Monday Jun 16, 2014

It’s Time for Businesses to get Serious about BYOD

It’s Time for Businesses to get Serious about BYOD
Klaus Bergius, Director of Technology Marketing EMEA at Oracle

Bring Your Own Device (BYOD) is a corporate reality that is already affecting virtually every business operating today. In some ways BYOD is inevitable, with businesses having little choice but to adapt to it. Consumer smartphones, tablets and laptops may eventually end the corporate mandating of employee devices. But currently, there is widespread concern and even denial in enterprises, while embracing BYOD could create new opportunities. This is what the Oracle European BYOD Index Report, based on research carried out in January and February 2014, reveals.

This Index assesses the opinions of Chief Security Officers, Chief Information Security Officers or other personnel responsible for information security at 700 businesses in the Nordics, Germany and Switherland (DCH), Benelux, the UK, France, Italy and Iberia (Portugal and Spain) – across all major industry verticals. It seeks to understand where in the deployment of key BYOD technologies and processes European businesses are and what their opinions are with regards to the future of BYOD.

Barriers to Adoption
The latest research  from Oracle suggests that few businesses in Europe have fully warmed to BYOD, with 44 per cent of businesses stating that they dislike BYOD and only allow it in exceptional circumstances. A further 22 per cent have a complete ban on data or information residing on a BYOD device and – perhaps most worrying – 20 per cent have no rules in place at all. Half of organizations are not managing smartphones as part of BYOD, and there seem to be big concerns around security. Device security (45 percent), application security (53 percent) and data security (63 percent) were all listed as areas of concern.  Full BYOD Index Report

The Awareness Gap
This issue, however, is not a technological or process one – it is an educational one. For me, the main thing hindering further adoption of BYOD across Europe is a lack of awareness of what exactly it is  and what can be done to secure it. Fortunately the technology already exists to cost-effectively deliver secure BYOD. Containerization, or sand-boxing as it is sometimes referred to, illustrates this point perfectly.  But in our survey the majority (37 percent) of the IT professionals we asked had never even heard of it, let alone deployed it (only 8 percent reported that they have deployed containerization).  Full BYOD Index Report

Device vs. Application Management
Functions such as locking or remote wiping the device content or doing firmware upgrades are the domain of MDM (Mobile Device Management). Managing applications on devices typically is in the MAM (Mobile Application Management) area. But why should we continue to separate them from each other, thus fragmenting the overall solution into small pieces that are addressed by multiple vendors? Why shouldn’t we view MDM and MAM as overlapping areas, and moreover, treat it as ‘just’ an extension of corporate Identity and Access Management, by simply extending this solution to include device and application management features? This is exactly what Oracle Mobile Security Suite does.  Full BYOD Index Report

Outlook
In an attempt to widen this research and find out what the readiness and opinion towards BYOD is in other parts of the world, Oracle is currently preparing a second version which shall cover North America, South America, Eastern Europe, Middle East and Africa as well as Asia Pacific countries. And in addition to the aspects of data security, device security and application security, we will also include cloud security as an additional aspect. It will be extremely interesting to compare results, so stay tuned for an update!


Thursday Jun 12, 2014

BYOD is not a fashion statement; it’s an architectural shift - by Indus Khaitan

Ten years ago, if you asked a CIO, “how mobile is your enterprise?”. The answer would be, “100%, we give Blackberry to all our employees.”

Few things have changed since then:

1.    Smartphone form-factors have matured, especially after the launch of iPhone.
2.    Rapid growth of productivity applications and services that enable creation and consumption of digital content
3.    Pervasive mobile data connectivity

There are two threads emerging from the change. Users are rapidly mingling their personas of an individual as well as an employee. In the first second, posting a picture of a fancy dinner on Facebook, to creating an expense report for the same meal on the mobile device.

Irrespective of the dual persona, a user’s personal and corporate lives intermingle freely on a single hardware and more often than not, it’s an employees personal smartphone being used for everything.
A BYOD program enables IT to “control” an employee owned device, while enabling productivity. More often than not the objective of BYOD programs are financial; instead of the organization, an employee pays for it.  More than a fancy device, BYOD initiatives have become sort of fashion statement, of corporate productivity, of letting employees be in-charge and a show of corporate empathy to not force an archaic form-factor in a world of new device launches every month.

