skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Ovum view

Summary

Organizations have faced security challenges for centuries. However, securing information used by computers, and the applications and networks that access this information, has come to the fore only in recent decades. Furthermore, the demand for security has been blown out of the water by digital transformation initiatives over the past 15–20 years. A documented and agreed security strategy aligned with business objectives is essential to support these initiatives.

A security strategy should run throughout the organization

In centuries gone by, organizations developed ways of dealing with security issues. Individuals perhaps had to know a secret password to access business premises, letters were sealed with wax to prevent tampering between locations, and secret recipes were stored in a locked and hidden safe. These strategies evolved gradually over time, as organizational needs developed. However, the rapid rate of progression over recent decades has resulted in an environment where many organizations lack a documented and agreed security strategy suitable for modern enterprises.

Protecting an organization’s digital systems and information is a priority in today’s technology-centric world. According to Ovum’s ICT Enterprise Insights survey, the management of security, identity, and privacy is second only to the creation of digital capabilities in terms of IT trends. Further strategic investment is planned in a whole range of security software and services.

However, this investment may become haphazard if there isn’t a security strategy upon which to base the security software and services elements. A security strategy effectively provides a mandate from the top of the organization that security is taken seriously and is important to the enterprise’s continued wellbeing. It helps to focus security spending, not only on the necessary technology but also on the processes and people needed to support the strategy.

For those organizations without a documented security strategy, a good place to start is to engage with the business to decide how to align the security approach with overall organizational strategy to support desired objectives. Knowing what the organization’s plans are for the next few years (usually, three) aids definition of the security strategy. This strategy is governed and maintained by security leaders (e.g., a chief information security officer or chief security officer) throughout the organization, working with the enterprise to achieve the desired security posture.

Appendix

Further reading

ICT Enterprise Insights 2017/18 – Global: ICT Drivers and Technology Priorities, PT0099-000002 (September 2017)

“Digital transformation must address security,” INT003-000088 (March 2018)

“Security and privacy efforts can lead to stronger customer engagement,” INT001-000022 (January 2018)

Author

Maxine Holt, Research Director, Infrastructure Solutions

maxine.holt@ovum.com

Recommended Articles

  • Service Provider Markets, Consumer & Entertainment Services,...

    MWC 2018 Highlights

    By Ronan De Renesse 27 Feb 2018

    Over 20 of our senior Ovum analysts and consultants attended this year’s Mobile World Congress in Barcelona at the end of February. In between meetings, briefings and presentations, our analyst team were blogging and tweeting about key developments, trends and rumors. Have a look through our daily MWC 2018 Highlights to find out what happened.

    Topics 5G AI IoT Cloud Payments SDN/NFV Smart home

  • Enterprise Decision Maker, Enterprise IT Strategy and Select...

    2017 Trends to Watch: Big Data

    By Tony Baer 21 Nov 2016

    The breakout use case for big data will be fast data. The Internet of Things (IoT) is increasing the urgency for enterprises to embrace real-time streaming analytics, as use cases from mobile devices and sensors become compelling to a wide range of industry sectors.

    Topics Big data and analytics IoT

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 7770704398 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now