12
…optimise your IT investments Taming the device creep Fran Howarth, Bloor Research [email protected]

…optimise your IT investments Taming the device creep Fran Howarth, Bloor Research [email protected]

Embed Size (px)

Citation preview

…optimise your IT investments

Taming the device creep

Fran Howarth, Bloor [email protected]

telling the right storyConfidential © Bloor Research 2013

Why are devices so important? How we got here....

telling the right storyConfidential © Bloor Research 2013

What the future holds

telling the right storyConfidential © Bloor Research 2013

Where we are today

telling the right storyConfidential © Bloor Research 2013

Device proliferation

Sources: IMS Research, Cisco

2020

2012

7.6

7.1

28

9.6

Internet-connected devices World population

Billions

telling the right storyConfidential © Bloor Research 2013

Personal vs corporate devices

Overall, 62% use their personal devices for work, but only 28% claim that their IT department is aware

Government and NFP

Creative

Pharmaceutical and healthcare

Finance and accounting

Legal and professional

71

48

28

11

8

29

52

72

89

92

Do you use your own device for work?

Yes No

Source: Workshare

telling the right storyConfidential © Bloor Research 2013

Need for access on the move

78

35

88

33

Use of file sharing platforms

Use finance Authorised to use finance Use legal Authorised to use legal

81% employees access work documents on the move, 69% use free file sharing platforms overall

Source: Workshare

telling the right storyConfidential © Bloor Research 2013

“Bring your own app”

2008 - 2011 2012 2013

37

83

165

4682

Yearly in billions Cumulative in billions

Source: Portio Research

telling the right storyConfidential © Bloor Research 2013

Emerging technologies useful for work?

Internet-enabled TV

Internet-connected cars

Internet-enabled gaming consoles

Google Glass and wearable technologies such as smart watches

21

38

48

50

How long will this take to happen?16% say immediately, 33% say when costs come down.

Just 8% say such technologies will not become widespread.

Source: Fortinet

telling the right storyConfidential © Bloor Research 2013

Where does this leave us?

In a security mess—sensitive data resides on a mass of devices, many of which lack appropriate security controls.

Blindsided—unable to see all the devices, endpoints, users and applications and resources on the network they are connected to.

Struggling to keep up—productivity declines if access cannot be granted and controlled effectively.

telling the right storyConfidential © Bloor Research 2013

What is needed?

VISIBILITY over:Who the users are—their profile, their role

What devices they are using—and where they are and what apps they are using for context-based access decisions

What network systems are affected

The information security risk in terms of overall operational risk

Policy enforcement

telling the right storyConfidential © Bloor Research 2013

Putting it all together