The security landscape is evolving more than ever before – not only must
chief information security officers (CISOs) deal with constant increasing
cyber-attack threats and security breaches but they must keep up with
mobility trends and concerns about access to data and protecting identities.
Mobility is growing at a fast pace, and though it may be easy to construct
more barriers to data access, there are much more effective approaches.
A new research report by Vanson Bourne sponsored by CA Technologies dives
into the security practices within large enterprises. Survey participants
include 142 CISOs and CSOS totaling to 1,425 senior IT and business
executives globally. The survey results identify a large shift in security
priorities and investments as the application economy makes its way to the
forefront while also revealing some remarkable benefits.
Consumer capab... (more)
Four Best Practices for DevOps Success
Much of what is written about DevOps focuses on the development team and on
making things faster. And the ops team is thinking, "Whoa, slow down! We need
to ensure there's quality, so going fast with poor quality doesn't help." So
dev and ops are immediately at odds with each other, because their goals are
You want to center all teams around the common objective of having a
predictable and reliable customer experience. That's just not a coding issue.
There is a difference between quality of code and quality of experience, and
A growing number of websites allow visitors to log in using a digital
identity from a trusted 3rd party -- like Facebook, Microsoft, PayPal, or
Google. The fancy term for this is "federated identity," but most people call
it Bring Your Own Identity, or BYOID.
In today's application economy, organizations need to securely deliver new
apps to grow their business quickly. This can increase IT risks, which puts a
premium on an organization's ability to simplify the user experience without
sacrificing security. Using an existing digital or social identity issued by
a trusted third pa... (more)
Today's IT leaders must feel like they are living in a mash-up of two songs
-"The Times They Are a-Changin" and "We've Only Just Begun."
The question isn't whether the role of IT is changing, it is what you as an
IT leader need to do to get ahead of the change.
A recent global survey commissioned by CA Technologies and conducted by
Vanson Bourne illustrates how radically the role of IT is changing in today's
business -- and not always to the benefit of IT leaders and staffers. The
survey of 1,300 senior IT leaders from large organizations in 21 countries
explored the IT departmen... (more)
While Bring Your Own Device (BYOD) programs are very widely adopted, far
fewer companies have implemented a comprehensive enterprise mobility
strategy. When there isn't a consistent governance policy in place, the
approach to mobility tends to become fragmented and siloed, with each
department executing on its own strategy.
Without a high-level, enterprise view of mobility and the governance policy
to support it, mobility management will be supported by a series of redundant
and fragmented point solutions, which can be quite costly. Worse still,
failure to implement an end-to-en... (more)