Big Data And Consumerisation Calls For Tighter Data Security

Data Security

Independent analyst house IDC has revealed its forecast for the European Software Industry in 2012, predicting that social capabilities, Big Data and the consumerisation of IT will all leave their footprints on the industry, which will experience moderate growth of 3.1% in 2012.

IDC further predicts that the IT security industry will outgrow its niche status as deployment of third-platform technologies and increasing cyber threats escalate risks. In response to these predictions, the expected increase of personal mobile devices being used in the workplace, coupled with the rise in human-to-human sharing of information, will add significant pressure on data security management within organisations.

Organisations are aware of the trend of employees bringing their own mobile devices to work, but very few are actually looking at the management of the security risks involved, which are considerable.

Employees who choose to access the corporate network by using their own mobile devices such as laptops, tablets and mobile phones – and share competitive and, in many cases, confidential data – not only put organisations at great risk for data loss and leakage, but also make those organisations an easy target for hackers.

On the flip side, Big Data and the consumerisation of IT are presenting organisations with a competitive advantage, if managed effectively. Effective management includes determining where files are coming from and why, whether files are appropriately secured, whether the organisation has visibility into the point at which those files enter or exit the enterprise, and how one can leverage all of this information to understand the underlying business context.

Data security has never been as relevant as it is today, and organisations looking to reap the benefits of these new trends will need to ensure that IT security is central to their business strategy. To achieve that, they must secure interoperability between information systems, whether on premise or in the cloud.

In order to regain control of this diverse set of mobile devices, IT managers will need to invest in mobile device management and mobile application management tools,” said Carla Arend, program manager, European Infrastructure Software at IDC. “This will ensure an excellent user experience across a diverse set of devices, to reduce security risks from unmanaged devices and to contain operational cost through a solid and efficient management framework based on policies.”

In 2012, IDC expects that organisations will turn to cloud-based solutions as a fast and easy way to get mobile device management, mobile application management and mobile data management under control.

SHARETweet about this on TwitterShare on LinkedInShare on FacebookShare on Google+Pin on PinterestDigg thisShare on RedditShare on TumblrShare on StumbleUponEmail this to someone

John Thielens is Axway’s Chief Architect, Cloud Services. John oversees Axway’s advanced research and the architecture team’s activities related to cloud computing and deployment. He's active in Axway’s patent development program and works closely with the security office to develop new solutions. John's background in B2B and Managed File Transfer technologies started in the early nineties as corporations started to interconnect over X.400 and continued through the rapid conversion to the Internet, working with tools to manage the security of technologies like SMTP, S/MIME, FTP, PGP, SSH and AS2 as they gained enterprise adoption. John is a frequent speaker at local, national and international events, including RSA Conferences, Gartner ITxpo Symposium and InfoSecurity.

  • EM4AN

    It’s possible to address security concerns and still implement BYOD.  What’s needed is to separate the Enterprise apps and data from the personal devices. This can be achieved with a solution like Ericom’s AccessNow, a pure HTML5 RDP client that enables remote users to securely connect from various devices (including iPads, iPhones, Android devices and Chromebooks) to any RDP host, including Terminal Server (RDS Session Host), physical desktops or VDI virtual desktops – and run their applications and desktops in a browser. This keeps the organization’s applications and data separate from the employee’s personal device.  All that’s needed is a HTML5 browser.  No plug-ins or anything else required on the user device.

    AccessNow also provides an optional Secure Gateway component enabling external users to securely connect to internal resources using AccessNow, without requiring a VPN.

    For more info, and to download a demo, visit:

    Note:  I work for Ericom