1. Security enjoys a revival as organizations significantly increase security budgets and prioritize continuity initiatives in response to increased risks from social networking, mobile technologies, and cloud computing. Nearly half of surveyed organizations expect significantly higher security spending in 2011.
2. While interest remains in social media and collaboration tools, organizations are more focused on deploying business intelligence systems to analyze large amounts of new data from these sources. Two-thirds expect strong commitment to business analytics and knowledge management in 2011.
3. Virtual desktop infrastructure (VDI) adoption grew rapidly in 2010 but is expected to slow somewhat as organizations take time to evaluate the technology's advantages and strategize its use. Server, storage, and application virtualization deployments are anticipated
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Prof m01-2013 global information security workforce study - finalSelectedPresentations
The document summarizes key findings from a survey of over 12,000 information security professionals conducted in 2012. Some of the main findings include:
1) Application vulnerabilities, malware, and mobile devices were the top security concerns. Concern over cloud-based services also increased significantly since the previous survey in 2011.
2) Information security is seen as a stable career path, but workforce shortages persist. Knowledge and certification are important for career success and advancement.
3) While attack remediation is believed to be rapid, preparedness for security incidents showed signs of strain, with twice as many respondents saying preparedness had worsened compared to 2011.
The document provides an executive summary and key findings of the 2013 (ISC)2 Global Information Security Workforce Study, which surveyed over 12,000 information security professionals worldwide. Some of the main points from the summary are:
- The information security profession is large, growing, and dynamic as it must adapt to changing IT environments and evolving threats.
- While the field remains stable, there are shortages of professionals. Knowledge and certification are important for career success.
- Application vulnerabilities are the top security concern, followed by malware and mobile devices.
- While attack response is expected to be rapid, security incident preparedness may be strained.
- Information security professionals are seen as more important than
This document is an Economist Intelligence Unit report sponsored by Google that explores the links between cloud use, trust in cloud technology, and organizational performance based on a survey of 452 executives. The key findings are:
1) While cloud technology use is widespread, trust in cloud remains relatively low, with only 16% reporting very high trust.
2) Organizations with higher trust in cloud report much better financial and operational outcomes compared to those with lower trust, such as 9.1% profit growth vs 1%.
3) Cloud use alone does not appear to produce the same benefits as when paired with high trust; trust seems to enable organizational transformations that leverage cloud capabilities.
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
This white paper presents a comprehensive approach to information management programs. It outlines how data growth directly affects the risk posture of critical corporate information assets. In addition, it defines common problems caused by gaps in information management programs as well as consequences associated with immature methodologies.
This research report studies the economic impact that Cyber Security attacks have on
society as a whole. The aim of this analysis is to examine the negative and positive
impact of these compromises on multiple entities. Our descriptive analysis focuses on
individuals, private and public organizations, costs, revenues, innovations, and jobs to
determine if proliferations of these attacks are either, negative or positive. Although this
paper draws upon the economic factors as result of cyber-attacks, it looks at the outlay
in its historical context of capital expenditures to private and public organizations due to
the increased number of compromises and factors of this paradigm helping to fuel the
growth of innovations or spawn a new industry as a whole
The document is a research report that compares insurance protection for tangible versus intangible assets. Some key findings:
1) Information assets are valued slightly higher on average ($1.082 billion) than tangible property, plant, and equipment ($947 million) but have much lower insurance coverage (15% vs 59%).
2) The potential maximum loss from information assets being stolen or destroyed is estimated to be higher on average ($979 million) than potential losses from tangible assets ($770 million).
3) Despite higher risks and potential losses to information assets, companies are reluctant to purchase cyber insurance and many would not disclose material losses of information assets in financial statements like they would for tangible assets.
1) Mobile device usage has grown rapidly, with nearly 1 billion smart connected devices shipped in 2011. Many employees now use multiple devices for work, most often a laptop and smartphone.
2) Companies are struggling to secure access to data on these diverse mobile platforms. Larger firms feel more confident in their security, while many smaller companies report inadequate policies.
3) In addition to investing in security services, companies must also educate employees on security risks like lost or stolen devices containing sensitive corporate data.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Prof m01-2013 global information security workforce study - finalSelectedPresentations
The document summarizes key findings from a survey of over 12,000 information security professionals conducted in 2012. Some of the main findings include:
1) Application vulnerabilities, malware, and mobile devices were the top security concerns. Concern over cloud-based services also increased significantly since the previous survey in 2011.
2) Information security is seen as a stable career path, but workforce shortages persist. Knowledge and certification are important for career success and advancement.
3) While attack remediation is believed to be rapid, preparedness for security incidents showed signs of strain, with twice as many respondents saying preparedness had worsened compared to 2011.
The document provides an executive summary and key findings of the 2013 (ISC)2 Global Information Security Workforce Study, which surveyed over 12,000 information security professionals worldwide. Some of the main points from the summary are:
- The information security profession is large, growing, and dynamic as it must adapt to changing IT environments and evolving threats.
- While the field remains stable, there are shortages of professionals. Knowledge and certification are important for career success.
- Application vulnerabilities are the top security concern, followed by malware and mobile devices.
- While attack response is expected to be rapid, security incident preparedness may be strained.
- Information security professionals are seen as more important than
This document is an Economist Intelligence Unit report sponsored by Google that explores the links between cloud use, trust in cloud technology, and organizational performance based on a survey of 452 executives. The key findings are:
1) While cloud technology use is widespread, trust in cloud remains relatively low, with only 16% reporting very high trust.
2) Organizations with higher trust in cloud report much better financial and operational outcomes compared to those with lower trust, such as 9.1% profit growth vs 1%.
3) Cloud use alone does not appear to produce the same benefits as when paired with high trust; trust seems to enable organizational transformations that leverage cloud capabilities.
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
This white paper presents a comprehensive approach to information management programs. It outlines how data growth directly affects the risk posture of critical corporate information assets. In addition, it defines common problems caused by gaps in information management programs as well as consequences associated with immature methodologies.
This research report studies the economic impact that Cyber Security attacks have on
society as a whole. The aim of this analysis is to examine the negative and positive
impact of these compromises on multiple entities. Our descriptive analysis focuses on
individuals, private and public organizations, costs, revenues, innovations, and jobs to
determine if proliferations of these attacks are either, negative or positive. Although this
paper draws upon the economic factors as result of cyber-attacks, it looks at the outlay
in its historical context of capital expenditures to private and public organizations due to
the increased number of compromises and factors of this paradigm helping to fuel the
growth of innovations or spawn a new industry as a whole
The document is a research report that compares insurance protection for tangible versus intangible assets. Some key findings:
1) Information assets are valued slightly higher on average ($1.082 billion) than tangible property, plant, and equipment ($947 million) but have much lower insurance coverage (15% vs 59%).
2) The potential maximum loss from information assets being stolen or destroyed is estimated to be higher on average ($979 million) than potential losses from tangible assets ($770 million).
3) Despite higher risks and potential losses to information assets, companies are reluctant to purchase cyber insurance and many would not disclose material losses of information assets in financial statements like they would for tangible assets.
1) Mobile device usage has grown rapidly, with nearly 1 billion smart connected devices shipped in 2011. Many employees now use multiple devices for work, most often a laptop and smartphone.
2) Companies are struggling to secure access to data on these diverse mobile platforms. Larger firms feel more confident in their security, while many smaller companies report inadequate policies.
3) In addition to investing in security services, companies must also educate employees on security risks like lost or stolen devices containing sensitive corporate data.
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
The document discusses current trends and future predictions in the information security industry. It notes that information security incidents are increasing in both number and severity. This has led companies to increase spending on information security by over 50% in some sectors. There is currently high demand and a shortage of information security professionals. Salaries for information security roles range from £45,000 to over £200,000 depending on level of experience and role. The document predicts that detected security attacks will continue increasing and that niche information security startups will drive innovation in the industry within the next 5 years.
This document discusses how businesses are adapting to new technologies like e-commerce and social media. It outlines both the benefits and pitfalls of technological adoption. The benefits include improved communication, marketing opportunities, and efficiency gains. However, risks include security issues, reduced in-person interaction, overreliance on technology, and high costs of implementing new systems. Overall, the document concludes that while challenges exist, technology has significantly enhanced business operations and the modern workforce when adopted appropriately.
- Virtualization and cloud adoption continue to rise among SMBs, with 64% currently using virtualization and 48% using cloud services. BYOD is also well established, though IT professionals have mixed views on managing employee-owned devices.
