Smart Enterprise Magazine

Volume 7, Number 3, 2013

Issue link:

Contents of this Issue


Page 36 of 43

Mobility alerts on local deals. The ability to scan QR codes on magazine pages and street signs has created a new mobile-marketing awareness and demand-generation channel. And oil-products distributor Global Partners is installing Internet-connected devices at some of its oil terminals. "As we have more IP-enabled devices, we can control and monitor them remotely," CIO Piddington says. "It's very important." "The exponential growth of mobile penetration is extending well beyond traditional handsets to include anything that can conceivably house a sensor," adds Michael Hyatt, VP for Corporate Strategy at CA Technologies. "This covers a wide range of unexpected uses from pill bottles that initiate prescription refills, to data centers that optimize power consumption, to industrial machines that predict and prevent equipment malfunctions." Total Transformation Mobile devices have also transformed how employees collaborate with partners, customers and other employees. When sales and customer-service staff are equipped with mobile devices, they gain anywhere, anytime access to sales and corporate information, business analytics and social collaboration services — all of which can help speed customer service, decision-making and sales closings. "The impact of mobile technology is not just about work efficiencies and letting users choose their devices and modes of engagement," says Karen Sage, VP of Product Marketing, New Business Initiatives, at CA Technologies. "It's a total transformation in the way IT must think about the offering of IT services to best enable users to consume and take advantage of these services, while at the same time minimizing the inherent risks by extending capabilities and access to data beyond the traditional boundaries." From an IT and security perspective, the fast pace of mobile adoption, along with new bring-your-own-device (BYOD) policies, create daunting security, application-management, and deviceinventory challenges. IT can no longer control or limit end-user devices, applications and services. Instead, IT must now balance employees' freedom of choice and productivity on the one hand with the need for enterprise security and management on the other. "As IT budgets shift and are handled by line-of-business managers outside the IT department, it will become imperative for IT and security groups to focus on mobility initiatives that enable and support the objectives of the business," says Tyson Whitten, Director of Mobile Security Product Marketing at CA Technologies. "IT and security can't focus solely on protecting the organization by relying on device-centric practices. Instead, they must empower the organization to grow and move forward by also managing the applications and content. Identity becomes the common denominator that can enable this balanced approach." One large area of concern for IT leaders is mobile security. Piddington at Global Partners is among those considering identity management and other mobile security solutions. In part, that's because mobile technology and the BYOD ethos upend decadesold strategies for securing the corporate perimeter. Today, IT must focus on securing a newly extended enterprise, one in which many applications may be run by a Software-as-a-Service (SaaS) vendor, perhaps unbeknownst to IT. It's also an environment in which IT must arrange or deny access to its most sensitive information for mobile employees, partners and customers, often while using their own unmanaged mobile devices. "You have to assume the worst and treat everyone as external," says Eve Maler, Principal Analyst for Security and Risk Professionals at Forrester. "That's why we advocate a 'zero trust' model of information security." Two elements are essential to this "zero trust" approach: robust enterprise identity management and single sign-on platforms. These can positively identify, authenticate and authorize users — and their devices — for all the applications, services and information they're entitled to use. Once users have logged in, they can move from application to application, and from service to service, without having to be continually re-authenticated. Adds Sage of CA Technologies: "Identity has become the new perimeter. Rather than securing just the network perimeter, now you must also control remote devices, manage their applications and orchestrate a user's ability to access, retain and move enterprise data. Being able to manage devices, applications and content with special attention around identity is the means to do that." Fraud is another obvious issue prevalent in both online and mobile channels. Many CIOs are investigating new solutions, including CA RiskMinder™, that build a risk profile of a user session based on the mobile device, the user's location and his or her behavior. "One big trend is the move away from passwords," says Larry Ponemon, Chairman and founder of the Ponemon Institute, which researches IT security, data protection and privacy. "Passwords were helpful in the past, but they're really not that helpful today, and that's why hackers are getting into our accounts. The key is to find other forms of authentication that are easy, yet more secure. We're seeing new technologies that actually can make mobility much more secure." My Device, My Choice Most mobile users say they, not the enterprise, selected their devices. 70% I Tablet I Smartphone I Laptop 67% 15% 15% I Desktop 37% 46% 71% 13% 15% 14% 8% 20% I chose it myself The company issued it directly I chose it from a company-approved list DATA: Forrester Research, "Building the Business Case for a Bring-Your-OwnDevice (BYOD) Program," November 2012. Survey of 4,982 information workers at organizations in Canada, France, Germany, the U.K. and the United States with at least 20 employees. Percentages do not total 100 because of rounding. 2013 • SMART ENTERPRISE 37

Articles in this issue

Links on this page

Archives of this issue

view archives of Smart Enterprise Magazine - Volume 7, Number 3, 2013