IT security highlighted at IDC event
DUBAI — The impact on IT security of emerging technologies and models such as virtualisation, cloud and mobilitywere highlighted at the recent IDC IT Security Roadshow 2012 in Dubai. IDC returned to the city for the seventh edition of its annual roadshow.
With more than 100 of the country’s most influential IT end-users in attendance, the event explored the likely scenarios that will characterise the use of IT security technology over the coming years.
Megha Kumar, research manager for software and enterprise solutions, at IDC Middle East, Africa, and Turkey, began the event by exploring the potential security implications of the cloud, social business and mobility, outlining the key challenges and priorities associated with each of them. She also offered advice on drawing up effective strategies, laying down policies and processes, and deploying optimal technology solutions as part of the quest to secure the next-generation enterprise.
Dell SonicWall Emea head of product marketing Florian Malecki then assessed the security risks associated with the increasingly popular “Bring Your Own Device” movement, which is being fuelled by the dramatic growth and adoption of mobile platforms such as Apple iOS and Google Android in the workplace as organisations look to empower their employees and increase their business agility.
Explaining that first-generation security solutions are failing to stop the invasion of new and sophisticated threats, he offered the delegates expert advice on solving the challenge of rebuilding security into the network’s DNA.
Brian Meenagh, an associate at the Abu Dhabi office of Latham & Watkins, served up a legal perspective on the security risks that organisations need to consider when procuring cloud computing services.
The delegates also heard from Christian Hewitt, a senior technical consultant at RSA, who presented his strategy for sustaining trust in the digital world. Discussing the shift in business trends brought about by the proliferation of Web applications, new mobile devices, social media, and the cloud, he outlined the pressing need for security to adapt to the changing IT and threat landscape facing today’s ‘advanced’ enterprises.