Welcome!

@DevOpsSummit Authors: Liz McMillan, Pat Romanski, Zakia Bouachraoui, Elizabeth White, Dana Gardner

Related Topics: @DevOpsSummit, @CloudExpo, Cloud Security

@DevOpsSummit: Blog Post

Click the Refresh Button on IT Security By @JackieKahle | @CloudExpo [#Cloud]

Today’s business leaders are pressured to rethink their IT security strategy to thrive in the application economy.

The security landscape is evolving more than ever before – not only must chief information security officers (CISOs) deal with constant increasing cyber-attack threats and security breaches but they must keep up with mobility trends and concerns about access to data and protecting identities. Mobility is growing at a fast pace, and though it may be easy to construct more barriers to data access, there are much more effective approaches.

A new research report by Vanson Bourne sponsored by CA Technologies dives into the security practices within large enterprises. Survey participants include 142 CISOs and CSOS totaling to 1,425 senior IT and business executives globally. The survey results identify a large shift in security priorities and investments as the application economy makes its way to the forefront while also revealing some remarkable benefits.

Consumer capabilities marks new security concerns
It is not surprising that the survey identified security as the top obstacle to becoming more effective in the application economy – No. 2 overall and No. 1 in industries such as retail and financial services. More interesting is the fact that, “improving the mobile customer experience,” is now enterprises’ No. 2 security priority – second only to protecting against data breaches (see Fig. 1). In addition, 49 percent say that mobile apps and devices are having a big or significant impact on security policies and practices for their external customers.

The relentless pressure to release new mobile apps and services faster has also increased the importance of API’s as a way to expand the ecosystem of complementary services that can enhance your apps and open up new markets and customers. In fact, 79 percent of the survey respondents say they open access to their API’s to customers, partners or suppliers. But this also means you need to secure these API’s to prevent unauthorized access, monitor data usage and block hacker attempts.

Security is not  only about control (at least it shouldn’t be)
CA Technologies has long been explaining why CSOs and CISOs need to move beyond a security culture of just saying, “no,” to one in which the business’s need for more open and expansive access is addressed through smarter approaches such as identity self-service, transparent risk modeling and secure APIs.

Fortunately, today’s IT and business leaders are definitely moving in that direction. Almost half (47 percent) of respondents now say that security is either entirely or mostly about enabling the business or must be in balance with ‘control.’ Only 17 percent believe it is entirely about control (see Fig. 2).

Perhaps because of the increased challenges these new priorities bring, organizations are also planning to significantly increase the percent of IT spending devoted to security. Globally, this percent is expected to grow from 18 to 25 percent in three years’ time. The retail industry is leading the way, growing from 19 to 27 percent, followed by healthcare growing from 18 to 26 percent.

The business results don’t lie
Between 79 and 94 percent of respondents have already seen or expect to see significant benefits from their security initiatives, including fewer security breaches (94 percent), improved customer satisfaction (87 percent), more customers (86 percent), and increased revenue (78 percent). Those reporting they have already seen such benefits were then asked if they could quantify the improvements, and the results are remarkable. In addition to fewer breaches and more control, the business can cheer the 20 percent revenue increase from new services enabled by security and 21 percent more customer using their apps and services (see table below).

Security Benefit/Result

Improvement

Improved customer satisfaction and trust in our products/services

23 percent

Increase in number of customers using our apps/services

21 percent

More accountability and control

21 percent

Increased revenue from new services enabled by improved security

20 percent

Increased user productivity and business flexibility

19 percent

Fewer security breaches

17 percent

This global survey clearly shows there is no doubt that the new application economy requires new approaches to IT security. There are several concrete steps businesses can take to start to reframe and modernize their security practices and policies. The new report,  "8 Steps to Modernize Security for the Application Economy", outlines several of these, including the importance of understanding the customer experience, reassessing your current approach to mobile security, opening (and securing) access to your API’s and investing in security with an eye towards business value. Download the report now, or visit rewrite.ca.com.

You can also tell me what you think here or on Twitter @jackiekahle or LinkedIn

More Stories By Jackie Kahle

Jackie is a 30-year veteran of the IT industry and has held senior management positions in marketing, business development, and strategic planning for major systems, software, and services companies including Hewlett-Packard, Compaq, and Gartner. She currently manages the strategy and execution of CA Technologies thought leadership programs. Jackie has an MBA from the Whittemore School, University of New Hampshire, a BA in Mathematics from New York University and is the Vice-Chair of the N.H. State Council on the Arts.

@DevOpsSummit Stories
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. It even comes with Prometheus to store the metrics for you and pre-built Grafana dashboards to show exactly what is important for your services - success rate, latency, and throughput.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's award-winning solutions intelligently collect data, and unify backup, disaster recovery, archival and governance capabilities onto a single, optimized data set. As the industry's fastest growing data protection provider, Druva is trusted by over 4,000 global organizations, and protects over 40 PB of data. Join the conversation at twitter.com/druvainc
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked questions that every enterprise trying to adopt an Enterprise Kubernetes Platform needs to know so that they can make informed decisions.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.