Transcript Document

TOP TECHNOLOGY TRENDS
Bring Your Own Device
RFID and NFC
Tablets and Mobile Computing
Big Data and BI Tools
Cloud Computing
Security
Mobile Apps
IT Governance
Social Networks
Green Computing
2012
May 24, 2012
© 2012-Robert G Parker
Page: 1
TOP TECHNOLOGY TRENDS
Bring Your Own Device
May 24, 2012
© 2012-Robert G Parker
Page: 2
TOP TECHNOLOGY TRENDS
Bring Your Own Device
May 24, 2012
© 2012-Robert G Parker
Page: 3
TOP TECHNOLOGY TRENDS
Bring Your Own Device
May 24, 2012
© 2012-Robert G Parker
Page: 4
TOP TECHNOLOGY TRENDS
Bring Your Own Device
What is it?
Traditionally IT was a service provided by the business
Increasingly employees, customers, contractors and others want to
interact with the business using their own devices
Companies have found that BYOD environments may increase employee
satisfaction
Why is it Important?
Business are responsible for information entrusted to them
Responsible for protecting assets and intellectual property
Extending and maintaining protection and security over non-owned
technology devices presents new and challenging issues
Such access may violate legislative and regulatory requirements or
contractual obligations
May 24, 2012
© 2012-Robert G Parker
Page: 5
TOP TECHNOLOGY TRENDS
Bring Your Own Device
(Con’t)
Issues and Risks
Lack of specific policies, procedures or guidance
Employee’s BYOD may store confidential corporate or personal information
Employee’s BYOD may not have appropriate security or comply with
corporate policy
Employees may loan their BYOD and/or let family members use it further
exposing confidential information
Business may have difficulty enforcing their policy on non-owned devices
Business may not know exactly who they are provisioning or on-boarding
Inability to control non-business use of BYODs
Challenges in ensuring effective back-up of information stored on BYODs
Employees or contractors my subscribe to commercial backup services
and inadvertently violate laws and agreements Companies have found that
May 24, 2012
© 2012-Robert G Parker
Page: 6
TOP TECHNOLOGY TRENDS
Tablets and Mobile Computing
What is it?
The adoption of mobile computing/communications devices as an
integral part of the corporate’s technology infrastructure
Designing corporate processes and system to take the most advantage
and achieve a competitive advantage
Attempting to use tablets and mobile computing as disruptive
technologies
Why is it Important?
Mobile computing provides significant benefits to the business;
availability, immediate access to entity information anywhere and access
to technology rich tools and processes
The mobile devices and perhaps more importantly, their various uses
introduce new risks in terms of security, privacy, loss and theft; all of
which may involve personal information, corporate intellectual capital or
customer sensitive information.
May 24, 2012
© 2012-Robert G Parker
Page: 7
TOP TECHNOLOGY TRENDS
Tablets and Mobile Computing
(con’t)
Issues and Risks
Protection of corporate information on lost or stolen devices
Secure integration of mobile devices with existing infrastructure
(Controlling access points, data leakage, downloading unsafe apps, etc)
Growth in mobile devices requires considerations around device
management, mobile platform development and mobile data
management capabilities
The universality of the Windows-based PC as a business platform will
lessen as users increasingly opt for more portable tablets and smart
phones. A company’s investment in new or replacement technology will
need to accommodate and sustain the new technology
The cost to revamp or replace existing business processes and
applications to interface with mobile technology can be significant
May 24, 2012
© 2012-Robert G Parker
Page: 8
TOP TECHNOLOGY TRENDS
Tablets and Mobile Computing
(con’t)
Issues and Risks
Business competitors can exploit mobile technology marketing and
customer relationship opportunities quickly, even providing businesses
with the software “apps”
The volume and speed of change in mobile technology makes keeping
pace difficult and costly. Investment in the “wrong” technology or failing
to invest in the “right” technology can contribute to excessive cost write
offs or loss of market share
The ability to develop user interfaces to accommodate the different
operating systems, screen sizes and application functionality to handle
inputs and outputs for the target devices and to manage the customer
experience requires business and technical skills that may not currently
be available to the organization
May 24, 2012
© 2012-Robert G Parker
Page: 9
TOP TECHNOLOGY TRENDS
Tablets and Mobile Computing
(con’t)
Issues and Risks
Mobile devices are, by their very nature, easily lost or stolen or can be
used by a perpetrator to masquerade as a valid user. There is an
increased need to authenticate the mobile user to verify the devices and
their identity and credentials
Business competitors can exploit mobile technology marketing and
customer relationship opportunities quickly, even providing businesses
with the software “apps”
Existing infrastructure and network bandwidth may not be sufficient to
accommodate the increased volume and volatility of users and
transactions mobile computing functionality
May 24, 2012
© 2012-Robert G Parker
Page: 10
TOP TECHNOLOGY TRENDS
Tablets and Mobile Computing
(con’t)
Issues and Risks
The relationships and cost sharing in the mobile space among the key
participants is not clear. Device manufacturers, network providers, app
developers and payment processors all play a part in the value
proposition that needs to be clarified to enable the customer to
understand the costs of the service
The integrity, functionality, performance or security of the apps that are
downloaded to the mobile devices is not easily verifiable
Corporate policies that were developed and implemented in prior years
may not be adequate to deal with the issues of mobile computing
Protect against malicious codes or naively downloading apps that give
away sensitive data to a malicious user
May 24, 2012
© 2012-Robert G Parker
Page: 11