- Tablet use among SMBs has increased substantially, from 33% to 45% in the last 6 months. Nearly two-thirds of SMBs are expected to use tablets for business by the second half of 2012.
- IT budgets at SMBs continue to grow, averaging $152,000, up 6% from the previous period. Nearly a third of IT departments plan to add staff in the next 6 months.
This document discusses security threats that companies will face in 2020. It notes that cybercrime is increasing in frequency and severity. Emerging threats include the growth of connected devices and societies, vulnerabilities in medical devices, increased machine-to-machine interactions, reliance on mobile devices, growth of cloud services, and risks around big data. The document warns that security needs to protect all aspects of the enterprise from the data center to mobile devices and beyond. Adversaries are increasingly sophisticated and companies must manage security risks in a connected world.
This document summarizes the key findings of the 2006 CSI/FBI Computer Crime and Security Survey. The survey polled over 600 security professionals and found that:
1) Virus attacks and unauthorized access continued to be the largest sources of financial loss. Financial losses from laptop theft and stolen proprietary information were also significant.
2) Unauthorized computer use slightly decreased while reported computer security incidents to law enforcement increased after previous years of decline.
3) Most organizations evaluate security investments using metrics like return on investment, but many respondents said economic and risk management issues were most critical.
4) Over 80% of organizations conduct security audits but respondents felt more investment was still needed in security awareness training.
5)
The Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014 study reveals a majority of respondents (59 percent) said either privacy or security had the biggest potential impact on their personal lives. This concern has led as many respondents (59 percent) to say they would take action related to security and privacy issues.
Conducted by Edelman Berland, the survey polled more than 1,000 U.S. consumers over the age of 18 to better understand their attitudes about major technology policy issues and their willingness to take action and engage in the political process on these issues.
Learn more: http://edl.mn/UGx2Ho
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
Protecting enterprise systems against cyber threats is a strategic priority, yet only 42% of executives are confident they could recover without impacting their business from a cyber event. Find out the hidden risks of shadow IT, cloud and cyber insurance.
The document discusses the findings of a global survey on IT security risks conducted by Kaspersky Lab. Some key findings include:
- IT security is the top concern for businesses and almost half see cyber threats as a top emerging risk.
- The most common external threat experienced by companies is malware.
- Companies are cautious of new technologies like cloud computing and mobile devices.
- Most companies take measures like anti-malware protection but many feel more investment is needed in IT security.
1) The security landscape has changed dramatically in recent years as threats grow at alarming rates and existing security solutions become quickly outdated.
2) The article investigates the changes in security and compliance driven by increased regulatory requirements, the need to align security strategies with business needs, a growing focus on information over infrastructure, and new threats like social media and cloud computing.
3) Interviews with security leaders from three organizations reveal how they are addressing these changes through initiatives like deploying Symantec solutions for centralized security and compliance management and adhering to standards like ISO 27001.
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
This document summarizes findings from 118 security operations maturity assessments of 87 organizations in 18 countries. It finds that the median maturity level remains below the ideal level of 3, and 20% of organizations scored below the minimum level of 1. The top issue facing security operations is the shortage of skilled resources. While organizations are investing in new technologies, many neglect operational budgets and processes, resulting in immature capabilities. Visible breaches have increased focus on security from executive leadership and boards.
2014 Brunswick Investor Use of Digital and Social Media SurveyBrunswick Group
Brunswick is pleased to announce the release of our fourth annual survey on digital media usage by the investment community. Key findings from the survey include:
• 70% of investors believe that the role of digital media will play an increasing role in future investment decisions
• 29% of investors are proactively following up on leads initially found on micro-blogging services, such as Twitter
• Twitter influence continues to expand, but its growing influence may be under-reported due to recent inclusion on other platforms, like Bloomberg
• In ranking their top sources, investors gave information direct from companies an average rating of 1.9, higher than any other source
• 35% of investors listed real-time subscription services, like Bloomberg, as becoming more valuable for their work, compared to 22% on our last survey
This document discusses the results of Ernst & Young's 2010 Global Information Security Survey. Some key findings include:
- 60% of respondents perceived an increase in risk due to new technologies like social media, cloud computing, and mobile devices.
- 46% planned to increase spending on information security.
- Increased workforce mobility and data leakage were significant challenges for many organizations.
- Many organizations are taking steps to address mobile security risks through policies, encryption, and identity management controls.
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
The law of unintended consequences strikes again. In an effort to address security risks in enterprise IT systems and the critical data in them, numerous security standards and requirement frameworks have emerged over the years. But most of these efforts have had the opposite effect — diverting organizations’ limited resources away from actual cyber defense toward reports and compliance.
Recognizing this serious problem, the U.S. National Security Agency (NSA) in 2008 launched Critical Security Controls (CSCs), a prioritized list of controls likely to have the greatest impact in protecting organizations from evolving real-world threats. This SANS Institute survey of nearly 700 IT professionals across a range of industries examines how well the CSCs are known in government and industry and how they are being used.
For the latest threat intelligence reports, visit https://www.fireeye.com/current-threats/threat-intelligence-reports.html.
The document discusses warning signs that a business's information security may be at risk. It outlines 7 signs that a network or data systems have been compromised, including devices slowing down or crashing, unexplained pop-up windows, and backup failures. The biggest warning sign is having no record that all computers and devices are adequately protected. Strong security requires balancing network access with protection measures and finding expertise to continuously update defenses against evolving threats. Outsourcing to an IT security partner can help identify and address vulnerabilities.
Cyber-attacks destroy the trusted relationship with customers and partners, the lifeblood of financial services. The industry is also behind the curve when it comes to adapting to the changes in working practices and consumer behaviour, driven by rapidly evolving smart devices.
Q4 public company use of social media for investor relations summer2010weichengwendao
This document analyzes the use of social media by 362 public companies for investor relations purposes. It finds that the majority (65%) use Twitter, followed by Facebook (37%), YouTube (29%), blogs (10%) and SlideShare (10%). Technology companies make greatest use of social media for investor relations across all platforms. The US leads in social media adoption for investor relations, followed by Europe. Large cap companies generally use social media more than small and mid cap companies for investor relations. While LinkedIn is not currently used directly for investor relations, it is an important professional network for financial services professionals to follow. The study provides best practices for using different social media and concludes that social media use for investor relations continues to grow.
Research insights - state of network securityMiguel Mello
This document summarizes the findings of a survey conducted by the Enterprise Strategy Group on the state of network security. The key findings are:
1) Network security operations have become more difficult for most organizations in the last two years due to factors like more devices/traffic on networks and evolving cyber threats.
2) While many organizations monitor network traffic and metadata for visibility, three-quarters believe visibility across their networks could be improved.
3) Adding more security tools may not solve challenges, as organizations already use 5-7 tools on average. A platform approach could better integrate existing tools.
INFOGRAPHIC: The Evolution of Data PrivacySymantec
The document discusses the growing issue of data privacy and protection as data volumes continue to rapidly increase. It notes that by 2020 there will be 40 zettabytes of digital data, and many businesses are unprepared to properly handle and protect this data. The EU's new General Data Protection Regulation will require businesses to be more accountable with data and comply with regulations like mandatory breach notification, data subject rights, and restrictions on consumer profiling. Proper compliance will require businesses to know exactly what data they have, where it is stored, who has access, and how it is being used.
The rise in IT spending is fueling the increased adoption of the bring-your-own-device (BYOD) culture in the region, and given its inherent advantages for employees and employers, BYOD adoption is bound to grow further in the coming years.
However, BYOD adoption is accompanied by IT security risks arising out of lack of awareness about device security among employees. The situation is compounded by insufficient network resources and the lack of formal BYOD policies at organizations to manage security risks emanating from use of personal devices on official servers and networks.
CIOs in the region need to respond by preparing IT networks and formulating a BYOD policies, which are designed to manage this increased demand for BYOD and mobile diversity in the region.
- The document discusses a media product created by students that aims to portray teenagers and high school relationships and conflicts in the style of the movie Mean Girls.
- It seeks to represent both male and female social groups through typical stereotypes seen in movies like Mean Girls.
- The target audience is mainly teenagers who will relate to the conventions and characters portrayed.
- The students think their media product would be best distributed by Paramount Pictures, known for similar teen movies, and should get an international release in theaters before being released on DVD to reduce piracy.
