Page 20 - Telecom Reseller April-May 2014
P. 20
Telecom Reseller 23 March/April 2014
Telecom Reseller
23
March/April 2014
20 Telecom Reseller
April/May 2014
AUDIN
LEWIS
continued from page 17
continued from page 17
CONSUMERIZATION
CONSUMERIZATION
Continued from page 10
taken into consideration, it’s understandable What Reliability Numbers Do Not Include
tchoantseunmtereprricsoesnhvaevresna’tiorunsh,edthteoygeatrsetarfitend.iYnegt Continued from page 10
Ebvelniewviethtthaetbcesutrirnefnratstsroulcuttuiroendsesdigon,neovtenstusp-
tcthoenicsrluopmclkaecirsetcicnoknitnvhge,rasenantdtieotrhnpesr,ilsoetnh.geNyretaharerleypefihrianoldfinogf wbpeiollrioet cvtcehuerththfauatltlrceupdrourrcetenfothliseorleuolitfaibominlitsoybdoifloea ndoaetva iscueps-,
otehfneitnierarpcptrliioascneestirn(e4tct6h%es)eonat,reetrhperaihcsitegi.vheNelryetahrelxyripshlkoalrfinogf cpaeonrdtterct,ohsusetchifsualtslh: epboirgtfgoelsiot cohfallmenogbeilefordeSvMicBes,.
bewenactyoemrspterosi.suese I(o4T6%to)maarkeeabcutsivineelyss dexecpilsoiroinsg
●aBnoPdothcwoesertnfaitseilrutphrereisbeisggaensdtcShMallBensgebefloiervSeMtBhas.t
●BoOthpereantoter reprroisres and
MDM solutions can be too complex for
SMBs believe
that
ways to use IoT to make business decisions and are looking at ways sensors can pro-
●MMDMalicisooulsuattitoanckss can be too complex for implementation.
pro-
HanodmaeregrloowkninAg cactewssaCysonsetnrsoolrs can vide increased analytics and investigating
●imFpilrementation.
Enterprises are investing in app devel-
Enterprises are investing in app devel- Svoidheowinacrreesayssetdemaandamlyitnicisstratnodrsicnuvrreesntitglyating vendors to help with analysis. Wearable
vndorstohelpwianalysis.Wearable
● Floodopment, for both employees and custom-
opment,forbothemployees and custom- keepingtrackoftheauthentictionkeysuseddevices from smart watches, Google glass
deviesfromsmartwatches,Googleglass
●Storms/hurricanesers, more than SMB. Enterprises are see-
ers, morethanSMB.Enterprisesaresee- andFitbitsarebecomingmainstream.Forty tosecure M2M communications?Manyuseand Fitbits are becoming mainstream. Forty
Youneedto understandthat inmostcaes,srvicing benefits of this investment, including
spreadsheetsorwritehomegrowscripts forpercent of enterprises are preparing to sup-
intgerrbuepntieofintsscaoufsedthbiys sicnenvaersitoms seuncth, aisnacblouvdeing cpoenrtcreonlltinogf deinstreirbpurtiosens, maroeniptorerpinagriangd toaksinugp-
increased employee productivity (56%) and
port at least some employee use of wear-
ainrecnreoatsfaecdtoermedpilnotoyerelipabroilidtyucotimviptuyta(t5io6n%sb)yand ipnovretntaotryleoafsdtespolomyedekmeypsl.oAyseoeneusceanoimf awgeinaer,-
increased customer satisfaction (46%).
able deceives, compared to 25% of SMBs.
tihnecrdeaatasecedncteursotpoemraetrorsa. Wtishfailcetiitoisnre(4as6o%na)b.le tahbilseapdpercoeaicvhesa,llocwoms mparneydkteoys2t5o%falol tfhSroMugBhs.
tChaItTtEhesaenudnptrhedeictFaublteuerventosfarNe leftwout of
tVhencrdaockrs.RPeroqcuesisresmforeentssuring identities
CITE and the Future of New
Vendor Requirements
Technologies
computations, this will produce higher reliability
are removed when unneeded are commonly
Organizations are integrating CITE into
Technologies
numbers than may be the real experience.
Organizations are integrating CITE into
lacking. There may be no regular scanning; so
The Internet of Things (IoT) and wear- their culture for multiple reasons. Over the
The Internet of Things (IoT) and wear- able technology trends are no longer just their culture for multiple reasons. Over the
unauthorized back doors can be added without
next 12-18 months, organizations expect
able technology AtrUeDnINdscoanrtienunesoonlopnager23ju››st
next 12-18 months, organizations expect the organization knowing.
to see CITE creating a positive impact in
to see CITE creating a positive impact in
Organizations risk more than hacker attacks
user satisfaction, user productivity, process
user satisfaction, user productivity, process by neglecting M2M security. They also flout efficiency and collaboration, and business
efficiency and collaboration, and business industry standards and federal regulations that agility. Organizations have a long priority agility. Organizations have a long priority
demand centralized control of the identities
list for selecting mobile technology solu- list for selecting mobile technology solu-
that access sensitive data, including finance, tions. Security and reliability of the soft- tions. Security and reliability of the soft-
healthcare, telco and others. Since these are ware or network are the top requirements ware or network are the top requirements
all industries in the midst of a drive to build
(each 90%) closely followed by ease of use (each 90%) closely followed by ease of use
Big Data infrastructures to capitalize on user
(88%) and integration into existing infra- (88%) and integration into existing infra-
trend data, by failing to secure their M2M
structure (87%).
connections adequately, they run the risk of
“CITE gives employees more access and
failing audits and getting slapped with fines.
opportunity to use rogue technologies iin
their day-to-day work. IT executives mustt
Best practices
stay on the cutting edge of both enterpriise
To address these risks, administrators and IT
and consumer technologies in order tto
staff should take the following steps:
provide solutions to their organization thatt
● Discover: Data center administrators,
embraces and encourages innovation. With embraces and encourages innovation. With security teams or identity and access
so many tools and solutions this is not an so many tools and solutions this is not an management staff often lack transparency into
easy task,” continued Yorke. weahseyretaidsekn,”titcieosnatrienusteodreYd,owrkhea.t information
those identities are permitted to access and what
Join the CITE Conversation Join the CITE Conversation
business processes they’re supporting.
