SlideShare a Scribd company logo
1 of 11
Download to read offline
The rise in mobility has raised
challenges around connectivity,
security, visibility, and productivity.
It places significant pressure on CIOs
to keep pace with a new digital
transformational age and changing
end-user habits.
The CIO as catalyst
for transformation
Our recent Mobile Workforce
Report (MWR) indicated that more
than half of its respondents saw a
return on investment from
mobility-related initiatives.
It’s hardly surprising in light of
mega trends such as social media,
mobility, analytics, and cloud.
Create workspaces
for tomorrow by
embracing mobility
and smart-working
solutions
End-users want to be able to access
applications to complete work tasks
and be productive, in and outside of
the traditional office space. The CIO’s
focus must be on ensuring the right
levels of security are being afforded to
mobile enterprise applications without
putting the network at risk.
Security through
The network lens
The challenge is that there’s no
longer control over traditional IT,
because the edge of the network
has moved. Business applications
may, or may not, reside in an
on-premise data centre,
or alternatively in a private or public
cloud, or a hybrid thereof.
Granting the
employee
ubiquitous access
to the corporate
network
The biggest change is the role of the
network in security, as it relates to
mobility. Fewer firewalls and perimeter
devices will be deployed in a data
centre, because the network has
increasingly become the security
endpoint.
Wireless and wired
access – the 80/20
rule
While traditional IT can enable access
for a computer or device working
from a standard operating system,
the explosion of IoT will drive a
significant amount of growth in
technology, or even non-technology,
that needs to be IT enabled.
The Internet of
complexity
This introduces another stumbling
block for CIOs: the lack of
interoperability and integration
between business systems and the
data centre. Programming interfaces
need to allow for the proliferation
of new devices, while being simple
enough not to complicate their use.
The Internet of
complexity
continued
Going forward, CIOs will need to focus
on how users will connect to an
application, as well as the best use of
that application. It means a shift from
the typical manual user-based
intervention to policy-based
abstraction — so the focus will be
more on people, policies,
and the platform.
People, policy, and
platform
As the end-user wants access to more
in terms of applications, connectivity
becomes more and more prevalent.
Those organisations that offer flexible
work experiences, and improved access
control to the information,
are transforming the fastest.
It’s not about the
end-user; it’s about
what the end-user
needs
The network, often seen as a laggard
in the transformational journey, now
has to be able to provide business with
significant speed, agility and, of
course, security.
Picking up the pace
It’s exciting to see the pace change in
networking as a technology after years
of stagnation. The evolution is
allowing CIOs to facilitate mobility and
end-user computing in a way that’s
not restrictive to the mobile worker.
By making the network a security
endpoint, it’s allowing more flexibility
in rolling out applications and services.
Concluding
thoughts

More Related Content

What's hot

Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloudebuc
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Services
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1InterQuest Group
 
Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security IDC Italy
 
Top 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - GartnerTop 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - GartnerDinh Le Dat (Kevin D.)
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africatechzimslides
 
PTC: Connected Manufacturing
PTC: Connected ManufacturingPTC: Connected Manufacturing
PTC: Connected ManufacturingRahul Neel Mani
 
Enable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want ToEnable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want ToDImension Data
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaWikki Verma
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu India
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...IMC Institute
 
Researching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses GrowthResearching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses GrowthAJASTJournal
 

What's hot (20)

Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloud
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakout
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Top 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - GartnerTop 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - Gartner
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technology
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
PTC: Connected Manufacturing
PTC: Connected ManufacturingPTC: Connected Manufacturing
PTC: Connected Manufacturing
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
 
Enable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want ToEnable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want To
 
Trends in IT
Trends in ITTrends in IT
Trends in IT
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
 
Researching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses GrowthResearching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses Growth
 

Viewers also liked

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de FranceDImension Data
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDImension Data
 
The Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity EverywhereThe Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity EverywhereSeven
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence ReportDImension Data
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandateDImension Data
 

Viewers also liked (6)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top Employers
 
The Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity EverywhereThe Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity Everywhere
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
 

Similar to CIO Guide to Mobilizing the Enterprise Network

IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
The Key to Going Digital: Think People
The Key to Going Digital: Think PeopleThe Key to Going Digital: Think People
The Key to Going Digital: Think PeopleJennifer Stern
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationEric Lightfoot
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdfonline Marketing
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...IBM India Smarter Computing
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldTEWMAGAZINE
 