Escola Superior De EducaçãO Do Porto (97 2003, Com Fundo Cinzento Reflexo)edsocial
O documento discute a exclusão social da comunidade cigana em Portugal, abordando seus principais tipos e dimensões. A integração da comunidade cigana é dificultada pelos preconceitos da sociedade e por tradições culturais rígidas dos ciganos, como a proibição da escolarização de meninas após a puberdade. Equipes multidisciplinares e educadores sociais enfrentam desafios para promover a inclusão social dos ciganos.
Technical and allocative efficiency of smallholder dairy farmers in swazilandAlexander Decker
- The document analyzes the technical and allocative efficiency of smallholder dairy farmers in Swaziland. It estimates the average technical efficiency (TE) was 66% and average allocative efficiency (AE) was 78%.
- Factors like water availability, pasture size, soil fertility, dairy experience, training, distance to market, age, credit access, household size, and herd size influence TE and AE levels.
- There is potential to improve TE by 34% and AE by 22% by addressing inefficient factors. The study recommends soil testing, improved credit access, and strengthened extension services to enhance efficiency.
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
The document discusses current trends and future predictions in the information security industry. It notes that information security incidents are increasing in both number and severity. This has led companies to increase spending on information security by over 50% in some sectors. There is currently high demand and a shortage of information security professionals. Salaries for information security roles range from £45,000 to over £200,000 depending on level of experience and role. The document predicts that detected security attacks will continue increasing and that niche information security startups will drive innovation in the industry within the next 5 years.
This document discusses how businesses are adapting to new technologies like e-commerce and social media. It outlines both the benefits and pitfalls of technological adoption. The benefits include improved communication, marketing opportunities, and efficiency gains. However, risks include security issues, reduced in-person interaction, overreliance on technology, and high costs of implementing new systems. Overall, the document concludes that while challenges exist, technology has significantly enhanced business operations and the modern workforce when adopted appropriately.
- Virtualization and cloud adoption continue to rise among SMBs, with 64% currently using virtualization and 48% using cloud services. BYOD is also well established, though IT professionals have mixed views on managing employee-owned devices.
- Tablet use among SMBs has increased substantially, from 33% to 45% in the last 6 months. Nearly two-thirds of SMBs are expected to use tablets for business by the second half of 2012.
- IT budgets at SMBs continue to grow, averaging $152,000, up 6% from the previous period. Nearly a third of IT departments plan to add staff in the next 6 months.
This document discusses security threats that companies will face in 2020. It notes that cybercrime is increasing in frequency and severity. Emerging threats include the growth of connected devices and societies, vulnerabilities in medical devices, increased machine-to-machine interactions, reliance on mobile devices, growth of cloud services, and risks around big data. The document warns that security needs to protect all aspects of the enterprise from the data center to mobile devices and beyond. Adversaries are increasingly sophisticated and companies must manage security risks in a connected world.
This document summarizes the key findings of the 2006 CSI/FBI Computer Crime and Security Survey. The survey polled over 600 security professionals and found that:
1) Virus attacks and unauthorized access continued to be the largest sources of financial loss. Financial losses from laptop theft and stolen proprietary information were also significant.
2) Unauthorized computer use slightly decreased while reported computer security incidents to law enforcement increased after previous years of decline.
3) Most organizations evaluate security investments using metrics like return on investment, but many respondents said economic and risk management issues were most critical.
4) Over 80% of organizations conduct security audits but respondents felt more investment was still needed in security awareness training.
5)
The Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014 study reveals a majority of respondents (59 percent) said either privacy or security had the biggest potential impact on their personal lives. This concern has led as many respondents (59 percent) to say they would take action related to security and privacy issues.
Conducted by Edelman Berland, the survey polled more than 1,000 U.S. consumers over the age of 18 to better understand their attitudes about major technology policy issues and their willingness to take action and engage in the political process on these issues.
Learn more: http://edl.mn/UGx2Ho
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
Protecting enterprise systems against cyber threats is a strategic priority, yet only 42% of executives are confident they could recover without impacting their business from a cyber event. Find out the hidden risks of shadow IT, cloud and cyber insurance.
The document discusses the findings of a global survey on IT security risks conducted by Kaspersky Lab. Some key findings include:
- IT security is the top concern for businesses and almost half see cyber threats as a top emerging risk.
- The most common external threat experienced by companies is malware.
- Companies are cautious of new technologies like cloud computing and mobile devices.
- Most companies take measures like anti-malware protection but many feel more investment is needed in IT security.
1) The security landscape has changed dramatically in recent years as threats grow at alarming rates and existing security solutions become quickly outdated.
2) The article investigates the changes in security and compliance driven by increased regulatory requirements, the need to align security strategies with business needs, a growing focus on information over infrastructure, and new threats like social media and cloud computing.
3) Interviews with security leaders from three organizations reveal how they are addressing these changes through initiatives like deploying Symantec solutions for centralized security and compliance management and adhering to standards like ISO 27001.
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
This document summarizes findings from 118 security operations maturity assessments of 87 organizations in 18 countries. It finds that the median maturity level remains below the ideal level of 3, and 20% of organizations scored below the minimum level of 1. The top issue facing security operations is the shortage of skilled resources. While organizations are investing in new technologies, many neglect operational budgets and processes, resulting in immature capabilities. Visible breaches have increased focus on security from executive leadership and boards.
2014 Brunswick Investor Use of Digital and Social Media SurveyBrunswick Group
Brunswick is pleased to announce the release of our fourth annual survey on digital media usage by the investment community. Key findings from the survey include:
• 70% of investors believe that the role of digital media will play an increasing role in future investment decisions
• 29% of investors are proactively following up on leads initially found on micro-blogging services, such as Twitter
• Twitter influence continues to expand, but its growing influence may be under-reported due to recent inclusion on other platforms, like Bloomberg
• In ranking their top sources, investors gave information direct from companies an average rating of 1.9, higher than any other source
• 35% of investors listed real-time subscription services, like Bloomberg, as becoming more valuable for their work, compared to 22% on our last survey
This document discusses the results of Ernst & Young's 2010 Global Information Security Survey. Some key findings include:
- 60% of respondents perceived an increase in risk due to new technologies like social media, cloud computing, and mobile devices.
- 46% planned to increase spending on information security.
- Increased workforce mobility and data leakage were significant challenges for many organizations.
- Many organizations are taking steps to address mobile security risks through policies, encryption, and identity management controls.
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
The law of unintended consequences strikes again. In an effort to address security risks in enterprise IT systems and the critical data in them, numerous security standards and requirement frameworks have emerged over the years. But most of these efforts have had the opposite effect — diverting organizations’ limited resources away from actual cyber defense toward reports and compliance.
Recognizing this serious problem, the U.S. National Security Agency (NSA) in 2008 launched Critical Security Controls (CSCs), a prioritized list of controls likely to have the greatest impact in protecting organizations from evolving real-world threats. This SANS Institute survey of nearly 700 IT professionals across a range of industries examines how well the CSCs are known in government and industry and how they are being used.
For the latest threat intelligence reports, visit https://www.fireeye.com/current-threats/threat-intelligence-reports.html.
The document discusses warning signs that a business's information security may be at risk. It outlines 7 signs that a network or data systems have been compromised, including devices slowing down or crashing, unexplained pop-up windows, and backup failures. The biggest warning sign is having no record that all computers and devices are adequately protected. Strong security requires balancing network access with protection measures and finding expertise to continuously update defenses against evolving threats. Outsourcing to an IT security partner can help identify and address vulnerabilities.
Cyber-attacks destroy the trusted relationship with customers and partners, the lifeblood of financial services. The industry is also behind the curve when it comes to adapting to the changes in working practices and consumer behaviour, driven by rapidly evolving smart devices.
Q4 public company use of social media for investor relations summer2010weichengwendao
This document analyzes the use of social media by 362 public companies for investor relations purposes. It finds that the majority (65%) use Twitter, followed by Facebook (37%), YouTube (29%), blogs (10%) and SlideShare (10%). Technology companies make greatest use of social media for investor relations across all platforms. The US leads in social media adoption for investor relations, followed by Europe. Large cap companies generally use social media more than small and mid cap companies for investor relations. While LinkedIn is not currently used directly for investor relations, it is an important professional network for financial services professionals to follow. The study provides best practices for using different social media and concludes that social media use for investor relations continues to grow.
Research insights - state of network securityMiguel Mello
This document summarizes the findings of a survey conducted by the Enterprise Strategy Group on the state of network security. The key findings are:
1) Network security operations have become more difficult for most organizations in the last two years due to factors like more devices/traffic on networks and evolving cyber threats.
