2013 democratization of technology how cloud and consumerization change everything
DESCRIPTION
Consumerization, Cloud, Mobility, Virtualization, App, and Security Presentation for GSU MBA Program 7/7/12TRANSCRIPT
The Democratization of Technology
Cloud
Consumer-ization
VirtualizationApp
Evolution
Mobility
How Cloud and Consumerization Change Everything in 2013
Phil Agcaoili
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
1
04/10/2023Creative Commons Attribution-
ShareAlike 3.0 Unported License
2
Anytime. Anywhere. Any Device.
A Collection of Devices Access Ubiquitous Services/Apps
•Shifts in client computing▫Personal computers no longer the focus
▫Smartphones, tablets, and other consumer devices
•Emerging cloud services connect multiple devices ▫Lots of choices for users
▫Where, when, and how
•The post-PC era▫Not really about being 'after' the PC
▫Experiencing a new style of personal computing Frees individuals to use computing in fundamentally new ways Improves multiple aspects of their work and personal lives
•Several driving forces are combining to create a new technology era
•Trends have roots from the past decade, but aligning in new ways*Gartner
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
3
Consumerization
Home Technology Enters the Corporate Environment
• Nothing new, consumer technology has been impacting corporate
information technology for the past decade
• Major wave is starting to take hold across all aspects of information
technology as several key factors come together:
▫Users are more technologically savvy and have very different expectations
of technology
▫The Internet and social media have empowered and emboldened users
▫The rise of powerful, affordable mobile devices change the equation for
users
▫Users have become innovators
▫Through the democratization of technology, users of all types and status
within organizations can now have similar technology available to them
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
4
Mobility
Wherever and Whenever You Want
• Mobile devices combined with the cloud can fulfill most computing tasks,
• Tradeoffs are outweighed in the minds of the user by the convenience and
flexibility provided by the mobile devices
• Emergence of more-natural user interface experiences is making mobility
practical
▫Touch- and gesture-based user experiences
▫Speech and contextual awareness
▫Wearable and modular computing
• Enables rich interaction with devices and a much greater level of freedom
• Any given device will take on the role of the user's primary device
▫Users have a web of devices
▫Personal delivered at a new level, agnostic to the device itself 04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported
License
5
Cloud
Enabling, Flexible, and Cost-Effective Services
• Cloud services individual users
▫Business impact
• Every user has a scalable and nearly infinite set of resources available for
whatever they need to do
• The impacts for IT infrastructures are stunning, but when this is applied to the
individual, there are some specific benefits that emerge.
▫Users' digital activities are far more self-directed than ever before
▫Users demand to make their own choices about applications, services and content,
selecting from a nearly limitless collection on the Internet
• Encourages a culture of self-service that users expect in all aspects of their
digital experience
▫Lines are blurred between business and home
• Opens a whole new level of opportunity04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported
License
6
Apps Evolution (of Applications)Applications Evolve to Apps
• Changes occurring to the way applications are designed, delivered and consumed by users
▫ Simple but powerful
▫ Single purpose delivers
• Applications can now be exposed in multiple ways and used in varying situations by the user
▫ Increases greater cross-platform portability
▫ Small user experience (UX) apps used to adjust a server- or cloud-resident application
▫ Unique characteristics of a specific device or scenario minimized
HTML5 and Webkit
• Profound impact on how applications are written and managed in corporate environments
• Dramatic impact on all other aspects of the market
▫ Appstores
▫ Direct delivery
▫ Levels the playing field for competition
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
7
Virtualization
Enabling the Any Device Dream
• Virtualization has improved flexibility and increased the options for how
IT organizations can implement client environments
• Virtualization has freed applications from the peculiarities of individual
devices, operating systems or even processor architectures
▫Eliminates browser compatibility woes
▫Enables standardization
• Virtualization provides a way to move the legacy of applications and
processes developed in the PC era forward into the new emerging world
• Low-power devices have access to much-greater processing power
▫Expanding device utility
▫ Increases the reach of processor-intensive applications04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported
License
8
Conclusion• The combination of trends coupled with advances in new
enabling technologies is ushering in the era of the personal cloud
• The specifics of devices will become less important for the individual and organization to worry about
• Users will use a collection of devices, with the PC remaining one of many options, but no one device will be the primary device
• The personal cloud will take on the role of central need• Access to the cloud and the content stored or shared in the
cloud will be managed and secured, rather than solely focusing on the device itself
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
9
Security’s View:Democratization of Technology
04/10/2023Creative Commons Attribution-
ShareAlike 3.0 Unported License
10
• A groundswell of new(er) technologies demanded by employees requires a new strategy to enable and empower employees▫Smart phones - 14% of US employees use
smartphones for work today; 8% buy their own*
▫Cloud services – more and more of our internal services are being outsourced, use of services like GoogleDocs, DropBox, etc.
▫Social technology - 17% of employees use social technologies for work*
*Forrester
Problem Statement
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
11
• These technologies are being used for multiple reasons▫Serving customers better▫Getting our jobs done better▫People are used to using these
technologies at home More than half of US employees say they have better technology at
home than at work* 37% of US information workers are solving their customer and
business problems using technology they bring from home*
• It isn’t just about the latest technology ▫While this may be one factor, it isn’t the
driving factor for most
Why
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
12
• Employees are going to use the technology anyways▫ “It was something I use in my personal life and
wanted to use it at work” – 43% of US workers surveyed
▫ “I needed it and my company didn’t provide an alternative” – 35% of US workers surveyed
▫ “It is better than what my company provided” – 24% of US workers surveyed
• Business units and employees are moving ahead with solutions that meet their needs, with or without IT’s or Security’s guidance and support
Reality
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
13
14
So what are we going to do?
Ignore the Problem
Too embarrassing….
Throw Money at the Problem?
That would be nice……but who can afford that?
We have an opportunity to address the risks & leverage the benefits before
the cloud becomes ubiquitous
Not
allowed
Possible responses
Free for all
Questions we should be asking:
– What are people really trying to do? Help customers better, use what they like to use (i.e., use at home)?
– What is the value to the business?
– What are the risks?
– Assuming the business case holds, how can the company support the activity?
Strategy and measured approach using risk as a guide
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
21
• We aren’t getting in front of the issues and enabling internal and external users▫The technology and policies are the
answer, but what are the problems our employees are trying to solve?
▫Are we asking them? ▫Do we know what users are trying to do so
we can propose the right processes and technical solutions?
• People, Process, and Technology▫ Policy▫ Resources to handle new devices to manage▫ Secure containers and sandboxes▫ Change how we provide remote access
What’s missing?
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
22
• We have multiple groups trying to solve the issue▫Risk of not solving the real problem▫Risk of ending up with multiple solutions
(i.e,. No standardization or governance)• Lack of an enabled workforce resulting in less
innovation▫How does the lack of current technologies
affect our ability to innovate (and do we know where innovation will come from)?
▫What are your competitors doing?
Risks of doing nothing
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
23
• This topic or set of topics impacts many different stakeholders▫ IT/Enterprise Architecture– non-standard solutions may proliferate▫ Operations - someone has to support the enabling technologies▫ Security – what are the risks?▫ Legal – what are the liability issues?▫ Customer Care – how can we use these technologies to better service
our customers?▫ Regional Teams – already gathering business requirements▫ Product/Strategy – using current technology is critical to keeping up
with (or getting ahead of) our customers and their expectations of our services
▫ HR – policies and procedures▫ Customers – if we aren’t current with technology at work, how will be
innovative for our customers?
Stakeholders
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
24
• Security is normally the first blockade used to discourage the use of new technologies
• Each of these new ways of doing business involve risk▫ A risk based approach gets the issues on the table so the
business has a say in the decisions that are made around new technologies
▫ Understanding the risks puts security in an enabler role vs. a ‘just say no’ role
• The ability to support some or all of these technologies requires a new way of doing security at most companies
Why security cares
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
25
• Most rely on infrastructure protections (firewalls, locked down workstations and laptops) to provide protection
• This method makes it challenging to support these new technologies▫ Do we know who has access to our data (employees, contractors, 3rd
parties)? ▫ Do we know where our data is?▫ Is your internal network flat?
• We need to provide a flexible security architecture that protects our data and resources from the inside out ▫ This will allow us to enable these new ways of doing
business while managing risk• Security areas such as Identity Management, data
protection, remote access and remote device management need to be focused on▫ Virtualization/VDI/Citrix/Remote access may be the solution, but for
which problem(s)
Why security cares
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
26
Conclusion
•Security must take a position on these trends•Security must be preparing to enable these
services▫Change security model (Phil’s perspective)
Treat all end points as hostile Focus on most important data
Collapse core(s) Evolve remote access paradigms Focus monitoring and application of fundamental
security measures (ISO 27002, PCI DSS, etc.)
•We need to manage risk•We need to embrace the changes ahead
04/10/2023 Creative Commons Attribution-ShareAlike 3.0 Unported License
27
Let’s review this entire presentation…
The World is Changing…
…and we can’t keep doing what we’ve been doing
Secure different.
We have to do something…
Questions?Thank You.
Phil AgcaoiliTwitter: @hacksec
04/10/2023Creative Commons Attribution-
ShareAlike 3.0 Unported License
32