Welcome!

@DevOpsSummit Authors: Destiny Bertucci, Pat Romanski, Yeshim Deniz, Dalibor Siroky, Liz McMillan

Related Topics: @DevOpsSummit, @CloudExpo, Cloud Security

@DevOpsSummit: Blog Post

Click the Refresh Button on IT Security By @JackieKahle | @CloudExpo [#Cloud]

Today’s business leaders are pressured to rethink their IT security strategy to thrive in the application economy.

The security landscape is evolving more than ever before – not only must chief information security officers (CISOs) deal with constant increasing cyber-attack threats and security breaches but they must keep up with mobility trends and concerns about access to data and protecting identities. Mobility is growing at a fast pace, and though it may be easy to construct more barriers to data access, there are much more effective approaches.

A new research report by Vanson Bourne sponsored by CA Technologies dives into the security practices within large enterprises. Survey participants include 142 CISOs and CSOS totaling to 1,425 senior IT and business executives globally. The survey results identify a large shift in security priorities and investments as the application economy makes its way to the forefront while also revealing some remarkable benefits.

Consumer capabilities marks new security concerns
It is not surprising that the survey identified security as the top obstacle to becoming more effective in the application economy – No. 2 overall and No. 1 in industries such as retail and financial services. More interesting is the fact that, “improving the mobile customer experience,” is now enterprises’ No. 2 security priority – second only to protecting against data breaches (see Fig. 1). In addition, 49 percent say that mobile apps and devices are having a big or significant impact on security policies and practices for their external customers.

The relentless pressure to release new mobile apps and services faster has also increased the importance of API’s as a way to expand the ecosystem of complementary services that can enhance your apps and open up new markets and customers. In fact, 79 percent of the survey respondents say they open access to their API’s to customers, partners or suppliers. But this also means you need to secure these API’s to prevent unauthorized access, monitor data usage and block hacker attempts.

Security is not  only about control (at least it shouldn’t be)
CA Technologies has long been explaining why CSOs and CISOs need to move beyond a security culture of just saying, “no,” to one in which the business’s need for more open and expansive access is addressed through smarter approaches such as identity self-service, transparent risk modeling and secure APIs.

Fortunately, today’s IT and business leaders are definitely moving in that direction. Almost half (47 percent) of respondents now say that security is either entirely or mostly about enabling the business or must be in balance with ‘control.’ Only 17 percent believe it is entirely about control (see Fig. 2).

Perhaps because of the increased challenges these new priorities bring, organizations are also planning to significantly increase the percent of IT spending devoted to security. Globally, this percent is expected to grow from 18 to 25 percent in three years’ time. The retail industry is leading the way, growing from 19 to 27 percent, followed by healthcare growing from 18 to 26 percent.

The business results don’t lie
Between 79 and 94 percent of respondents have already seen or expect to see significant benefits from their security initiatives, including fewer security breaches (94 percent), improved customer satisfaction (87 percent), more customers (86 percent), and increased revenue (78 percent). Those reporting they have already seen such benefits were then asked if they could quantify the improvements, and the results are remarkable. In addition to fewer breaches and more control, the business can cheer the 20 percent revenue increase from new services enabled by security and 21 percent more customer using their apps and services (see table below).

Security Benefit/Result

Improvement

Improved customer satisfaction and trust in our products/services

23 percent

Increase in number of customers using our apps/services

21 percent

More accountability and control

21 percent

Increased revenue from new services enabled by improved security

20 percent

Increased user productivity and business flexibility

19 percent

Fewer security breaches

17 percent

This global survey clearly shows there is no doubt that the new application economy requires new approaches to IT security. There are several concrete steps businesses can take to start to reframe and modernize their security practices and policies. The new report,  "8 Steps to Modernize Security for the Application Economy", outlines several of these, including the importance of understanding the customer experience, reassessing your current approach to mobile security, opening (and securing) access to your API’s and investing in security with an eye towards business value. Download the report now, or visit rewrite.ca.com.

You can also tell me what you think here or on Twitter @jackiekahle or LinkedIn

More Stories By Jackie Kahle

Jackie is a 30-year veteran of the IT industry and has held senior management positions in marketing, business development, and strategic planning for major systems, software, and services companies including Hewlett-Packard, Compaq, and Gartner. She currently manages the strategy and execution of CA Technologies thought leadership programs. Jackie has an MBA from the Whittemore School, University of New Hampshire, a BA in Mathematics from New York University and is the Vice-Chair of the N.H. State Council on the Arts.

@DevOpsSummit Stories
ChatOps is an emerging topic that has led to the wide availability of integrations between group chat and various other tools/platforms. Currently, HipChat is an extremely powerful collaboration platform due to the various ChatOps integrations that are available. However, DevOps automation can involve orchestration and complex workflows. In his session at @DevOpsSummit at 20th Cloud Expo, Himanshu Chhetri, CTO at Addteq, will cover practical examples and use cases such as self-provisioning infrastructure/applications, self-remediation workflows, integrating monitoring and complimenting integrations between Atlassian tools and other top tools in the industry.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, which can process our conversational commands and orchestrate the outcomes we request across our personal and professional realm of connected devices.
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology stack to make software development their differentiating factor. Thus microservices architecture emerged as a potential method to provide development teams with greater flexibility and other advantages, such as the ability to deliver applications at warp speed using infrastructure as a service (IaaS) and platform as a service (PaaS) environments.
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud hosts. This BriefingsDirect cloud services maturity discussion focuses on new ways to gain container orchestration, to better use serverless computing models, and employ inclusive management to keep the container love alive.
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the public cloud best suits your organization, and what the future holds for operations and infrastructure engineers in a post-container world. Is a serverless world inevitable?