2) While many organizations monitor network traffic and metadata for visibility, three-quarters believe visibility across their networks could be improved.
3) Adding more security tools may not solve challenges, as organizations already use 5-7 tools on average. A platform approach could better integrate existing tools.
INFOGRAPHIC: The Evolution of Data PrivacySymantec
The document discusses the growing issue of data privacy and protection as data volumes continue to rapidly increase. It notes that by 2020 there will be 40 zettabytes of digital data, and many businesses are unprepared to properly handle and protect this data. The EU's new General Data Protection Regulation will require businesses to be more accountable with data and comply with regulations like mandatory breach notification, data subject rights, and restrictions on consumer profiling. Proper compliance will require businesses to know exactly what data they have, where it is stored, who has access, and how it is being used.
The rise in IT spending is fueling the increased adoption of the bring-your-own-device (BYOD) culture in the region, and given its inherent advantages for employees and employers, BYOD adoption is bound to grow further in the coming years.
However, BYOD adoption is accompanied by IT security risks arising out of lack of awareness about device security among employees. The situation is compounded by insufficient network resources and the lack of formal BYOD policies at organizations to manage security risks emanating from use of personal devices on official servers and networks.
CIOs in the region need to respond by preparing IT networks and formulating a BYOD policies, which are designed to manage this increased demand for BYOD and mobile diversity in the region.
- The document discusses a media product created by students that aims to portray teenagers and high school relationships and conflicts in the style of the movie Mean Girls.
- It seeks to represent both male and female social groups through typical stereotypes seen in movies like Mean Girls.
- The target audience is mainly teenagers who will relate to the conventions and characters portrayed.
- The students think their media product would be best distributed by Paramount Pictures, known for similar teen movies, and should get an international release in theaters before being released on DVD to reduce piracy.
Escola Superior De EducaçãO Do Porto (97 2003, Com Fundo Cinzento Reflexo)edsocial
O documento discute a exclusão social da comunidade cigana em Portugal, abordando seus principais tipos e dimensões. A integração da comunidade cigana é dificultada pelos preconceitos da sociedade e por tradições culturais rígidas dos ciganos, como a proibição da escolarização de meninas após a puberdade. Equipes multidisciplinares e educadores sociais enfrentam desafios para promover a inclusão social dos ciganos.
Technical and allocative efficiency of smallholder dairy farmers in swazilandAlexander Decker
- The document analyzes the technical and allocative efficiency of smallholder dairy farmers in Swaziland. It estimates the average technical efficiency (TE) was 66% and average allocative efficiency (AE) was 78%.
- Factors like water availability, pasture size, soil fertility, dairy experience, training, distance to market, age, credit access, household size, and herd size influence TE and AE levels.
- There is potential to improve TE by 34% and AE by 22% by addressing inefficient factors. The study recommends soil testing, improved credit access, and strengthened extension services to enhance efficiency.
1. O relatório descreve as atividades e gestão da Biblioteca Setorial da Pós-Graduação em Educação Ambiental da Universidade Federal do Rio Grande em 2012.
2. Foram registrados 86 novos exemplares no acervo, que totaliza atualmente 4173 itens. Realizou-se inventário e organização do espaço físico.
3. Dentre as atividades desenvolvidas estão: projeto de extensão "Trilha dos Sentidos", recepção a calouros, orientação de estágio, participação em eventos, Semana Nacional do Liv
The document discusses an organization that provides loans to small and medium-sized enterprises (SMEs) in Yorkshire and Humber, UK. It has funds over £6 million from various public and private investors. It offers loans between £500-£100,000 to new or existing businesses regardless of sector. In the last 6 years, it has started or supported over 75 businesses, created 75 jobs, and sustained 59 jobs. It helps businesses develop plans and turns loans around within 4-5 weeks at interest rates of 10-14%.
The document describes Lessons in Arabic Language, Book 1 by Shaykh Dr. V. ‘Abdur-Raheem of the Islaamic University of Madeenah. It has been made available online courtesy of Fatwa-Online.Com (eFatwa.Com) and with the permission of the Shaykh. The book contains introductory lessons on the Arabic language to help learners acquire basic language skills and familiarize themselves with Arabic.
Pondering the (Near) Future: Climate Change and the Genetics of Plant Migrati...nycparksnmd
Dr Julie Etterson, University of Minnesota, Duluth
Presented at the "What is Local? Genetics & Plant Selection in the Urban Context" Symposia. Tuesday, May 23, 2006, American Museum of Natural History
El documento es una historia sobre un niño que está a punto de nacer y habla con Dios. Dios le asegura que le enviará un ángel para cuidarlo y protegerlo en la Tierra. El ángel cantará para él, le enseñará a hablar y rezar, y lo defenderá de los hombres malos. El niño se preocupa por extrañar a Dios, pero Dios dice que el ángel siempre le hablará de Él y le enseñará el camino de regreso.
La radio transmite señales mediante ondas electromagnéticas. Se originan cuando partículas cargadas como electrones son excitadas a frecuencias de radio. La radio fue descubierta a finales del siglo XIX y permitió la comunicación inalámbrica. En Bolivia, los primeros experimentos de radio se realizaron en 1897 y la primera estación se estableció en Santa Cruz en 1939.
O documento explica a estrutura de seleção switch-case em C/C++. Switch permite executar código com base no valor de uma variável, enquanto case define os valores possíveis. Por padrão, todos os casos são executados a menos que haja um comando break. Default executa se nenhum caso corresponder ao valor.
The document profiles Naji Boulos, Managing Director of Memac Ogilvy Lebanon, one of the top 5 agency groups in the Middle East and North Africa region. As IAA Lebanon Chapter President, Boulos oversaw celebrations for the chapter's 50th anniversary, including a book documenting the chapter's history. The research uncovered one of the chapter's former presidents believed dead, but found alive in Canada. The global reach of the IAA is demonstrated by this story of reconnection.
A apresentação feita aos participantes da Oficina Imprensa, da Imprensa Editorial, em Outibro de 2010. Quase todos os slides possuem links. (Créditos e explicações nas observações do ppoint.)
El documento presenta definiciones breves de diferentes tipos de marketing como el marketing corporativo, marketing de destinos, marketing directo, marketing de guerrilla, marketing de productos industriales, marketing internacional y marketing interno. Explica que cada uno se enfoca en establecer estrategias para diferentes audiencias como colaboradores, turistas, consumidores, empleados u organizaciones multinacionales.
O documento discute as perspectivas da Web Semântica para a Biblioteconomia. Apresenta os conceitos de Web Semântica e como ela pode estruturar melhor a informação na web para ser compreendida por máquinas através de agentes computacionais. Também analisa como os conhecimentos da Biblioteconomia, como catalogação, indexação e uso de metadados, podem evoluir para a Web Semântica melhorando a recuperação da informação.
El documento resume conceptos clave sobre marketing digital en turismo, gastronomía y hotelería. Explica que el marketing digital permite identificar, anticipar y satisfacer las necesidades de los clientes de manera rentable a través de herramientas como datos, minería de datos, CRM y canales digitales como correo electrónico y publicidad. También describe los cambios en los tipos de turistas y sus preferencias, así como los beneficios de las comunidades virtuales y otras aplicaciones del marketing digital.
Portafolio de servicios_de_colworldstaff_diana_garciaasoenclajemaker
La empresa se dedica a la selección y contratación de personal para otras empresas, brindando soluciones a sus necesidades de recursos humanos. Su misión es proveer servicios de selección de personal de calidad y atención personalizada para satisfacer a sus clientes. Sus objetivos incluyen mejorar continuamente sus procesos para garantizar la satisfacción de los clientes y cumplir con las expectativas de rentabilidad de sus inversionistas.