BYOD is no longer a means of effectively moving expense dollars and support costs. It does not matter who owns the device, it has to be protected.  BYOD brings an architectural shift.  BYOD is an architecture, which assumes that every device is vulnerable, not just what your employees have brought but what organizations have purchased for their employees. It's an architecture, which forces us to rethink how to provide productivity without comprising security.

Why assume that every device is vulnerable?

Mobile operating systems are rapidly evolving with leading upgrade announcement every other month. It is impossible for IT to catch-up. More than that, user’s are savvier than earlier.  While IT could install locks at the doors to prevent intruders, it may degrade productivity—which incentivizes user’s to bypass restrictions. A rapidly evolving mobile ecosystem have moving parts which are vulnerable.

Hence, creating a mobile security platform, which uses the fundamental blocks of BYOD architecture such as identity defragmentation, IT control and data isolation, ensures that the sprawl of corporate data is contained.

In the next post, we’ll dig deeper into the BYOD architecture.

Tuesday Jun 10, 2014

Nominations now open for the Oracle FMW Excellence Awards 2014

2014 Oracle Excellence Award Nominations
Who Is the Innovative Leader for Identity Management?



•    Is your organization leveraging one of Oracle’s Identity and Access Management solutions in your production environment?
•    Are you a leading edge organization that has adopted a forward thinking approach to Identity and Access Management processes across the organization?
•    Are you ready to promote and highlight the success of your deployment to your peers?
•    Would you a chance to win FREE registration to Oracle OpenWorld 2014?


Oracle is pleased to announce the call for nominations for the 2014 Oracle Excellence Awards: Oracle Fusion Middleware Innovation.  The Oracle Excellence Awards for Oracle Fusion Middleware Innovation honor organizations using Oracle Fusion Middleware to deliver unique business value.  This year, the awards will recognize customers across nine distinct categories, including Identity and Access Management

Oracle customers, who feel they are pioneers in their implementation of at least one of the Oracle Identity and Access Management offerings in a production environment or active deployment, should submit a nomination.  If submitted by June 20th, 2014, you will have a chance to win a FREE registration to Oracle OpenWorld 2014 (September 28 - October 2) in San Francisco, CA.  Top customers will be showcased at Oracle OpenWorld and featured in Oracle publications.  

The  Identity and Access Management Nomination Form

Additional benefits to nominees
Nominating your organization opens additional opportunities to partner with Oracle such as:
•    Promotion of your Customer Success Stories
Provides a platform for you to share the success of your initiatives and programs to peer groups raising the overall visibility of your team and your organization as a leader in security

•    Social Media promotion (Video, Blog & Podcast)
Reach the masses of Oracle’s customers through sharing of success stories, or customer created blog content that highlights the advanced thought leadership role in security with co-authored articles on Oracle Blog page that reaches close to 100,000 subscribers. There are numerous options to promote activities on Facebook, Twitter and co-branded activities using Video and Audio.

•    Live speaking opportunities to your peers
As a technology leader within your organization, you can represent your organization at Oracle sponsored events (online, in person or webcasts) to help share the success of your organizations efforts building out your team/organization brand and success.

•    Invitation to the IDM Architect Forum
Oracle is able to invite the right customers into the IDM Architect Forum which is an invite only group of customers that meet monthly to hear technology driven presentations from their own peers (not from Oracle) on today’s trends.  If you want to hear privately what some of the most successful companies in every industry are doing about security, this is the forum to be in. All presentations are private and remain within the forum, and only members can see take advantage of the lessons gained from these meetings.  To date, there are 125 members.

There are many more advantages to partnering with Oracle, however, it can start with the simple nomination form for Identity and Access Management category of the 2014 Oracle Excellence Award

About

Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.

Search

Archives
« June 2014 »
SunMonTueWedThuFriSat
1
2
3
4
5
6
7
8
9
11
13
14
15
17
18
19
20
21
22
23
24
25
26
27
28
29
30
     
       
Today