Welcome!

@CloudExpo Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan

Related Topics: @CloudExpo, Mobile IoT, Cloud Security

@CloudExpo: Blog Post

Security & Mobile Experience Are Symbiotic By @JackieKahle | @CloudExpo [#Cloud]

Studies show that both security and mobility are not mutually exclusive

A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and identities – mobility customer experience, in fact, ranks number two in top security priorities.

Yes, that really says 42% of respondents say improving mobile customer experience is a top priority for their organization, which is a great thing. After all, did you see how many iPhones Apple sold last quarter? That’s a lot of mobile devices being used for commerce, data collection, work and play. And latest research sees it having an impact on security practices.

Digging a little deeper into the results brings more encouraging data: Controllers rank improving mobile customer experience slightly higher than enablers (44 percent vs 42 percent). This means even those with a conservative view of security practices realize they can’t ignore the user experience while keeping systems secure.

Customers and employees have a love-hate relationship with security practices. We want our data and systems safe, but cumbersome passwords, secret questions and authorization links make our jobs and daily lives more difficult. Strong passwords alone are hard enough to type on a full-size keyboard while sitting at your desk. Using a small touch screen to enter 16 random characters, numbers and symbols feels impossible.

Security boundaries are being pushed by mobile technologies. It is no longer about throwing a moat around systems and data to keep the bad guys out and good guys in. Data flows everywhere and people want access from anywhere. Organizations are taking advantage of application programming interfaces (API), enterprise mobility management and other technologies to provide access in ways we couldn't dream of a just few years ago.

It is gratifying to see that as organizations open up data and enable productivity, they’re also not trying to tie old-school security practices to newer forms of technology and interfaces. Instead, they’re leveraging new digital identities, threat analytics and more to maintain a good security posture while keeping a positive frame of mind about user experience.

Mobile is not only the future, it is now, making it imperative that those charged with designing and enforcing IT security walk the fine line of protecting data and enabling the customer experience.

More Stories By Jackie Kahle

Jackie is a 30-year veteran of the IT industry and has held senior management positions in marketing, business development, and strategic planning for major systems, software, and services companies including Hewlett-Packard, Compaq, and Gartner. She currently manages the strategy and execution of CA Technologies thought leadership programs. Jackie has an MBA from the Whittemore School, University of New Hampshire, a BA in Mathematics from New York University and is the Vice-Chair of the N.H. State Council on the Arts.

CloudEXPO Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you're forecasting for tomorrow.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.