Ctl hnm 0010 a propuesta economica sept 05congresominero
Este documento presenta una propuesta para instalar una planta CTL (Carbón a Líquidos) en Colombia utilizando la tecnología DuTemp. La tecnología DuTemp ofrece mayores tasas de conversión del carbón, mayor producción de líquidos por tonelada de carbón, generación de energía verde, y no requiere oxígeno u carbón seco en el proceso. La planta CTL también capturaría dióxido de carbono y podría producir plásticos sin metales pesados. La propuesta financiera sugiere un enfo
Este documento presenta un seminario sobre mejora genética llevado a cabo en junio de 2008. El seminario tuvo como objetivo mejorar los ingresos y competitividad de productores de lana a través del aumento de la producción de lanas superfinas de calidad. Se describen los servicios y productos ofrecidos como la selección de carneros, inseminación artificial, medición de diámetros y clasificación de majadas. También se muestran los resultados del programa de mejora genética incluyendo tendencias de los valores de cría y fenotí
The king had three daughters and wanted to marry them off, but give the best to the one who loved him most. When asked, the eldest said she loved him like a dove loves wheat. The second said she loved him like a cool breeze. But the youngest said she loved him like people love salt. Angry at the comparison, the king sent her away. She found refuge in the forest, where a prince saw and fell in love with her. They married, and the prince learned of why she was sent away. He invited the king to dinner with no salt, so the king understood her comparison and was reunited happily with his daughter.
This document discusses findings from IBM's 2012 Tech Trends Report, which surveyed over 1,200 IT and business professionals about their adoption of emerging technologies like mobile, analytics, cloud computing, and social business. It identifies three types of organizations - Pacesetters, Followers, and Dabblers - based on how important and how quickly they adopt these technologies. Pacesetters see these technologies as critically important and adopt ahead of competitors. They are more market-driven, analytical, and experimental than other organizations in capitalizing on emerging technologies.
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
“Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And 2011”
Key Findings:
• Improving business continuity and disaster recovery (BC/DR) capabilities is the No. 1 priority for SMBs and the second highest priority for enterprises for the next 12 months
• IT plans to spend at least 5% more on BC/DR in the next 12 months (only 11% of enterprises and 8% of SMBs plan to decrease spending on BC/DR)
• BC/DR represents between 6% and 7% of the IT budget
One of the clearest expressions of this cloud-driven change is the emergence of lines of business (LOBs) — human resources, sales, R&D, and other areas that are end users of IT — both as direct consumers of cloud-based services, and as ever more prominent influencers of companies’ IT agendas.
Impact of Cloud on IT Consumption ModelsHiten Sethi
Cisco, in partnership with Intel®, sought to pinpoint how cloud is impacting IT. 4,226 IT leaders in 18 industries across nine key economies, developed as well as emerging were surveyed. The study results highlighted some interesting findings on IT's view of cloud, LOBs' increasing influence on IT purchasing, and what the future holds.
This document summarizes the findings of a survey conducted by the Economist Intelligence Unit on how technology will impact how companies interact with their customers within the next 5 years. The survey found that customer-driven innovation will become more important, as empowered customers will be a leading source of innovative ideas. Companies will need to adopt digital channels that are relevant to younger generations and be prepared to more openly share information with and involve customers in business processes while maintaining security. Technology must also enable greater responsiveness to customer demand.
The Cisco 2010 Midyear Security Report includes:
* Results and analysis from two new Cisco studies -- one focused on employee collaboration and the other on the concerns of IT decision-makers worldwide
* International trends in cyber-security and their potential impact on business
* Insight into how hackers penetrate “soft spots” in enterprise security to steal sensitive data and sell it to the highest bidder
* An update on global spam trends since late 2009 and spam volume predictions for 2010
* Guidance from Cisco security experts to help businesses improve their enterprise security by 2011
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
This new report on enterprise mobility applications highlights the alarming gap between Central IT and line-of-business IT environments. Millennials in particular are showing signs of growing frustration with the devices and software tools available to support them in the workplace. Many are making their own mobility arrangements, through ‘shadow IT’, despite growing regulatory risk. The advent of the ‘Internet of Things’ will further exacerbate the situation as mobile staff seek access to real time data from their phones and tablets.
Our recent survey of over 100 financial service organizations, conducted by Forbes Insights in the UK and North America, indicates that despite current business and employee demand, enterprise mobile applications remain at a very early stage of maturity, with less than a quarter of employees eligible to access such facilities. The implications here are profound, given the need to support mobile working with appropriate tools in every sphere of corporate activity today.
Many employees complain that the only advance over the last ten years has been to ‘mobilize the laptop’. This merely emulates the traditional desktop environment outside the office. Set against this stark background of underperformance in the mobility area, Central IT appears to be preoccupied with legacy issues such as costly infrastructures and aging systems. Our survey reveals that despite having developed policies and tools to address enterprise mobility, Central IT has little visibility of what is actually going on within the lines of business or at the end user level.
Nor does it have the necessary resources currently to respond rapidly to the growing pressures for workplace mobility. External agencies appear to be stepping in to fill this gap, frequently circumventing Central IT. Mobility remains low on the Central IT agenda.
The three main categories of the data network environment effecting IT security are all undergoing major change simultaneously. In the year ahead, these changes will manifest themselves as security challenges. These trends fall into three categories: client devices (the consumerization of IT); the external threat environment (the institutionalization of threat development); and the hosting environment (virtualization). Any one of these dynamics should shade the thinking of IT strategists inside companies and other organizations. Taken together, they may spur major re-evaluations of current practices.
Most business, whether they realize it or not, are already connected to the IoT. Some though are more prepared than others. New survey defines how to get ahead in this evolution of technology. Find out more here: http://bit.ly/1RwVtfR
Constellation's Research Outlook For 2011R "Ray" Wang
Enterprise leaders face three main challenges in 2011: navigating disruptive technologies, designing next generation business models, and funding innovation through legacy optimization. Regarding disruptive technologies, organizations will see increased adoption but also device proliferation and security issues. Next generation business models will focus on outside-in strategies and putting business priorities first in social business initiatives. Funding innovation will require optimizing existing investments through reducing costs and leveraging current infrastructure.
Take a look with NEOS into the future. This whitepaper is a summary of the top technology trends and impediments that are coming around the bend in the insurance industry.
Take a look with NEOS into the future. This whitepaper is a summary of the top technology trends and impediments that are coming around the bend in the insurance industry.
Enterprise mobility, cloud computing, and retail automation are expected to be major trends in the Indian software market in 2012. Cost reduction will be a primary focus for companies. The mobile BI market is growing rapidly, with over 33% of BI functionality expected to be consumed on mobile devices by 2013. The cloud computing market in India is projected to reach $1 billion within the next 5 years, growing at a fast rate, driven by increasing digital data and adoption of cloud-based solutions. Hybrid cloud models are gaining popularity as they allow companies to balance security, control, and scalability needs.
Big Data: Opportunities, Strategy and ChallengesGregg Barrett
Big Data presents both opportunities and challenges for insurance companies. It allows for more customized products and services through improved segmentation, prediction, and risk analysis. However, it also requires developing a data-driven culture and trust in data governance to realize these benefits. Emerging techniques like predictive modeling, data clustering, sentiment analysis and web crawling can provide new insights but also raise concerns around data privacy and security with more personal customer information. Overall, insurance companies that embrace Big Data and make data-driven decisions are found to be 5% more productive and 6% more profitable.
New Opportunities for Technology-Driven Business TransformationJoseph M Bradley
The core disruptive technologies of mobile Internet, business analytics, social networking,
and cloud computing will transform the preferred IT delivery and deployment models for
global enterprises.
Keynote address channel middle east 2013Meera Kaul
The document discusses recent trends in IT spending and opportunities in the Middle East region. It notes that after a period of stagnation, businesses have regained confidence and begun reinvesting in IT. This has provided opportunities for small and medium IT companies to resume revenue growth. Key areas seeing investment include security, storage, virtualization, and analytics. Government initiatives are also driving IT education. Overall, the sentiment in the region is bullish as backlogs are cleared. The document identifies opportunities for channels partners in areas like SMB solutions, infrastructure, open source, cloud computing, mobility, security, and addressing skills shortages.
Cloud computing has clearly become a driving force in the information technology world. Over 90% of global enterprises report using cloud as part of their business. With over $33 billion in projected 2015 spend, cloud is now the largest category in IT infrastructure budgets.
But every industry has its unique technology dynamics. Therefore, to understand the future of cloud computing you need to understand its dynamics in key industries.
In this report, we will first present some brief observations on the role of cloud across these verticals. The focus will be on the pace of cloud adoption and its subsequent impact on key sectors within each industry.
In addition, our research showed that manufacturing plays a special role in global development—and so the report will take a deeper dive into that unique sector. In doing so, the report will highlight digital trends that have a broader impact as cloud moves from the digital to the “cyber-physical”.
