Gartner Says Organizations Must Prepare For The Security Implications Of The Digital Workplace

Gartner Says Organizations Must Prepare For The Security Implications Of The Digital Workplace

PRESS RELEASE – STAMFORD, Conn., June 9, 2014

Gartner Says Organizations Must Prepare For The Security Implications Of The Digital Workplace

gartner-logo

Analysts to Focus on Top Security Trends at Gartner’s 2014 Security and Risk Management Summits, June 23-26 in National Harbor, MD, August 25-26 in Sydney, September 8-9 in London and September 15-16 in Dubai

Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to Gartner, Inc. Gartner predicts that by 2018, 25 percent of large organizations will have an explicit strategy to make their corporate computing environments similar to a consumer computing experience. Security organizations and leaders that fail to alter strategies to accommodate a more consumerized workforce will be sidelined by engaged organizations.

Tom-ScholtzSignificant changes that impact an organization’s approach to security are underway,” said Tom Scholtz, vice president and Gartner Fellow. “Employee digital literacy has led to a growing consumerization movement within most enterprises, with employees using a wide variety of consumer-oriented apps for business purposes. Other workplace trends — such as out-tasking, globalization, networked reporting structures, shadow IT and a desire to foster employee engagement — are all impacting IT strategies. As organizations shift toward a more digital workplace, long-held approaches to security need to be re-examined.

“Implementation of a digital workplace exacerbates the IT department’s loss of control over endpoint devices, servers, the network and applications,” said Mr. Scholtz. “In a fully consumerized workplace, the information layer becomes the primary infrastructure focal point for security control. This reality necessitates a shift toward a more information-focused security strategy.”

The sheer volume of devices and access vectors implied by a digital workplace, coupled with the increase in sophisticated, dynamic attack methods and insider threats, makes the traditional approach of focusing on preventive controls (such as signature-based anti-malware, network and host intrusion prevention systems, pervasive encryption and continuous patching) increasingly ineffective. While the value of and need for preventive controls will never go away, the digital workplace reinforces the need to focus more on detective and reactive controls. In practice, this means increasing investments in context-aware security monitoring for internal and external environments, threat intelligence assessment capabilities and incident response. Pervasive, context-based monitoring and security information analytics will form the core of next-generation security architectures.

Strategies such as the digital workplace implicitly recognize that users will be given more freedom in how they use technology and information. This implies a higher level of trust that users will exhibit appropriate behavior in dealing with enterprises’ information resources. Key elements of a behavior-focused security communication strategy include considering “just in time” security awareness techniques, which remediate or reward user behavior based on the appropriateness of that behavior within the user’s context.

Effective behavior management is not produced by the mere deployment of an education program,” said Mr. Scholtz. “In addition to an education program that is focused on measurable behavioral outcomes, security leaders should develop their ability to collaborate with personnel and line-of-business managers to modify job descriptions and reward mechanisms so that they are aligned with desired security performance.”

Gartner believes that trusting the motives and behavior of individual users is a key enabler for the digital workplace. Conventional approaches to information security tend to treat everyone, including employees, with distrust. By implication, such an attitude will impede the digital workplace. However, a more people-centric approach to security will contribute to the potential success of the initiative. People-centric security (PCS) is a strategic approach to information security that emphasizes individual accountability and trust, and that de-emphasizes restrictive, preventive security controls.

PCS is based on a set of key principles, and on the rights and related responsibilities of individuals. The premise of PCS is that employees have certain rights — but these are linked to specific responsibilities. These rights and responsibilities are based on an understanding that, if an individual does not fulfill his or her responsibilities, or does not behave in a manner that respects the rights of colleagues and the stakeholders of the enterprise, then the individual will be subject to sanction. While a wholesale PCS strategy is certainly inadvisable for many organizations, it is certainly a viable concept that should be considered as part of the digital workplace.

