☁ The New CIO Priorities in #Cloud #Security

EMC RSA Security - The New CIO
EMC, RSA Dynamic Security

 

2014 is an exciting time to be a CIO, and at the same time a very risky one, too, because about a third of the enterprise customers have decided their current IT team is not the team that is going to lead their IT transformation in the coming years.

In the new paradigm upon us, do you have a strategy to enable your apps for mobile devices? Within EMC’s Information Technology, They are building a mobile environment that is safe and secure and more available to more of their employee base, especially the road warriors in the field. EMC has been looking at ways to reduce travel expenses related to internal meetings, freeing up resources that they can invest in a more mobile-enabled workforce.

Do you have the software development skills for agile application development and rapid deployment? Many enterprises gave up those talents for leaner organizations years ago and have lost that core DNA. But some, especially in financial services, kept those skills in-house for customized work. That extra cost used to be seen as a liability, but now bespoke applications are coming back into favor. Pivotal Labs has attracted the ninjas of agile app development who are helping organizations relearn those lost skills.

Most enterprises still need to run client/server platform applications, but in a way that enables consumption-based ITaaS in the cloud/mobile world. The term “Cloud” can mean all sorts of things to all sorts of people, so planning for cloud-enabled IT raises fundamental questions to answer: Which of these applications will live in your data center’s private cloud? Which ones will live in a public cloud, off-premise? Building a hybrid cloud at enterprise scale is an IT organization’s next ERP project. But few organizations can afford to wait two years for implementation.

Finally, yesterday’s approach to IT security was all about perimeter defense, putting heavy locks on doors to keep the bad guys out. In a cloud/mobile world, the perimeter is more porous, so the bad guys are sneaking in undetected… but less so under the radar of forward-looking CIOs and CISOs who are deploying advanced security techniques: security analytics that monitor network traffic for anomalies in the flow of information, enabling an enterprise to catch bad actors in the act.

For CIOs who lead large organizations and must manage the expectations of a business and its executive team, the change management challenge may be the greatest challenge of them all. There is no question that today’s IT platform is changing dramatically.

 

Read more about VMware Virtualization for Dummies 2.0

 

Virtualization-2.0-for-Dummies
Published by Wiley

 

Published by Wiley, this VMware Special Edition of Virtualization 2.0 For Dummies can be downloaded
 click Here to Download:

Read More: Amazon Web Services (AWS)

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s