This document summarizes the results of a survey of federal Chief Information Security Officers (CISOs) on the state of cybersecurity from their perspective. Key findings include:
1) CISOs see greater national awareness of cybersecurity issues but still lack sufficient resources to fully address threats.
2) While security tools and training are improving, threats and attacks are also increasing.
3) CISOs face evolving responsibilities beyond technical issues to include management, policy, and political roles.
4) CISOs rely on well-trained staff but need more funding, clear mandates, and operational support from agencies.
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations.
This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
The document discusses 12 top strategic technology trends for 2021 according to Gartner. The trends fall under three main themes: people centricity, location independence, and resilient delivery. Some key trends discussed include the Internet of Behaviors, which captures people's digital data from various sources to influence behavior; total experience, which combines customer, employee, and user experiences; and hyperautomation, which uses tools like AI to automate as many business processes as possible. The trends are interrelated and aim to help organizations adapt to disruption through increased flexibility and responsiveness.
1. exclusive report
Baseline novemBer/decemBer 2010
Security enjoyS a welcome revival in our third annual market
Survey of the technology trendS that managerS and executiveS
are Seeing in their organizationS. going into next year, it leaderS
appear to be both chaStened and enthuSed: hyped technologieS are
getting gut checkS, and promiSing oneS are rolling full-Steam ahead.
By Guy Currier
20
WWW.BaselinemaG.com
2. W
hat’s a trend? You could look at it significant investment in security in 2011, with the vast
as one of two things: a comparison of num- majority of them increasing their investments from 2010
bers, separated by time, or a tale about levels. (See chart 1 on this page.) There’s also marked interest
something that’s happening in the market. in continuity initiatives, backed by significant support from
Which would you choose? executives and finance groups.
We all enjoy a good yarn, and certainly when it comes to In a recent survey by Deloitte & Touche LLP, 36 percent
media coverage, trends seem to be more of the latter variety. of tech-exec respondents indicated that their companies had
And that’s the approach we take with our annual survey of increased security budgets by up to 10 percent this year, and
technology trends. What we’re trying to do is predict the 10 percent of those respondents had increased these budgets
near future—so you know what to prepare for, what to look by more than 10 percent.
at and what to avoid. But Irfan Saif, principal at Deloitte & Touche, suggests
When it comes to trends, this process comes down to one asking whether these designated budgets are enough. “The
simple question: What IT stories are going to be told next adoption of cloud computing, social media and mobility solu-
year? Finding the answer is a devilish proposition. tions is on the rise,” he says, “both in the enterprise and in
In September, we fielded a detailed survey to just under consumer realms. These solutions introduce some new chal-
400 managers in organizations having at least 100 employees, lenges from a security perspective.”
across all sectors in the United States and Canada. We asked It’s clear from our survey respondents that North American
them what their expectations were for various strategies and business will be responding to security issues in 2011. Consider
technologies at their workplace in 2011. We asked whether BGMX Retail Solutions, which faces the challenge of securing
technology commitments were going to rise or fall, and, its enterprise operations while still using valuable social
if so, by how much. We also asked which technologies the networking, Web 2.0 and smartphone tools—all of which
various stakeholders (IT, users, executives and finance/budget can increase the potential for a virus/malware intrusion.
departments) supported most strongly. Based in Vestal, N.Y., this provider of retail IT solutions
By comparing the results for each strategy or technology— and services runs its operations on two networks with many
both against one another and against last year’s responses— remote clients, so security needs are a top priority. To meet
we gained a fairly clear picture of the 2011 landscape. And these needs, the company is using SonicWAll network secu-
what we’ve done in the following pages is to relate what tales rity appliances that provide application intelligence, control
these comparisons tell. and visualization capabilities.
“Because of the architecture of our system, a centralized
1
securitY roars Back management system was put in place for our primary fire-
We’ve been concerned for some time about corporate walls, as well as all of our customers’ firewalls in different
vulnerabilities, as recession-driven spending cuts drove areas of the country,” says Erin Desko, BGMX CTO. “I can
many organizations into a monitor any firewall at any given time, change rules, see who
wait-and-see mode about is connected and apply changes—all from one screen—and
information security. Well, Security not have to remember different IPs, log-in screens, etc. It
perhaps Facebook has cured now takes less time to ensure that everything is working
them of this complacency. Its correctly and allows more time to focus on our customers.”
numerous privacy breaches in 2010 created headlines, but in
2
more general terms, the explosion of social networking use Business intelligence tops social media
in the workplace has combined with increasing use of mobile In 2010, organizations recognized the enormous, valu-
technology as a source of risk to create renewed interest in able data resource social networking had unleashed.
security deployments for next year. In 2011, they expect to take
Nearly half of the organizations we surveyed are expecting stock of this resource, mak- buSineSS
ing sure their analytics fall
intelligence
into line. The development
1 Significant 2011 Investment of social networking and
in IT Security Expected collaboration applications for the enterprise will continue:
Baseline novemBer/decemBer 2010
Much more Roughly 30 percent of the organizations we surveyed expect
than 2010 new or increased deployment of each in 2011. (See chart 2
8.6%
on page 22.) But the enthusiasm is for business analytics and
knowledge management, where nearly two-thirds of new com-
More than
2010 mitments are expected to be at a strong or very strong level.
49.4%
26.4% Business intelligence (BI) systems are likely to see deploy-
ment growth: Our survey showed about 9 percent more
Other organizations expecting significant deployments in 2011,
14.4% compared with last year’s survey. And it’s high on end-users’
and finance’s wish lists. The driver of this interest seems
North American organizations with 100 or more employees. to be the need to corral all these new, usually disorganized
Source: Baseline’s Study of the Top Trends in 2011 (November 2010) information sources. 21
2 2011 New or Increased Deployments WWW.BaselinemaG.com
3. Other 1 Significant 2011 Investment
14.4% in IT Security Expected
Much more
North American organizations with 100 or more employees. than 2010
Source: Baseline’s Study of the Top Trends in 2011 (November 2010) 8.6%
More than
2 2011 New or Increased Deployments “Buying new desktops would have cost too much,” says
49.4% 2010
26.4%
Les Barnett, who oversees educational technology for the
school system. “We saved tens of thousands of dollars just on
5% 4% the initial hardware and software investment.” Other
4% 4%
Nevertheless, while we do see increased14.4% deployment
growth of VDI in 2011 (see chart 3 on this page), many
17% 11% 14% other areas American organizations with 100 or more employees.
North
of virtualization are likely to get more atten-
17% Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
tion, so we don’t expect VDI to be the shooting star it was
this year. 2011 is the time for a good, sober assessment of
this technology, to plan Increased Deployments the
2 2011 New or and strategize in order to take
15%
12% 13% best advantage of it.
1 Significant 2011 Investment
10%
4
in IT Security Expected infrastructure virtualization
5% 4%
Business Knowledge Enterprise Collaboration 4%
Analytics Management Social Much more
Applications resumes a fast pace 4%
Networking than 2010
8.6%
Is virtualization the answer to everything? It certainly
At a moderate At a strong At a very 17% 11%
seems that way. Cost-reduction—check. Growth—check. 14%
level level strong level 17%
More than Business flexibility—check.
North American organizations with 100 or more employees.
2010 Following a bit of VDI- and
Source: Baseline’s Study 49.4% Trends in 2011 (November 2010)
of the Top 26.4%
cloud-induced distraction virtualization
15%
in 2010, we see tremendous 12% 13%
10%
3 New VDI Deployments Expected impact
“Some social networking techniques will clearly Other activity levels for the more
all users, and deployments will continue at their own pace— 14.4% mature virtualization types in 2011. (See chart 4 below.)
33% Business Knowledge Enterprise Collaboration
independent of corporate intent,” says Bill Bosler, CIO at
30% All Covered, Management City, Calif.-based regulation,
Analytics a Redwood Social Applications
North American organizations with 100 or more employees. Networking
Texas Consultants, which recently designed an ambitious compliance, business continuity and strategic planning
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
BI tool as part of a new oil refinery project in the Middle services company, has deployedaenterprise virtualization to
At a moderate At strong At a very
level level strong level
East. “There will be plenty of action on the analytics side, both cut costs and increase flexibility.
North American organizations with 100 or more employees.
