AI Insights
Showing results for 
Search instead for 
Did you mean: 

The Implications of Expanding Security beyond the Corporate Campus


Author: Adrian Velez, HP Enterprise Group – Content Strategist


In the era of the cloud and Bring Your Own Device (BYOD), all of your workers everywhere need corporate security. To meet these requirements, firms must embrace a new style of IT.


Security was never easy, but at least it used to be easy to define. There was everything inside the corporate intranet and then there was everything else outside the firewall. Ah, if only things were so simple these days!


As Art Gilliland, HP senior vice president of Software Enterprise Security Products, HP, has said “Any device can be the attack point or the thing that is attacking." In addition, cyber-crime is on the rise. “We have very intelligent, highly motivated antagonists who are determined to cause disruption... and they are not "going to go away,” observed Rebecca Lawson, HP's director of Worldwide Enterprise Solutions Marketing.


New style IT business leaders get this: 64% of line of business targets in leading firms believe their IT function allows them to differentiate themselves from their rivals compared to only 33% of laggards.1


Lois Boliek, HP Global IT Assurance Portfolio Manager, suggests that we start "looking at security in the context of these new style of IT plays so rather than just coming in and saying ‘let’s put security in at the back-end,’ or ‘let’s just look at security in the general way that we always have.’" Instead Boliek believes that you need to look at the entire system.


So, for instance, she continued, "If you’re trying to get into Big Data you need to ask yourself how you look at security in the context of Big Data?  What's going to be different about Big Data?" If you start with security upfront you can be more prepared from the start in seeing how security fit into these this new job and start to architect from the beginning towards this environment."


Part of this new environment is BYOD.  To that, Boliek stated that, "In the past security has been very much about the parameter of the data-center but today everything is in our hands, our mobile devices, our laptops so you’ve got to think of security as much more than just a data-center."


In short, "your policies have to change, you have to really look at things in terms or what the risks are that you’ve got to be on the lookout for." She also thinks we need to automate security much more than we’ve had in the past. We need flexible, dynamic security. Security needs to be much more agile."


She's right of course. As HP sharply observed in its new report1 on profiling infrastructure leaders, "Complacency can kill."


No where is that more true than in security. IT laggards who are content with the security methods of yesterday are tomorrow's security victims.


Everyone agrees that risk mitigation is a top concern, but technology forward thinkers are more likely, 57%, than laggards, 41%, to realize just how much they should be concerned about digital risks.1 Even the leaders who state that security is now part of the fabric of their firms, 97%, realize that more needs to be done.  65% agree that when it comes to security, they just been lucky so far. Indeed, the same number agreed that security is "a time-bomb waiting to happen." Only half the laggards agree with this statement, which says volumes about their lack-of-security awareness.1


In security, change isn't only good, it's a necessity. Complacency will cause your business not only to fall behind your competitors, it will leave you wide open for attacks that can put your enterprise out of business for days.


Improved new style security doesn't just render you better able to handle your attackers. It also, according to IT leaders who get it, will improve market share, 41%; profitability, 46%; while reducing costs, 47%.1 Reduce cost? Yes. As the old saying goes, an ounce of prevention is worth a pound of cure.


Think that you're OK? That your business is too large, too small to be attacked? That the same old methods that has kept you safe in the past will keep you safe in the future? Think again.


You're being oblivious to the new reality. If your firm is using cloud services, mobile devices or the Internet of Things, you have no choice but to adopt not just a new style of IT, but a new style of security.


It's telling that when asked about mitigating risk, 67% of leading IT thinkers saw security as job one, while only 56% of their more backward competition realized just how important it was.1 Trust us: in 2015, you do not want to be behind the security curve.


Digital leaders are not complacent – they endlessly seek out new ways to use new technology to solve business problems. They are most likely to declare that differentiating their IT infrastructure is synonymous with making their company more competitive. The Insights: 2015 Infrastructure Imperatives eBook provides insights on what sets these digital leaders apart from their lagging peers. If you want to differentiate your business through the use of IT – read the report to see how HP can help you improve your customer’s experience and in the process exceed your own expectations.


Bookmark HP Infrastructure Insights to get the latest updates on HP and the New Style of IT.


[1]HP Research, 2015 Report: Profiling Infrastructure Leaders, February 2015


Insights: 2015 Infrastructure Imperatives

0 Kudos
About the Author