• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
It  consumerisation presentation
 

It consumerisation presentation

on

  • 403 views

 

Statistics

Views

Total Views
403
Views on SlideShare
403
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    It  consumerisation presentation It consumerisation presentation Presentation Transcript

    • Consumerization of
      Information Technology
      In Singapore…
      Group Name :
      ShinING
      Kavitha
      Irene
      Revaathey
    • WHAT IS CONSUMERIZATION IN I T ????
      • Many fastest growing trends in it began in the consumer space and ultimately worked their way into the enterprise through a process known as it consumerization.
    • Reasons of IT Consumerization……………
      1)The rise of social media as a business application.
      • This phenomenon is the traditional enterprise IT killer, not just the killer app.
      • Workers, social networks have become necessary and ideal tools for building work relationships and conducting business.
      Being able to follow opportunities is a key feature of this application, so social connections literally mean sales connections.
      • Employers need to facilitate this types of social collaboration, not be threatened by it.
    • 2. The blurring of work and home.
      • According to a telecommuting forecast by Forrester, 41% of employers plan to implement telecommuting options this year and 43% of the American workforce will telecommute occasionally by 2016.
      • Flexible work arrangements that encourage employees to work from home make it difficult to control employee technology usage.
      • IT departments need to develop policies to deliver and secure sensitive data on both IT-owned and employee-owned devices.
    • 3. The emergence of new mobile devices.
      • The mobile era has arrived.By next year global smartphone shipments will exceed personal computer shipments for the first time in history.
      • In the wake of such a seismic shift, employees are showing up to work with their personal devices with increasing frequency.
      • The pressure on IT departments to provide service and support for the employees' devices and applications of choice will be enormous.
    • 4. Shifting business models require tech-savvy employees.
      • Put the rise of social media together with
      e-commerce and mobile devices, and you get a marketplace in which word of mouth influences buying decisions as much as half the time.
      • As the control of corporate brands shifts to online conversations outside of the company's purview, organizations will increasingly value employees who can navigate the ecosystem and are influencers in their social networks.
    • Enterprise IT is increasingly becoming consumerized
      • The official use of consumer technology and social media tools has become prevalent in Singapore enterprises.
      • As adoption and usage of such real-time communication tools continue to grow and flourish, enterprises are concerned about the security risks that they bring about.
      • 100 percent of the respondents feel that social networking sites, blogs and podcasts pose as high security threats, and over 60 percent indicated likewise for instant messaging tools and micro-blogging.
    • Survey found out that respondents using social network sites…..
      • facebook -67%
      • windows live messenger – 33%
      • Blogs - 33%
      • Twitter -33%
      • Even though all surveyed respondents perceive social networking sites as high security threats, only 33 percent feel unprotected against it.
      • Podcasts at 100 percent emerged as the top threat to the enterprise network, according to the survey.
      • 67 percent and 33 percent of respondents have indicated that they feel unprotected using blogs and micro-blogging platforms, respectively. Despite these sentiments, a majority of Singapore enterprises remain unprepared and unprotected.
    • • Employees are accessing information from more locations and devices
      • As employees become increasingly mobile, they need to access the corporate network remotely on personal devices.
      • Organisations are empowering employees to access, modify and disseminate company information – often stored on the cloud – via their laptops or smartphones.).
      • Surprisingly, even as more smartphones are being deployed, only 33 percent of Singapore organisations have implemented standardised endpoint configurations for these devices.
      • Overall, although 67 percent of respondents feel that employee-owned endpoints comprise security, only 33 percent have put in place integrated endpoint security processes.
    • As enterprise IT becomes more heterogeneous, data loss threats increase
      • Consumerisation of IT and the increasing use of employee-owned endpoints are causing an explosion of unstructured data.
      • The growing heterogeneity of enterprise IT environments is making it more difficult to manage and secure information.
      • The study indicates that 100 percent of Singapore enterprises have experienced theft of intellectual property.
      • Loss of confidential and proprietary data and downtime of corporate environment are also prevalent at 67 percent respectively.
    • EFFECT
      The increasingly powerful global communities leads to :
      • social and economic disruptions affect the balance of power among the enterprise, technology providers, the individual and the state.
    • Prevention
      • Trust alone is no longer an option.
      • Organizations have shifted away from strategies that rely on the notion that employees can be trusted to use technologies in a secure and compliant manner and are implementing three-layer strategies that leverage trust as well as policy and technology.
    • • Email security should be top priority. When it comes to the use of consumerized IT, orga­nizations should prioritize mobile devices ahead of social platforms. When providing mobile device security, email should be their primary
    • Employees and customers have become much smarter about information technology. There is a growing awareness that value is increasingly created by the way that employees – from accountants to zoologists – make use of or mediate information technology
    • STRATEGIES
    • Recommendations
      To manage security risks, it is critical for enterprises to establish and put in place protocols and policies to monitor, manage and govern the use of consumer devices and platforms within the workplace.
      Comprehensive, sustainable data loss prevention (DLP) programs must be implemented to enable organisations to measurably reduce the risk of a data breach, demonstrate regulatory compliance and safeguard customer privacy, brand equity and intellectual property.
      • There are new business opportunities as consumerization and Web 2.0 drive business process and value redefinition. IT needs to have structured conversations with the business about the consequences of these changes