The_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOGlenn Mommens
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 

Similar to CIO Guide to Mobilizing the Enterprise Network (20)

Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
The Key to Going Digital: Think People
The Key to Going Digital: Think PeopleThe Key to Going Digital: Think People
The Key to Going Digital: Think People
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise World
 
The_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIO
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 

More from DImension Data

Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDImension Data
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldDImension Data
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! DImension Data
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de FranceDImension Data
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 daysDImension Data
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersDImension Data
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceDImension Data
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international universityDImension Data
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivityDImension Data
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connectionsDImension Data
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves livesDImension Data
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeDImension Data
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitDImension Data
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDImension Data
 
2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findingsDImension Data
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?DImension Data
 
Cure your monday morning networking headaches
Cure your monday morning networking headachesCure your monday morning networking headaches
Cure your monday morning networking headachesDImension Data
 
Dimension Data – doing business with the biggest
Dimension Data – doing business with the biggestDimension Data – doing business with the biggest
Dimension Data – doing business with the biggestDImension Data
 
Understanding Workspaces for Tomorrow
Understanding Workspaces for TomorrowUnderstanding Workspaces for Tomorrow
Understanding Workspaces for TomorrowDImension Data
 

More from DImension Data (20)

Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 
2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?
 
Cure your monday morning networking headaches
Cure your monday morning networking headachesCure your monday morning networking headaches
Cure your monday morning networking headaches
 
Dimension Data – doing business with the biggest
Dimension Data – doing business with the biggestDimension Data – doing business with the biggest
Dimension Data – doing business with the biggest
 
Understanding Workspaces for Tomorrow
Understanding Workspaces for TomorrowUnderstanding Workspaces for Tomorrow
Understanding Workspaces for Tomorrow
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

CIO Guide to Mobilizing the Enterprise Network

  • 1. The rise in mobility has raised challenges around connectivity, security, visibility, and productivity. It places significant pressure on CIOs to keep pace with a new digital transformational age and changing end-user habits. The CIO as catalyst for transformation
  • 2. Our recent Mobile Workforce Report (MWR) indicated that more than half of its respondents saw a return on investment from mobility-related initiatives. It’s hardly surprising in light of mega trends such as social media, mobility, analytics, and cloud. Create workspaces for tomorrow by embracing mobility and smart-working solutions
  • 3. End-users want to be able to access applications to complete work tasks and be productive, in and outside of the traditional office space. The CIO’s focus must be on ensuring the right levels of security are being afforded to mobile enterprise applications without putting the network at risk. Security through The network lens
  • 4. The challenge is that there’s no longer control over traditional IT, because the edge of the network has moved. Business applications may, or may not, reside in an on-premise data centre, or alternatively in a private or public cloud, or a hybrid thereof. Granting the employee ubiquitous access to the corporate network
  • 5. The biggest change is the role of the network in security, as it relates to mobility. Fewer firewalls and perimeter devices will be deployed in a data centre, because the network has increasingly become the security endpoint. Wireless and wired access – the 80/20 rule
  • 6. While traditional IT can enable access for a computer or device working from a standard operating system, the explosion of IoT will drive a significant amount of growth in technology, or even non-technology, that needs to be IT enabled. The Internet of complexity
  • 7. This introduces another stumbling block for CIOs: the lack of interoperability and integration between business systems and the data centre. Programming interfaces need to allow for the proliferation of new devices, while being simple enough not to complicate their use. The Internet of complexity continued
  • 8. Going forward, CIOs will need to focus on how users will connect to an application, as well as the best use of that application. It means a shift from the typical manual user-based intervention to policy-based abstraction — so the focus will be more on people, policies, and the platform. People, policy, and platform
  • 9. As the end-user wants access to more in terms of applications, connectivity becomes more and more prevalent. Those organisations that offer flexible work experiences, and improved access control to the information, are transforming the fastest. It’s not about the end-user; it’s about what the end-user needs
  • 10. The network, often seen as a laggard in the transformational journey, now has to be able to provide business with significant speed, agility and, of course, security. Picking up the pace
  • 11. It’s exciting to see the pace change in networking as a technology after years of stagnation. The evolution is allowing CIOs to facilitate mobility and end-user computing in a way that’s not restrictive to the mobile worker. By making the network a security endpoint, it’s allowing more flexibility in rolling out applications and services. Concluding thoughts