Welcome!

@CloudExpo Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Liz McMillan, Zakia Bouachraoui

Related Topics: @CloudExpo, Mobile IoT, Cloud Security

@CloudExpo: Blog Post

Security & Mobile Experience Are Symbiotic By @JackieKahle | @CloudExpo [#Cloud]

Studies show that both security and mobility are not mutually exclusive

A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and identities – mobility customer experience, in fact, ranks number two in top security priorities.

Yes, that really says 42% of respondents say improving mobile customer experience is a top priority for their organization, which is a great thing. After all, did you see how many iPhones Apple sold last quarter? That’s a lot of mobile devices being used for commerce, data collection, work and play. And latest research sees it having an impact on security practices.

Digging a little deeper into the results brings more encouraging data: Controllers rank improving mobile customer experience slightly higher than enablers (44 percent vs 42 percent). This means even those with a conservative view of security practices realize they can’t ignore the user experience while keeping systems secure.

Customers and employees have a love-hate relationship with security practices. We want our data and systems safe, but cumbersome passwords, secret questions and authorization links make our jobs and daily lives more difficult. Strong passwords alone are hard enough to type on a full-size keyboard while sitting at your desk. Using a small touch screen to enter 16 random characters, numbers and symbols feels impossible.

Security boundaries are being pushed by mobile technologies. It is no longer about throwing a moat around systems and data to keep the bad guys out and good guys in. Data flows everywhere and people want access from anywhere. Organizations are taking advantage of application programming interfaces (API), enterprise mobility management and other technologies to provide access in ways we couldn't dream of a just few years ago.

It is gratifying to see that as organizations open up data and enable productivity, they’re also not trying to tie old-school security practices to newer forms of technology and interfaces. Instead, they’re leveraging new digital identities, threat analytics and more to maintain a good security posture while keeping a positive frame of mind about user experience.

Mobile is not only the future, it is now, making it imperative that those charged with designing and enforcing IT security walk the fine line of protecting data and enabling the customer experience.

More Stories By Jackie Kahle

Jackie is a 30-year veteran of the IT industry and has held senior management positions in marketing, business development, and strategic planning for major systems, software, and services companies including Hewlett-Packard, Compaq, and Gartner. She currently manages the strategy and execution of CA Technologies thought leadership programs. Jackie has an MBA from the Whittemore School, University of New Hampshire, a BA in Mathematics from New York University and is the Vice-Chair of the N.H. State Council on the Arts.

CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Cloud computing is a goal aspired to by all organizations, yet those in regulated industries and many public sector organizations are challenged in adopting cloud technologies. The ability to use modern application development capabilities such as containers, serverless computing, platform-based services, IoT and others are potentially of great benefit for these organizations but doing so in a public cloud-consistent way is the challenge.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching of virtual storage services to its enterprise market.
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.