The digital workplace implies new and different security risks,” said Mr. Scholtz. “Hence, it is imperative for the impact of the digital workplace to be properly risk-assessed. Owners of information assets involved in the initiative must be informed of the risks, and the security team must help them assess the potential impact of the risks against the expected business benefits of the digital workplace. Also, the affected information owners must sign off on any additional risk that they are willing to accept in the interest of the digital workplace.

More detailed analysis is available in the report “Prepare for the Security Implications of the Digital Workplace.” The report is available on Gartner’s website at http://www.gartner.com/doc/2720217.

This research is part of the Gartner special report “The Nexus of Forces: Social, Mobile, Cloud and Information.” The report is available on Gartner’s website at http://www.gartner.com/technology/research/nexus-of-forces. It includes links to reports, webinars and video commentary that examine the impact of the Nexus of Forces on enterprises.

About Gartner Security & Risk Management Summit

Gartner analysts will take a deeper look at the outlook for security solutions at the Gartner Security & Risk Management Summits taking place June 23-26 in National Harbor, Maryland, August 25-26 in Sydney, Australia, September 8-9 in London, U.K and September 15-16 in Dubai, UAE. More information on the U.S. event can be found at www.gartner.com/us/securityrisk. Details on the Australia event are at http://www.gartner.com/technology/summits/apac/security/. More information on the U.K. event is at http://www.gartner.com/technology/summits/emea/security. Details on the Dubai Summit are at http://www.gartner.com/technology/summits/emea/security-dubai.

Gartner, Inc. (NYSE: IT) is the world’s leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is a valuable partner in more than 14,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, USA, and has 6,100 associates, including more than 1,460 research analysts and consultants, and clients in 85 countries. For more information, visit: www.gartner.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are You Sure You Are Ready For The Cloud: Type of Cloud

Are You Sure You Are Ready For The Cloud: Type of Cloud

Type of Cloud Continuing this theme on “Are you ready for the Cloud”, we are going to move forward with a new question: What type a cloud? That can be encompassed with many different connotations. It could mean it’s going to be hosted by a provider, or is it going to be an on-prem cloud?…

The Internet of Things And The Knowledge Revolution

The Internet of Things And The Knowledge Revolution

The Knowledge Revolution Think about a few things in your life right now. It really doesn’t matter what they are, as long as you interact with them daily. They could be your phone, your shoes, your watch, your car, your refrigerator, your garage door opener…you get the idea. What do all of these things have…

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Lingering Security Concerns Considering the cost and time-to-market advantages of SaaS applications in particular, it’s no surprise that companies are looking to the cloud to meet their business objectives. But what happens when a ‘cloud first’ company must also put security and compliance first? In a recent Bitglass survey report from a cloud access security…

The Rise of Fintech and the End of Traditional Banking

The Rise of Fintech and the End of Traditional Banking

The Rise of Fintech Developments in financial technology, or fintech, are changing the way we make payments, with new products gradually transforming how personal and commercial transactions are processed. The pace of these developments has opened up a whole range of opportunities for fintech start-ups and new players; but the arrival of cutting-edge technology has…

Risks Of Virtualization In Public And Private Clouds

Risks Of Virtualization In Public And Private Clouds

Risks Of Virtualization Server virtualization is one of the cornerstone technologies of the cloud. The ability to create multiple virtual servers that can run any operating system on a single physical server has a lot of advantages. These advantages can appear in public, Infrastructure as a Service (IaaS), as well as in private clouds. However,…

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid “For what greater wealth can there be than cheerfulness, peace of mind, and freedom from anxiety?” So wrote the English author and philosopher Sir Thomas More in his novel, Utopia, almost 500 years ago. More’s utopian dreams continue to thrive in one guise or another to the present day; in the…

OpenStack Interoperability – Dawn Of A New Era?

OpenStack Interoperability – Dawn Of A New Era?

The Interoperability Challenge! OpenStack has always had interoperability as one of its unique selling points. Simply put – you can use OpenStack on-premise and what you develop will also work with other OpenStack environments. Open APIs and open source is the common denominator. However until now, it has been an elusive feature or really dream…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising