SlideShare a Scribd company logo
1 of 11
Download to read offline
The rise in mobility has raised
challenges around connectivity,
security, visibility, and productivity.
It places significant pressure on CIOs
to keep pace with a new digital
transformational age and changing
end-user habits.
The CIO as catalyst
for transformation
Our recent Mobile Workforce
Report (MWR) indicated that more
than half of its respondents saw a
return on investment from
mobility-related initiatives.
It’s hardly surprising in light of
mega trends such as social media,
mobility, analytics, and cloud.
Create workspaces
for tomorrow by
embracing mobility
and smart-working
solutions
End-users want to be able to access
applications to complete work tasks
and be productive, in and outside of
the traditional office space. The CIO’s
focus must be on ensuring the right
levels of security are being afforded to
mobile enterprise applications without
putting the network at risk.
Security through
The network lens
The challenge is that there’s no
longer control over traditional IT,
because the edge of the network
has moved. Business applications
may, or may not, reside in an
on-premise data centre,
or alternatively in a private or public
cloud, or a hybrid thereof.
Granting the
employee
ubiquitous access
to the corporate
network
The biggest change is the role of the
network in security, as it relates to
mobility. Fewer firewalls and perimeter
devices will be deployed in a data
centre, because the network has
increasingly become the security
endpoint.
Wireless and wired
access – the 80/20
rule
While traditional IT can enable access
for a computer or device working
from a standard operating system,
the explosion of IoT will drive a
significant amount of growth in
technology, or even non-technology,
that needs to be IT enabled.
The Internet of
complexity
This introduces another stumbling
block for CIOs: the lack of
interoperability and integration
between business systems and the
data centre. Programming interfaces
need to allow for the proliferation
of new devices, while being simple
enough not to complicate their use.
The Internet of
complexity
continued
Going forward, CIOs will need to focus
on how users will connect to an
application, as well as the best use of
that application. It means a shift from
the typical manual user-based
intervention to policy-based
abstraction — so the focus will be
more on people, policies,
and the platform.
People, policy, and
platform
As the end-user wants access to more
in terms of applications, connectivity
becomes more and more prevalent.
Those organisations that offer flexible
work experiences, and improved access
control to the information,
are transforming the fastest.
It’s not about the
end-user; it’s about
what the end-user
needs
The network, often seen as a laggard
in the transformational journey, now
has to be able to provide business with
significant speed, agility and, of
course, security.
Picking up the pace
It’s exciting to see the pace change in
networking as a technology after years
of stagnation. The evolution is
allowing CIOs to facilitate mobility and
end-user computing in a way that’s
not restrictive to the mobile worker.
By making the network a security
endpoint, it’s allowing more flexibility
in rolling out applications and services.
Concluding
thoughts

More Related Content

What's hot

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
techzimslides
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
IMC Institute
 

What's hot (20)

Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloud
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakout
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Top 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - GartnerTop 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - Gartner
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technology
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
PTC: Connected Manufacturing
PTC: Connected ManufacturingPTC: Connected Manufacturing
PTC: Connected Manufacturing
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
 
Enable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want ToEnable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want To
 
Trends in IT
Trends in ITTrends in IT
Trends in IT
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
 
Researching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses GrowthResearching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses Growth
 

Viewers also liked

Viewers also liked (6)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top Employers
 
The Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity EverywhereThe Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity Everywhere
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
 

Similar to Mobility at the network’s edge

PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
Eric Lightfoot
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
The_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIO
Glenn Mommens
 

Similar to Mobility at the network’s edge (20)

Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
The Key to Going Digital: Think People
The Key to Going Digital: Think PeopleThe Key to Going Digital: Think People
The Key to Going Digital: Think People
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise World
 
The_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIO
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 

More from DImension Data

More from DImension Data (20)

Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 
2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?
 
Cure your monday morning networking headaches
Cure your monday morning networking headachesCure your monday morning networking headaches
Cure your monday morning networking headaches
 
Dimension Data – doing business with the biggest
Dimension Data – doing business with the biggestDimension Data – doing business with the biggest
Dimension Data – doing business with the biggest
 
Understanding Workspaces for Tomorrow
Understanding Workspaces for TomorrowUnderstanding Workspaces for Tomorrow
Understanding Workspaces for Tomorrow
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Mobility at the network’s edge

  • 1. The rise in mobility has raised challenges around connectivity, security, visibility, and productivity. It places significant pressure on CIOs to keep pace with a new digital transformational age and changing end-user habits. The CIO as catalyst for transformation
  • 2. Our recent Mobile Workforce Report (MWR) indicated that more than half of its respondents saw a return on investment from mobility-related initiatives. It’s hardly surprising in light of mega trends such as social media, mobility, analytics, and cloud. Create workspaces for tomorrow by embracing mobility and smart-working solutions
  • 3. End-users want to be able to access applications to complete work tasks and be productive, in and outside of the traditional office space. The CIO’s focus must be on ensuring the right levels of security are being afforded to mobile enterprise applications without putting the network at risk. Security through The network lens
  • 4. The challenge is that there’s no longer control over traditional IT, because the edge of the network has moved. Business applications may, or may not, reside in an on-premise data centre, or alternatively in a private or public cloud, or a hybrid thereof. Granting the employee ubiquitous access to the corporate network
  • 5. The biggest change is the role of the network in security, as it relates to mobility. Fewer firewalls and perimeter devices will be deployed in a data centre, because the network has increasingly become the security endpoint. Wireless and wired access – the 80/20 rule
  • 6. While traditional IT can enable access for a computer or device working from a standard operating system, the explosion of IoT will drive a significant amount of growth in technology, or even non-technology, that needs to be IT enabled. The Internet of complexity
  • 7. This introduces another stumbling block for CIOs: the lack of interoperability and integration between business systems and the data centre. Programming interfaces need to allow for the proliferation of new devices, while being simple enough not to complicate their use. The Internet of complexity continued
  • 8. Going forward, CIOs will need to focus on how users will connect to an application, as well as the best use of that application. It means a shift from the typical manual user-based intervention to policy-based abstraction — so the focus will be more on people, policies, and the platform. People, policy, and platform
  • 9. As the end-user wants access to more in terms of applications, connectivity becomes more and more prevalent. Those organisations that offer flexible work experiences, and improved access control to the information, are transforming the fastest. It’s not about the end-user; it’s about what the end-user needs
  • 10. The network, often seen as a laggard in the transformational journey, now has to be able to provide business with significant speed, agility and, of course, security. Picking up the pace
  • 11. It’s exciting to see the pace change in networking as a technology after years of stagnation. The evolution is allowing CIOs to facilitate mobility and end-user computing in a way that’s not restrictive to the mobile worker. By making the network a security endpoint, it’s allowing more flexibility in rolling out applications and services. Concluding thoughts