skip to main content
Close Icon

In order to deliver a personalized, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. By continuing to use this site and access its features, you are consenting to our use of cookies. To find out more about the way Informa uses cookies please go to our Cookie Policy page.

Global Search Configuration

Introduction

Evidence suggests that information security management, with a particular emphasis on privacy and secure transmission, is now starting to drive additional investments.

Highlights

  • Enterprises are investing in digital transformation programs. However, Ovum is concerned that corporate information security management policies do not appear to be adapting quickly enough to cope with the tumultuous rate of technological change.
  • Although encryption has been around for many years, it has come to the fore again recently as a means of making it more difficult to gain unauthorized access to sensitive or confidential information, especially within the context of mobile devices.
  • Ovum believes that most data will eventually be encrypted at rest and/or in motion; however, for a variety of technical, practical, and legislative reasons, organizations must be diligent and meticulous in their use of this technology.

Features and Benefits

  • Understand the market, business, and technical issues affecting the world of information security management.
  • Assess the business benefits of a holistic approach to data encryption within the context of mobile device management and customer communications.
  • Consider the business management and legal implications of moving to cloud-based services.

Key questions answered

  • Why is securing sensitive data in motion just as important as when it is at rest?
  • How does data encryption protect professional and brand reputation?
  • What are the implications of encrypting all corporate data?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Market context

  • CIOs appreciate the need and urgency to do a better job of managing information security
  • Information security management underpins government, business, and commerce

Business focus

  • The expectations of business IT users are set by their personal use of consumer IT
  • Email has become woven into the fabric of IT systems and line-of-business applications
  • Cloud services give rise to data sovereignty issues
  • The long-term protection of customer and corporate privacy presents a significant challenge

Technology focus

  • BYOD and mobile device proliferation present significant challenges to corporate IT policies
  • Mobile devices are often treated as second-class citizens where email encryption is concerned
  • Restrictions on large email file attachments are driving business users toward shadow IT
  • Enterprise IT infrastructure and end-user computing environments are going to be hybrid

Appendix

  • Methodology
  • Further reading
  • Author

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 7770704398 or email us at pr@ovum.com

Contact marketing - marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now