RSA Conference starts this week and this is the perfect time to reflect on the changing world and how it is impacting an organization’s ability to protect their information.
You see, the way in which we work has changed dramatically over the last decade. We are a workforce that refuses to be tied down. People want 24/7 access to information and applications, of their choosing, regardless of location or device.
Because of this, the next generation of workers is accelerating the adoption of cloud services, social networking and “bring your own device” (BYOD) in the enterprise. We no longer need to ponder what hyper-connectivity through the cloud and mobile devices might mean to business. We know what it means. It means that businesses can be more productive and more flexible. It also means that more people are accessing critical business information through more access points than ever before.
It means that the CEO is reviewing proprietary company information on her tablet. It means that employees are sharing information in the cloud. It means that a good portion of business-critical applications have been moved to virtual servers. This is the new reality, and IT has no choice but to fundamentally change how they support it.
At this point, it’s not about if or when. It’s about now. Therefore, the question CISOs should be asking themselves is, "What am I doing to protect my information in this hyper-connected enterprise?"
Organizations who do not embrace the consumerization of IT will not survive. Customers want it. Employees want it. Partners want it.
And many companies are listening. Our recent State of Mobility Survey highlighted that 59 percent of enterprises are making line-of-business applications accessible from mobile devices. However, in the same survey, 65 percent of enterprises cited data loss as one of their top concerns for mobile adoption.
It's time for organizations to seriously start rethinking their security strategies in this new world. They must be prepared wherever that threat might play out:
- Will it be in the data center, on an unprotected virtual server?
- Will it be in the cloud?
- Will it be on an employee's mobile device?
As information becomes more valuable, it has also become the most coveted asset in the cybercrime war. In fact, it is the number one reason for cybercrime. This is a frightening prospect for companies who are finding it more and more difficult to control their data.
In the past, security was about putting up walls, keeping bad things out. Security today must enable a more open enterprise. The good news is that we don't need to completely reinvent security. We can adapt it.
We can apply the same information-centric approach that has protected data on physical servers and desktops. And we must protect that information completely, addressing threats from both outside and inside the organization.
While the principles are the same, the solutions must change, and that's where we're leading the way. Companies need to control information as it flows in and out of the cloud. They need visibility and protection across their virtual infrastructure. They need to be able to separate corporate and personal data, prevent data loss and enforce security controls across corporate and employee owned devices.
Symantec is innovating and partnering to ensure our customers can adapt their security strategies to protect their most critical information today and into the future.
With our data loss prevention, identity and access control and endpoint protection solutions, Symantec is enabling customers to protect their information whether it's in the cloud, on mobile devices or within their virtual or physical infrastructure.
We're making some exciting new announcements at RSA this week – all designed to help companies address the security concerns brought on by the consumerization of the enterprise – be sure to stay tuned.