Internet of Things
IoT Viewpoints explore the IoT opportunity in 2018 and beyond. Download our latest e-book to get our newest collection of thought leadership articles on the emerging IoT trends, technologies and opportunities.
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise mobility initiatives with a view to growing the business and increasing operating efficiency. However, corporate information security management policies do not appear to be adapting quickly enough to cope with the tumultuous rate of change imposed by the rapidly evolving business and technological landscape.
Although encryption has been around for many years, it has come to the fore again recently as a means of making it more difficult to gain unauthorized access to sensitive or confidential information, especially within the context of mobile devices. We fully expect increased adoption of encryption technologies in the near term as organizations bolster conventional approaches to information security management in an attempt to stem the flow of data leakage incidents and privacy breaches.
Ovum believes that most data will eventually be encrypted at rest and/or in motion; however, for a variety of technical, practical, and legislative reasons, organizations must be diligent and meticulous in their use of this technology, with the customer and employee experience being of paramount importance. Companies can prioritize the encryption of corporate data by carrying out a data classification exercise across their business processes and IT infrastructure.
Data classification can be a resource-intensive and costly process, as not only is it time- and resource-consuming to implement a manual classification in the first place, but it also requires employees to be aware of changing classification policies going forward. There is also the issue of applying policies to information and data items that are already in motion or in distribution channels.
While training can help raise the awareness of data privacy and information security management issues, organizations must first focus on the basics, which means putting in place a set of robust, reliable, and easy-to-use solutions to address the most common data-related activities that employees undertake every day. For most enterprises, this means improving email information security management and adopting a more proactive approach to the distribution and sharing of file attachments.
Going forward, the only realistic way of managing and maintaining such processes is to instantiate the organization's information security management regime through the use of automated, policy-driven implementations. And in the case of email messaging and file sharing/transfers, this means adopting solutions that are capable of securing data in motion as well as data at rest, both on-premise and in the cloud, and in a manner that is near enough invisible to the business end user.
To read more on this topic, see Ovum's full-length report, Maintaining Corporate Privacy in the Digital Age.
Straight Talk is a weekly briefing from the desk of the Chief Research Officer. To receive this newsletter by email, please contact us.
Consumer & Entertainment Services
By Adam Thomas 28 Mar 2018
With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.
By Evan Kirchheimer 26 Apr 2018
Service provider interest in justifying 5G investment through its potential to open new revenue streams from the enterprise segment is growing ever greater.
Europe, Middle East & Africa team - +44 (0) 207 017 7700
Asia-Pacific team - +61 (0)3 960 16700
US team - +1 646 957 8878
Already an Ovum client? Login to the Knowledge Center now