management. By selecting which VDI to boot, the University has achieved a learning environment that can utilize multiple OS.
CHALLENGES
Under the founding motto “Protect justice with authority”, Kansai University has constantly been involved in the development and education of society and its citizens since it was established in 1886. In addition to thirteen faculties, thirteen graduate schools, and three professional graduate schools, the University is also equipped with all educational institutions from pre-school to high school and aims to foster human resources through an integrated schooling system.
The University is also well known for focusing on the importance of IT, computer knowledge and technical skills from an early stage. Since the Faculty of Informatics was established in 1994, it has provided a multifaceted curriculum related to data processing. “From beginner typing lessons to programming and other lectures for more advanced students, we provide science and arts students with a place to acquire a broad IT knowledge. To be specific, we have established dedicated classrooms with machines which are used for lectures and self-study and have either Windows, Mac, or UNIX (Solaris) OS.” explains Kansai University’s Masaki Ogino.
However, there had been a certain problem associated with this type of operating model in the past – an insufficient number of Windows terminals. “There were not enough physical terminals for the number of lectures and students who wanted to use them. Consequently, while they were being used in a lecture, they couldn’t be used for self-study by other students,” Ogino continues. In order to solve the problem, the faculty investigated the deployment of a VDI (Virtual Desktop Infrastructure). With a VDI, it is possible to use OS prepared in a virtual environment without relying on physical terminals.
The University felt that students’ quality of learning would increase if they could use a Windows environment from any terminal at any time. “At the time, we had already prepared a UNIX (Solaris) environment by VDI. By migrating Windows to a VDI as well, we felt that we could create an environment in which it was possible to access either OS from a single terminal,” says Ogino. Furthermore, the faculty also wants to establish a BYOD (Bring Your Own Device) environment in which it would be possible for students to access school systems from their own PCs and smart phones in the future. “We concluded that a VDI platform would be the most effective,” explains Ogino.
It is essential to implement advanced security on servers and terminals accessed by large indefinite numbers of students and Trend Micro Deep Security is essential for creating a secure VDI.
Masaki Ogino
associate professor Faculty of Informatics, Kansai University
SOLUTION
In the end, it selected a Fujitsu proposal which adopted VMware vSphere and Horizon (with View) for the Windows VDI virtualized platform. “We proposed this solution as we were impressed with its superior performance aspects such as fast transfer speeds using the PCoIP protocol, as well as a VMware’s solid market track record. The University was also impressed with these aspects,” explains Fujitsu’s Toshiaki Miike.
There was an aspect which had to be considered when deploying the VDI — how to implement security for it. “With a VDI, multiple virtual machines are run on one server. This caused us to worry that running agent-type anti-virus software on each individual machine would overload the system and reduce performance,” says Ogino. In truth the faculty had been facing a problem that their netboot think client system they’d been using takes too much time to start that time for lectures was shortened. In other words, restricting server load to an absolute minimum and achieving fast start-up times was an important condition of the VDI deployment.
Fujitsu chose “Trend Micro™ Deep Security™” as the solution to meet this requirement. Deep Security can perform virus scans as a virtual appliance without installing agents on individual virtual machines. Offloading the processing requirements of individual virtual machines allowed the University to create a secure VDI without affecting performance.
“Deep Security leads the market in compatibility with VMware and deployment results. In addition, the experience that our partner for this project, Fujitsu, had from using it in a number of deployments and builds gave us a sense of security and supported the adoption,” continues Ogino.
Deep Security leads the market in compatibility with VMware and deployment results. In addition, the experience that our partner for this project, Fujitsu, had from using it in a number of deployments and builds gave us a sense of security and supported the adoption.
Masaki Ogino
Associate Professor Faculty of Informatics, Kansai University
RESULTS
The faculty created a learning environment in which Mac OS, Unix and Windows could be used by adopting Macs for physical terminals and letting users choose a VDI to operate. By also preparing a Windows VDI environment for PCs brought to work by staff in addition to the terminals for students, the faculty built a 340 machine Windows VDI. “We included a total of fourteen VMware vSphere as the virtual platform for Windows, eleven of which were for the VDI and the remaining three were for virtual servers. We used Deep Security to apply an antivirus to each of these,” explains Miike.
During the deployment process, the University compared response times of Deep Security and an agent-type product. “Firstly, we installed an agent-type anti-virus product on individual virtual machines and ran fifty virtual machines simultaneously. We then replaced this with Deep Security and went through the same running procedure,” says Ogino. The results showed that start-up times had decreased by approximately 30% with Deep Security. Now that actual operation has begun, there is no deterioration in response when students simultaneously log in and lectures are able to start smoothly.
Furthermore, with agentless solutions such as Deep Security, operations such as updates and application of anti-virus software pattern file are performed on the server side, which means that update operations do not need to be performed for each terminal. This greatly reduces operational workload. “There have been no incidents so far and we are confident that we have created a system which can instantly detect an incident should something occur,” Ogino says indicating his level of satisfaction.
In the future, the faculty plans to expand its VDI learning environment by deploying additional terminals for IT education as they are needed. At the same time, it also wants to start preparations for realizing an environment for the previously mentioned BYOD. “During this process, we want to actively investigate using the features of Deep Security other than the anti-virus that we adopted for the current project. We are expecting Trend Micro to offer us proposals for issues unique to universities and educational institutions, and which take product functions to another level,” concludes Ogino.
We utilized the support of Trend Micro during the project. We are extremely thankful for the fast and accurate response.
Toshiaki Miike
Third Solutions Department
Educational Third Solutions Supervisory Departmen
Health Care and Educational Systems Division Fujitsu
88 Views 0 Likes Read More
Digital Transformation is redefining the future of health care and health delivery. All stakeholders are convinced that these innovations will create value for patients, healthcare practitioners, hospitals, and governments along the patient pathway. The benefits are starting from prevention and awareness to diagnosis, treatment, short- and long-term follow-up, and ultimately survival. But how do you make sure that your working towards an architecturally sound, secure and interoperable health IT ecosystem for your hospital and avoid implementing a hodgepodge of spot solutions? How does your IT department work together with the other stakeholders, such as the doctors and other healthcare practitioners, Life Sciences companies, Tech companies, regulators and your internal governance and administrative bodies?
Read More
The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.
Read More
Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !
Read More
CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.
Read More
Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!