2 2011 New or Increased Deployments
crunching all the new real-time data collected by both new “We’ve been fortunate that our business has been
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
and traditional means, and anticipating and mitigating chal- expanding,” says CIO Tim Crawford, who is also a past
lenges before they occur.” president of the Society for Information Management’s San
4% Francisco Bay VDI Deployments Expectedbe times
5% 3 New Area chapter. “However, there may
3
2010 2011
4%
vdi adoption takes a Breath Survey
Survey 4% where some services contract. Given that, the virtual model
In another example of with 100 or more employees.take stock can save between 25 and 75 percent on operating costs, 33%
North American organizations a market pausing to 30%
11%
of a promising 17% development, the speedy pace that
new 14%
Source: Baseline’s Study of the Top Trends in 2011 (November 2010) depending on how efficiently the servers are used today.”
17%
virtualized desktop infrastructure (VDI) showed in 2010 It’s clear that server and storage virtualization are only
should slow somewhat. But now hitting their stride, as most organizations have at least
4 New Virtualization
this is not to say that growth
15%
one production environment and are beginning to move
Deployments Expected
will not continue: A good 12% vdi 13% aggressively to expand. Application virtualization may also
10%
Server, storage or application virtualization
VDI system offers manage-
(network virtualization excluded)
be taking advantage, though that’s unclear from our study,
ment, security and energy
Business Knowledge 11%
Enterprise Collaboration
which didn’t separate it out from the other two. Network
2010 2011
advantages, particularly in organizations with Applications
Analytics Management Social a large, dispa- virtualization, however, was looked at separately and still
Survey Survey
rate user population, such as thoseNetworking in the education sector. seems to be several years away100 or more employees. deploy-
North American organizations with from meaningful
For example, 6% Dougherty County School very
At a moderate
the At a strong 25% At a System in ment levels. Baseline’s Study of the Top Trends in 2011 (November 2010)
Source:
level level strong level
Georgia deployed 1,500 seats in classrooms and computer
13%
North American organizations with 100 or more employees.
labs in seven schools, using solutions from NComputing.
Source: Baseline’s Study of the Top Trends in 14% (November 2010)
12% 2011
4 New Virtualization
2010 Survey 2011 Survey Deployments Expected
Server, storage or application virtualization
Baseline novemBer/decemBer 2010
3 New VDI Deployments Expected
At a moderate At a strong At a very (network virtualization excluded)
level level strong level
33% 11%
30% American organizations with 100 or more employees.
North
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
6% 25%
13%
5 New or Increased 12% 14%
Deployments Expected 2010 Survey 2011 Survey
2010 2011 At a moderate At a strong At a very
43%
Survey Survey level level strong level
37%
35% American organizations with 100 or more employees.
North 34% North American organizations with 100 or more employees.
22 30%
Source: Baseline’s Study of the Top Trends in 2011 (November 2010) Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
27%
WWW.BaselinemaG.com
4 New Virtualization
New or Increased
4. At a moderate At a strong At a very
level level strong level
North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
2010 2011
5
Survey Survey
organizations go ever more moBile 5 New or Increased
North American organizations with 100 or more employees.
Mobility, remote user Top Trendsand telecommuting con-
Source: Baseline’s Study of the
access in 2011 (November 2010) Deployments Expected
tinue to show remarkable levels of employee-driven
deployment. Of the orga- 43%
nizations thatVirtualization
4 New took part in
37%
35% 34%
Deployments Expected mobility
our study, 27 percent say 30%
they are seeing significant
Server, storage or application virtualization 27%
end-user demand for excluded)
(network virtualization
these
technologies—more than any of the11% other 45 trends we
tested. Though the pace of adoption for telepresence (virtual
video-based meetings) is almost the same this year as it was
6% 25% 2010 2011
last year, both wireless networking (for building, campus and
13% Survey Survey
remote-office connectivity) and all forms of mobility should
have strong growth in 2011. (See chart 14% right.) 5 at Wireless Telepresence Mobility
12%
Networking
Fordham 2010 Survey in New 2011 Surveymade mobile-
University York has
initiative expansion one of its top priorities, says CIO and North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
Vice President Frank Sirianni. a strong a challenge to ful-
At a moderate
level
At There’s
level
At a very
strong level
fill disparate communications needs morea number of sepa-
North American organizations with 100 or
for employees.
rate communities that aof the Top Trendssupports, and 2010)
Source: Baseline’s Study university in 2011 (November enhanced
mobile solutions are often the best way to meet these needs. SaaS has weathered this gale well, has matured and is now
“Parents need emergency information and updates,”
6 New or Increased Deployments
ready for more widespread adoption than any of the other
Sirianni says. “The faculty needs various Web-based appli- cloud options currently bandied about. (See chart 6 on this
cations.New or Increased students and donors have
5 Furthermore, our faculty, 4%
page.) We believe in strong futures for both private and public
all beenDeployments Expected
‘spoiled’ by the consumer experience, which is able cloud computing, and even for platform as a service (PaaS).
to deliver more, better, faster.” However, 13% in this story, we’re in the business of predicting
43% next year’s trends, not 4% those farther out.2%
6
37%
interest in cloud computing For New York City government agencies, expanding into
35% 34% 8% 5%
refocuses on saas 30% the cloud for software as a service will provide greater access
27% 1%
Last year, we saw the private-cloud wave coming to collaborative solutions for multiple departments, while
14%
before it hit the mainstream. This year—in line with what saving significant costs. The city 13%
10%
is finalizing 5%deal with
a
may be the meta-trend of Microsoft that will unify dozens of software agreements
4%
better-established technolo- within one cloud-based solution structure, and expand the
cloud computing SaaS Private Public PaaS
gies getting more attention current supply of tools for e-mail, message, collaboration and
Clouds Clouds
2010 2011
in 2011—we see a return to
Survey Survey live-meeting needs.
At a moderate At a strong At a very
the speed, familiarity and More than 100,000 employees in about 100 agencies will
level level strong level
Wireless Telepresence Mobility
cost savingsNetworking as a service. The fact is that two
of software be affected, American organizations millionor more employees. be saved
North and at least $50 with 100 is expected to
years ago, SaaS had reached a kind of assessment point, as during Source: Baseline’s Study of theAlso, employees who2010)
the next five years. Top Trends in 2011 (November currently
North American organizations with 100 or more employees.
concerns about service levels, security and especially avail- don’t have access to these tools, such as mobile social-services
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
ability mounted. employees, will be able to access them via the cloud.
“This will allow us to move more quickly while reducing
overall 2011 Significant/Increased
costs,” says Mike Bimonte, deputy commissioner for
7
IT services for the city of New York. “This is especially true
6 New or Increased Deployments Investment or Deployment
in this economy, which has forced us to analyze our licensing
and software spend and 37% 8%
quickly identify lower-cost solutions
4%
that areBusiness Process Improvement
more efficient.”
Added Paul O’Brien, executive director of IT systems:
36% 6%
“With this agreement, we’ll also have greater opportunity to
Baseline novemBer/decemBer 2010
13% 4% Revenue-Building IT
2% try out different software solutions offered within the cloud
8% 5% to see what12% best for20% employees.”
works our moderately
Customer Relationship Management increased
7
1%
it angles toWard profit groWth
8% 16% greatly
14%
13% 5% We’ve been tracking IT’s alignment withincreased and business
10% Enterprise Resource Planning
4%
business goals since
our first issue nearly 10 years with 100 or buSineSS it
North American organizations more employees.
SaaS Private Public PaaS Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
Clouds Clouds ago. To add to our pleasure alignment
At a moderate At a strong At a very in the renewal of interest in
level level strong level security, we are also happy
North American organizations with 100 or more employees. to see IT, and certain applications in particular, in strong
Source: Baseline’s Study of the Top Trends in 2011 (November 2010) 8 Significant 2011 Investment in the
demand in 2011. (See chart 7 on page 24.) 23
Hardware Infrastructure Expected
Much more
WWW.BaselinemaG.com
than 2010
4.7%
5. At a moderate At a strong At a very 4% increased
level level strong level Enterprise Resource Planning
North American organizations with 100 or more employees. North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010) Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
13% 4% 2%
8% 5%
1%
2011 Significant/Increased 8 Significant 2011 Investment in the
7 14%
13%
Investment or Deployment Hardware Infrastructure Expected
10%
5%
4%
Much more
37% 8%
than 2010
SaaS Private Public PaaS
Business Process Improvement 4.7%
Clouds Clouds
36% 6% At a moderate At a strong More than
At a very
level level 2010
strong level
Revenue-Building IT 20.6%
42.5%
North American organizations with 100 or more employees.