Join more than 1,000 technology and
Join more than 1,000 technology and
● Monitor: Admins should monitor to business executives, IT managers, mar-
business executives, IT managers, mar- determine which identities are in active use keters, venture capitalists and sponsors keters, venture capitalists and sponsors
and which are associated with inactive users
at the CITE (Consumerization of IT in at the CITE (Consumerization of IT in
or processes. The good news is that in many
the Enterprise) Conference + Expo as we the Enterprise) Conference + Expo as we
enterprises, unused – and therefore unneeded explore the continuing innovation and chal- explore the continuing innovation and chal-
– identities usually are the vast majority.
lenges around the use of next-generation lenges around the use of next-generation
Once these unused identities are located and technologies in business today. From inno-
technologies in business today. From inno-
removed, the scope of the overall effort is
vation with mobile, social, cloud and big vationwithmobile, social, cloud and big
reducedsignificantly.data -- what IDC calls the Third Platform— data--whatIDCcallstheThirdPlatform—
●Manage:mplementing centralizedcontrol to wearable computing, 3-D printing, otoverwadedairnagb,lcehancgoimngpauntdinrge,mo3v-inDg mparcihnitnineg,
sensors and more, CITE will show you isdeenstoitrises aisntdhemneoxrtes,teCp.IThTEis swteipllensahbolwes you
how to employ new technologies to drive pholwicyt-obaesemdpglovyerneawnceteocvhernohloowgitehse itdoendtritiivees
your business. The CITE Conference + ayroeursebdu, esninsuesress. nTohmeorCe IuTnEmaCnaognefdeirdeenncteitie+s
Expo will take place April 27-29, 2014
can be added and provides verifiable proof of
Expo will take place April 27-29, 2014
in San Francisco. Stay informed; follow
compliance.
in San Francisco. Stay informed; follow
CITE Conference + Expo on Twitter: @
● Remediate: With visibility and control CITE Conference + Expo on Twitter: @ CITEConference #citeconf. Also join our
established, identities that are needed but
CITEConference #citeconf. Also join our Twitter chats using the hashtag #CITEchat,
are in violation of policy can be updated to
Twitter chats using the hashtag #CITEchat, Fridays at 10 am PT beginning March 28.
conformance without disrupting ongoing
Fridays at 10 am PT beginning March 28. To learn more about sponsorship oppor-
business processes. For example, a machine
tunTitoiesleartnCmIToErewaobroldu’tsspCoInTsEorsChoipnfoeprepnocr-e
identity might be supporting an active process,
+tunEixtipeos,aptleCaIsTeEcwoonrtaldc’tsACdIaTmE DCeonnfiesroencaet
but have a higher level of privilege than is
a+dEenxnpios,onp@leaisdegecnotnetrapcrtisAe.dcaom.Dennisonat
needed for the task.
adeAnnbiosount@idgtheneterpriIsDe.Gcom. Enterprise
The tools and processes supporting these
ConAsbuomuetrizatitohne of IITDGin theEEnnteterrpprriise
best practices provide risk mitigation and
RCeosnesaurmcherization of IT in the Enterprise
compliance on an ongoing basis. The goal is to
ResIeDaGrchEnterprise’s 2014 Consumerization
stop thinking of security as a one-time event,
of IT in the Enterprise research was con- IDG Enterprise’s 2014 Consumerization
and more as a process the organization must
ducted across more than 1,150 IT and of IT in the Enterprise research was con-
adhere to on a constant basis.
security decision-makers from a range ducted across more than 1,150 IT and
of industries. The research goal was to security decision-makers from a range Looking forward
gain a better understanding of how con- of industries. The research goal was to The advent of Big Data has opened up a
sumer technologies are being used in the gain a better understanding of how con- spectrum of new business possibilities within
enterprise, and how those technologies are sumer technologies are being used in the a staggering number of industries. In the mad
enabling innovation. All respondents are enterprise, and how those technologies are
dash to capitalize on these opportunities,
involved in at least one of the follow- oerngabnliiznagtioinsnaorve afatioling. tAo lalderqeusaptoenlydsenctusreare
ing steps in the purchase process of IT or Min2vMolvceodmminunaictatlioenas,tleoanviengotfhetmhevuflnoellroawble-
security products and services: evaluation, tiongthsetfte,phsaciknerthberepacuhrecshansde hperftoycefisnsesofroImT or recommending/ selecting vendors, deter-
fsaeicleudriatuydiptsr.oducts and services: evaluation, mining requirements, determining the busi-
recTomcomepnlydiwnigth/ nsewlercetginuglativoenns daonrdsi,nduestterry- ness need, approval/authorization or selling
smtaindinargdrseaqnudirpermotecntsa,gdaientsetrbmreinacinhgestwhehibleusi- internally.
bringing Big Data under a sound identity and
ness need, approval/authorization or selling To receive the complete study results
access management umbrella, organizations
internally.
contact Sue Yanovitch at syanovitch@
should give these best practices close
To receive the complete study results idgenterprise.com. %
consideration.
contact Sue Yanovitch at syanovitch@
idgenterprise.com. %
p1-28_TelecommsReseller_AprMay_2014.indd 20
13/05/2014 20:25