Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Pat Romanski, Roger Strukhoff

Related Topics: @CloudExpo, Mobile IoT, Cloud Security

@CloudExpo: Blog Post

Security & Mobile Experience Are Symbiotic By @JackieKahle | @CloudExpo [#Cloud]

Studies show that both security and mobility are not mutually exclusive

A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and identities – mobility customer experience, in fact, ranks number two in top security priorities.

Yes, that really says 42% of respondents say improving mobile customer experience is a top priority for their organization, which is a great thing. After all, did you see how many iPhones Apple sold last quarter? That’s a lot of mobile devices being used for commerce, data collection, work and play. And latest research sees it having an impact on security practices.

Digging a little deeper into the results brings more encouraging data: Controllers rank improving mobile customer experience slightly higher than enablers (44 percent vs 42 percent). This means even those with a conservative view of security practices realize they can’t ignore the user experience while keeping systems secure.

Customers and employees have a love-hate relationship with security practices. We want our data and systems safe, but cumbersome passwords, secret questions and authorization links make our jobs and daily lives more difficult. Strong passwords alone are hard enough to type on a full-size keyboard while sitting at your desk. Using a small touch screen to enter 16 random characters, numbers and symbols feels impossible.

Security boundaries are being pushed by mobile technologies. It is no longer about throwing a moat around systems and data to keep the bad guys out and good guys in. Data flows everywhere and people want access from anywhere. Organizations are taking advantage of application programming interfaces (API), enterprise mobility management and other technologies to provide access in ways we couldn't dream of a just few years ago.

It is gratifying to see that as organizations open up data and enable productivity, they’re also not trying to tie old-school security practices to newer forms of technology and interfaces. Instead, they’re leveraging new digital identities, threat analytics and more to maintain a good security posture while keeping a positive frame of mind about user experience.

Mobile is not only the future, it is now, making it imperative that those charged with designing and enforcing IT security walk the fine line of protecting data and enabling the customer experience.

More Stories By Jackie Kahle

Jackie is a 30-year veteran of the IT industry and has held senior management positions in marketing, business development, and strategic planning for major systems, software, and services companies including Hewlett-Packard, Compaq, and Gartner. She currently manages the strategy and execution of CA Technologies thought leadership programs. Jackie has an MBA from the Whittemore School, University of New Hampshire, a BA in Mathematics from New York University and is the Vice-Chair of the N.H. State Council on the Arts.

CloudEXPO Stories
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a significant part of their IT budgets in the very near future. As IoT solutions are growing rapidly, as well as security challenges growing exponentially, without a doubt, the cloud world is about to change for the better. Again.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?” The answer: the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise. Join W. Curtis Preston,...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embracing the reality of Serverless architectures, which are critical to developing and operating real-time applications and services. Serverless is particularly important as enterprises of all sizes develop and deploy Internet of Things (IoT) initiatives.