12% 20% Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
moderately
Customer Relationship Management increased
Other
8% 16% greatly 17.2%
increased
Enterprise Resource Planning
7 2011 Significant/Increased
North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
Investment or Deployment
North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
37% 8%
Business Process Improvement
Forty-one percent of the organizations in our survey If these figures don’t quite impress, consider this: Thirty-
are looking forward to increased use of technology or IT 9 Increased Engagement in6%
seven percent of the organizations we surveyed are going to
36%
8 Significant 2011 Investment in the
processes specifically to increase their organizations’ rev- End-User Autonomy Expected
increase their hardwareIT
Revenue-Building consolidation efforts as well, some-
Hardware Infrastructure Expected
enue; 45 percent say they expect increased engagement in thing you’d normally expect to be a drag on new equipment
Much more 12% 20% 22%
business-process improvement in the coming year. BPI, in deployments. moderately
than 2010 Customer Relationship Management increased
fact, is far and away the most-often supported technology 4.7% “It’s a good thing to do as leases run out and you get the
by finance (31 percent) and corporate executives (35 per- chance to 8% consolidate while replacing the old with the new,”
16% greatly
More than 12% increased
cent), and it’s nearly as much in demand from end-users 2010 says Stephen Pickett, CIO at Penske in Bloomfield Hills,
Enterprise Resource Planning
(26 percent). 42.5% 20.6% Mich. “Passing the disaster recovery test is an important part
North American organizations with 100 or more employees.
Bottom-line applications such as CRM and ERP—though of the process because youthe Top Trends in to have a service man-
Source: Baseline’s Study of don’t want 2011 (November 2010)
2010 2011
a bit less popular than BPI—are favorite investments in most ager in California who has work to doSurvey do it because
Survey
but can’t
companies where they are being used next year. Other the server isn’t working.”
17.2% North American organizations with 100 or more employees.
Chartis, a New York-based insurance company, has We figure that hardware is going to get outsized attention
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
invested in IT solutions to increase profit and growth for for some time.
Significant 2011 Investment in the
more than a decade. Recently, 100 launched its OneClaim
it or more employees. 8
9
North American organizations with Hardware Infrastructure Expected
system Source: Baseline’s Study offrom Pegasystems to manage the
with technology the Top Trends in 2011 (November 2010)
10 end users gain more control more
New or Increased Unified
Much
claim life cycle from the initial customer call through adjudi- Where there’s challenge, Deployments 2010so the
Communications there’s opportunity, or than
cation and payout. “We can standardize and automate claims old trope goes. Surely the idea of masses of end-users
4.7%
3.7%
processing no matter Engagement in jurisdiction,” says
9 Increased what the regulatory managing their 3.7% corporate computing environments could
More than
Alla Krasnopolsky, aAutonomy Expected systems for
End-User manager of informational send an IT manager running 2010
14.7%
Chartis. “Regardless of how small or how large the project is, for the hills. But one fasci-
11.7% 42.5% 20.6%
end-uSer
we try to incorporate these technologies.” 22% nating trend that bubbled management
up in our study last year, but
8
Other
hardWare investment—and didn’t make it into the list 14.4% 17.2%
13.6%
consolidation—continue
12% until this year, is end-user centricity as an IT management
Moving slightly up the charts—last year it was at #9— technique. (See chart 9 below.)
2010 Survey
How’s that, you ask? Won’t 100 or more employees. of tech-
is the ongoing hardware refresh, spurred by aging systems, North American organizations with decentralization
2011 Survey
reduced inventories and the release of Windows 7. We expect
2010 2011 nology into themoderate of the Top Trends in 2011 (November very lead
Source: Baseline’s Study the (usually untrained) a 2010)
At a hands of At a strong At masses
this trend to continue into a
Survey Survey level level strong level
second North American organizations with 100 or more employees.
year, possibly even North American organizations with 100 or more employees.
infraStructure
stronger than the numbers Top Trends in 2011 (November 2010) Increased Engagement in
Baseline novemBer/decemBer 2010
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
Source: Baseline’s Study of the
9
here indicate. End-User Autonomy Expected
For one thing, hardware
infrastructureor Increased Unified survey respon-
10 New was the area cited by our 22%
Communications Deployments
dents as being least likely to experience reduced invest-
ment at their organization, even 3.7% the continued
with
3.7%
business emphasis on reduced capital investment. 12%
Another thing is simply the continuing extent to
14.7%
11.7%
which firms expect significant investment in hardware
next year. (See chart 8 on this page.) Forty-three percent 2010 2011
of organizations said so, and most of them expect that Survey Survey
investment to 13.6% be bigger than 2010’s by a wide margin.
14.4% North American organizations with 100 or more employees.
24 Storage systems (not shown) look similarly strong in 2011. Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
2010 Survey 2011 Survey
WWW.BaselinemaG.com
At a moderate At a strong At a very 10 New or Increased Unified
level level strong level Communications Deployments
6. 2010 2011
Survey Survey
North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
inevitably to lack of control? Well, it really depends on 10 New or Increased Unified
what gets decentralized. Communications Deployments
Management and control can continue in the back office, 3.7%
as applications are built, tested and vetted. Users, in turn, can 3.7%
install and run when needed—especially in mobile environ-
14.7%
ments. Client monitoring and application management sys- 11.7%
tems round out the strategy so that wildcat client applications
can be identified and contained.
One area in which both management and users are working 13.6% 14.4%
together is in social networks. Employees are allowed—or
even encouraged—to participate in social networking sites
to increase interaction with customers and enhance brand 2010 Survey 2011 Survey
recognition. Management, in turn, develops policies and pro- At a moderate At a strong At a very
cedures to ensure those interactions generate positive results level level strong level
for the business. North American organizations with 100 or more employees.
Source: Baseline’s Study of the Top Trends in 2011 (November 2010)
Varsity, a Memphis-based cheerleading/dance apparel and
instructional-clinic company, wanted to expand globally, but
first it needed to take control of its e-commerce execution—
its brands were scattered in various e-storefronts—and make was a fallow year for unified communications (UC), doubtless
better use of social networking sites. because the up-front investment can be great, and the current
Using IBM’s WebSphere Commerce solution enabled the economic environment demands quick returns.
company to route all customers to a central Varsity Web loca- But comparing this year’s survey results to last year’s, we
tion, where all brands are represented. It also increased the see an increase in expected UC deployments coming. (See
use of “share” features during product sales, so customers can chart 10 above.) And the benefits, certainly, are likely to be
spread the word about products they like on Facebook and significant in the long term.
other social sites. Penske (see trend 8 earlier in the story) has invested heavily
“We have 240,000 fans on Facebook, and we wanted to in UC tools from a number of vendors, including Avaya, Cisco
do a better job of connecting to our social-media audience,” and NEC. “These tools allow us to run our businesses with
says Shannon Ahern, executive director of e-commerce for our Verizon devices,” says Pickett. “We can access our voice
Varsity. With this solution, management can get more of its mail, e-mail and desktop data as if we were in the office.
products into the flow of the conversations taking place on “The drivers and crew chiefs will use it too, because
social networking sites, and employees and managers can they’re constantly on the track or out and about, and they
make better decisions based on what customers are saying. depend on their handhelds. With unified communications,
you can get all you need in one place.” 3
10
unified communications starts
to shoW life Guy Currier is executive director of research at Ziff Davis
We don’t want to get too enthusiastic, but all Enterprise. Dennis McCafferty also contributed to this article.
signs are pointing to a revival,
finally, in this long-promised unified
merging of disparate corpo- Please send your questions and comments on
communicationS this article to editors@baselinemag.com
rate digital streams. This year
Baseline novemBer/decemBer 2010
hoW We conducted the research
A multiple-choice questionnaire was fielded by Ziff Of the 386 respondents, 104 had vice president or
Davis Enterprise Research from August 26 to October 6, higher titles, 95 had director titles and 151 had man-
2010, asking those involved in technology decisions at ager titles. Several questions were asked of this group
their organizations what expectations they had at their about each technology and IT strategy area to gauge
companies in 2011 for 46 technology and IT strategy the relative strength of each, as well as to understand
areas. Responses were collected from 386 managers the chief factors that might be driving or potentially
and higher titles in organizations with at least 100 hindering it. The trends covered in this story are the 10
employees: 129 in firms with 100 to 499 employees, that received the strongest results because of wide-
123 in firms with 500 to 4,999 employees, and 134 in spread adoption, intense (highly committed) adoption
firms with 5,000 or more employees. or both. 25
WWW.BaselinemaG.com