Pages

23 November, 2016

More in APJ using sophisticated validations for IT security

Source: CA Technologies infographic. Top security priorities for Asia Pacific companies.
Source: CA Technologies infographic. Top security priorities for Asia Pacific companies.

Firms are measuring the success of IT security beyond breaches and compliances, a global study* from CA Technologies finds. They are now including business performance indicators that contribute directly to revenue growth, with 87% of firms in Asia Pacific & Japan (APJ) agreeing that the role of security is to enable them to enter new markets and deliver services in new ways.

The study, The Security Imperative: Driving Business Growth in the App Economy, polled 1,770 senior business and IT executives of which more than 100 are chief security officers (CSOs) and chief information security officers (CISOs). Seven hundred and ninety-nine of the respondents were from countries in the APJ region, including Australia, mainland China, Hong Kong, India, Indonesia, Japan, Malaysia, Singapore, South Korea and Thailand.

The majority of survey respondents said that IT security, specifically identity-centric security, needs to do more than protect the business in today’s environment – it needs to help build trusted digital relationships that are critical for competing in the application economy and growing the business.

· Nearly nine in 10 (87%) of respondents said that there is a need to balance strong security with enabling their business to enter new markets and deliver services in new ways.

· Eight in 10 (85%) said that identity-centric security is critical to the business.

· Eight in 10 (84%) said that security needs to be frictionless and not overburden the user

· Eight in 10 (83%) said that security is critical to protecting the brand and can be viewed as a competitive differentiator; and

· More than 70% of respondents are using metrics such as digital reach, operational or process efficiency, business growth, customer satisfaction, and a number of compliance audit failures.

“For digital businesses to thrive in the application economy, they need to drive new business models and participate in new connected ecosystems of value,” said Stephen Miles, CTO, APJ, CA Technologies. “A good identity-centric security strategy enables a business to accelerate that objective with the confidence that great customer experiences are delivered, whilst mitigating risks and protecting the business. To ensure a successful digital journey, identity-centric security needs to be incorporated at the start as a core technology enabler rather than bolted on as an IT afterthought.”

The study also examined respondents’ current security postures in three areas of identity-centric security: the end-user experience, identity and access management, and data breaches. This information allowed CA and Coleman Parkes, which conducted the study, to create a maturity model for identity-centric security, categorising respondents as advanced, basic or limited.

Overall, the APJ results categorised the majority of respondents as basic users of identity-centric security (64%), with a focus on core capabilities such as password management, single sign-on and some analysis and reporting. More than a quarter (28%) were categorised as advanced users, engaging in capabilities such as adaptive security and behaviour analytics, and consistent omnichannel security support.

While all users in APJ saw improvements in their business from security initiatives, the survey showed that advanced users generally reported more significant results especially in areas of customer experience, business operations and security:

· Advanced users saw a 58% improvement in business growth and new revenue compared to 44% for basic users.

· More than half (58%) of advanced users reported improvement in employee productivity versus 44% of basic users.

· Advanced users reported a 49% improvement in number of compliance audit failures as compared to 38% for basic users.

· And when it comes to security, almost thrice as many advanced users of identity-centric security have seen a reduction in data breaches compared to basic users – 35% versus 12%.

Notably, most advanced users of identity-centric security in APJ that have seen a decline in breaches have been much more proactive in preventing them through increased investment (86%), focusing on mobile devices and apps (82%), implementing strong step-up authentication (73%), and focusing on high-risk areas like privileged identities and access (68%).

Interested?

Read The Security Imperative: Driving Business Growth in the App Economy

View the complete Security Imperative infographic

*Conducted by Coleman Parkes, the study included 1,770 senior business and IT executives, including more than 100 CSOs and CISOs, from large enterprises across 21 countries and 10 industry sectors. The study and data analysis was done from May – September 2016. Coleman Parkes Research Ltd, formed in 2000, provides action-focused marketing research on a global scale. The company offers a full research and consultancy service across all markets, while specializing in business-to-business research with a focus on IT, technology and communications research. For more information, please visit www.coleman-parkes.co.uk.

posted from Bloggeroid

No comments:

Post a Comment