down, what’s the fallback position? What’s the cost certainty per user over a contract term? How easy is it to migrate the data from one provider to another?” Greeff suggests that risk and planning stay inside the company because risk can’t be outsourced. Risk management, by defi nition, is integral to a company’s survival, while planning is about aligning IT with the business’ strategic function. Neither should be outsourced.
“The rest can be, and often should be, outsourced as it makes sense for an experienced provider with economies of scale to perform the menial tasks”, he says. “With an outsourcer, a defi ned level of service is delivered at a predictable cost. There has also been a trend in companies that have had redundancies. With redundancies, very often specialist skills leave, with companies choosing to keep generalists that can perform a broader range of services. Security
is a specialist skill, hence the requirement for a specialist provider.”
The consumerization of IT will continue and the numbers refl ect that, Evans says. A report by Gartner indicates that 73% of the enterprise workforce will be mobile, and about 20% of companies won’t own any IT assets. It’s expected that 80% of all businesses will support a workforce using tablets. By 2014, almost all businesses will use smartphone applications to run corporate data.
“This has resulted in many IT departments understanding that they no longer possess control of all aspects of the IT environment and need to rely on external elements and vendors to be successful”, Evans says. “Hybrid cloud solutions enable companies to get the performance and control they are looking for by having part of the solution on their private cloud while leveraging the public cloud for its strengths.”
Some CIOs and IT managers loathe handing over that much control to another entity
Michelle Warren MW Research & Consulting
Event Diary
RSA Conference 2012 27 February – 02 March 2012 Location: San Francisco, California, USA Website:
www.rsaconference.com
SANS Mobile Device Security Summit 2012 12 – 15 March 2012 Location: Nashville, Tennessee, USA Website:
www.sans.org
Black Hat Europe 2012 14 – 16 March 2012
Location: Amsterdam, the Netherlands Website:
www.blackhat.com
ISNR Abu Dhabi 2012 19 – 21 March 2012
Location: Abu Dhabi, United Arab Emirates Website:
www.isnrabudhabi.com
SANS 2012 23 – 30 March 2012
Location: Orlando, Florida, USA Website:
www.sans.org
InfoSec World 2012 02 – 04 April 2012
Location: Orlando, Florida, USA Website:
www.misti.com
European Identity & Cloud Conference 2012 17 – 20 April 2012
Location: Munich, Germany Website:
www.id-conf.com
Infosecurity Europe 24 – 26 April 2012
Location: Earls Court, London, UK Website:
www.infosec.co.uk
North America CACS 2012 06 – 10 May 2012
Location: Orlando, Florida, USA Website:
www.isaca.org
www.infosecurity-magazine.com /// 45
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60