it security: implications for the technology vision 2015

15
Security Implications

Upload: accenture-technology

Post on 16-Jul-2015

7.426 views

Category:

Technology


0 download

TRANSCRIPT

Security Implications

Each year, our Technology Vision pinpoints the emerging technology trends that will impact large enterprises in the next 3-5 years based on our insights and research.

Security is a pervasive issue for organizations in the We Economy. To help executives understand and plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of this year’s Technology Vision.

Accenture Technology Vision 2015Digital Business Era: Stretch Your Boundaries

Copyright © 2015 Accenture All rights reserved.

Digital Business Era: Stretch Your BoundariesSucceeding in the We Economy

3

Edge Autonomy

Data Integrity

Big Data Security

Security Platforms

Customer Trust

1 2 3 4 55 Security Implications

Copyright © 2015 Accenture All rights reserved.

1

Edge Autonomy:Enabling autonomous devices at the edgeCopyright © 2015 Accenture All rights reserved.

The Accenture Technology Vision 2015 highlights how the rapidly growing Internet of Things (IoT) is introducing billions of embedded sensors, smart machines, wearable devices and connected industrial equipment. Businesses are beginning to interconnect these “things” to enable the delivery of intelligent products and services through the digital ecosystem. In time, this connected intelligence will be used to deliver what customers really want: results, or what Accenture calls the Outcome Economy.

There are 4 key actions to take to enable edge autonomy: 1.Prioritize protecting edge devices2.Boost security for edge device infrastructure 3.Include system context in security planning4.Manage edge intelligence with new governance model

Edge Autonomy: Enabling autonomous devices at the edge.

#cybersecurity

www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.

2

Data Integrity:Making data-driven decisions at Internetof Things scale.

6Copyright © 2015 Accenture All rights reserved.

As the IoT proliferates, businesses will use data passed between interconnected devices, applications and processes to determine customer context, and then collaborate through platforms to provide the intelligent products and services that customers desire in the Outcome Economy. A connected digital ecosystem, combined with edge computing and smart M2M communications, will expand the ability to use data collected from IoT devices to drive significantly faster decisions.

To optimize decisions, businesses will require edge data that is accurate, authentic and complete. Accenture proposes three key strategies: 1.Protect data on edge devices2.Implement assurance that scales3.Tie IoT protocols to business models

Data Integrity: Making data-driven decisions at Internet of Things scale.

#cybersecurity

www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.

3

Securing the three Vs.

8

Big Data Security:

Copyright © 2015 Accenture All rights reserved.

Businesses are experiencing exponential growth in data as more devices get deployed at the edge and business processes become increasingly digital— causing their data repositories to reach capacity. For Intelligent Enterprises to fully reap the benefits of software intelligence and embrace a collaborative workforce model of humans and machines (or what Accenture deems Workforce Reimagined), it will be critical to securely process and protect big data.

Traditional database management systems cannot scale enough to handle the data volume, acquisition velocity or data variety–what is often referred to as the three Vs. Enterprises should focus on two key areas: 1.Secure big data processing platforms2.Embed security into data

Big Data Security:Securing the three Vs.

#cybersecurity

www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.

4

Security Platforms:Maximizing protection across digital ecosystem platforms.

10Copyright © 2015 Accenture All rights reserved.

With the evolution of the IoT and digital industry ecosystems, platform-based businesses will offer new opportunities for growth and profitability.

Platform security is a vital capability to operating in the digital ecosystem. Businesses must understand the potential cyber-physical risks of delivering platform-based services and augment existing security efforts with digital platform intelligence. Accenture outlines 5 approaches to maximize security platforms:1.Understand physical security risks2.Evolve data security intelligently3.Plan security into the platform 4.Utilize existing platforms to augment security intelligence5.Shift to security DevOps

Security Platforms:Maximizing protection across digital ecosystem platforms.

#cybersecurity

www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.

5

Customer Trust:Building customer trust in a digitaleconomyCopyright © 2015 Accenture All rights reserved.

One of the key determinants of success for digital businesses will be the ability to deliver products and services that are highly personalized based on individual their specific habits and preferences. Accenture calls this trend the Internet of Me.

To maximize customer data and deliver personalization, businesses must apply more stringent security measures to protect privacy—and ultimately build and maintain trust with customers. We share 5 strategies to build customer trust: 1.Build trust by taking transparency seriously2.Follow basic data protection guidelines3.Take advantage of privacy-preserving analytics 4.Innovate to appeal to privacy-wary customers5.Empower customers with tools

Customer Trust: Building customer trust in a digital economy.

#cybersecurity

www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.

Digital Business Era: Stretch Your Boundaries

14

Edge Autonomy

Data Integrity

Big Data Security

Security Platforms

Customer Trust

1 2 3 4 55 Security Implications

Copyright © 2015 Accenture All rights reserved.

15

Accenture Technology Vision 2015Digital Business Era: Stretch Your Boundaries

Security Implications

www.accenture.com/securityvision

www.accenture.com/technologyvision

#techvision2015 #cybersecurity

@accenturelabs

Copyright © 2015 Accenture All rights reserved.