Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

IIIS 2013: From the Business Perspectives

Caroline Ng | June 28, 2013
The Business Technology Stream of IIIS 2013 kicked off with the topic, "Storage Optimisation—Managing Data Growth and Operational Efficiency," moderated by Simon Piff, associate vice president of enterprise infrastructure of IDC Asia/Pacific.

In order to supply the right resources, he believes it is critical to assign the right value to data, including backup data. "What's happening in the industry these days are vendors like us are starting to look at these repository of information as pieces of value, not costs," he added.

The usage of data as a repository of knowledge will deduce the value of information, whether certain information is worth backing up, thereby effectively managing the demand for backup storage.

Security in mobile devices
Bjorn Engelhardt, vice president, strategic sales and cloud, Asia Pacific and Japan, Symantec Corporation, talked about security and management in infrastructures.

Using the analogy of a vehicle's brake where the real reason behind is to enable speed, he reasoned that similarly, security is an enabler to increase productivity. Instead of being an inhibitor to block traffic. Specifically, he referred to BYOD as the weakest link in companies.

Bjorn Engelhardt
Photo: Bjorn Engelhardt

"Sixty-five percent of organisations allow access on mobile devices through the corporate networks. So by allowing that access, you are opening up another ingress point into your organisation," he said. Besides, as about 30 percent of existing malware are stealing information without users' knowledge, cybersecurity threats are legitimate and should be ringing alarm bells.

Engelhardt unveiled the main motive behind freeware is to the steal usage patterns and information for organisations as their monetisation model.

"Free is never free. Free always come with a penalty," he cautioned.

Interestingly, he nullified the default association of malware with Android as "there is actually more vulnerabilities in the iOS operating system by a factor of 10 or 20 is to one versus the Android." He urged corporations to bridge the gap between productivity and security by creating policies to sit under various content with varying expiry period.

Panel Discussion #2
HP's Lambie and Symantec's Engelhardt took part in the next debate session, which focused on topic of BYOD. The duo shared their views on the strategies needed to secure BYOD in the workplace.

Lambie said the understanding of how data is consumed or created is fundamental in implementing the right policies for different custodians of information. Meanwhile, Engelhardt regards BYOD as the ability to segregate personal and corporate applications and information on personal devices.

In order to have a secure management in companies, he believes strongly in having a corporate app store, which should serve as the only way for employees to access to the corporate network.

With a corporate app, companies are then able to impose security and data management policies through a control point.

"So, creating a control point inside your organisation will give you secure management," he added.


Previous Page  1  2  3  4  5  Next Page 

Sign up for Computerworld eNewsletters.