SlideShare une entreprise Scribd logo
1  sur  15
Security Implications
Each year, our Technology Vision pinpoints the emerging technology trends that will impact large
enterprises in the next 3-5 years based on our insights and research.
Security is a pervasive issue for organizations in the We Economy. To help executives understand and
plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of
this year’s Technology Vision.
Accenture Technology Vision 2015
Digital Business Era: Stretch Your Boundaries
Copyright © 2015 Accenture All rights reserved.
Digital Business Era: Stretch Your Boundaries
Succeeding in the We Economy
3
Edge
Autonomy
Data
Integrity
Big Data
Security
Security
Platforms
Customer
Trust
1 2 3 4 5
5 Security Implications
Copyright © 2015 Accenture All rights reserved.
1
Edge Autonomy:
Enabling autonomous devices
at the edge
Copyright © 2015 Accenture All rights reserved.
The Accenture Technology Vision 2015 highlights how the rapidly growing
Internet of Things (IoT) is introducing billions of embedded sensors, smart
machines, wearable devices and connected industrial equipment. Businesses
are beginning to interconnect these “things” to enable the delivery of intelligent
products and services through the digital ecosystem. In time, this connected
intelligence will be used to deliver what customers really want: results, or what
Accenture calls the Outcome Economy.
There are 4 key actions to take to enable edge autonomy:
1.Prioritize protecting edge devices
2.Boost security for edge device infrastructure
3.Include system context in security planning
4.Manage edge intelligence with new governance model
Edge Autonomy:
Enabling autonomous devices at the edge.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
2
Data Integrity:
Making data-driven decisions at Internet
of Things scale.
6Copyright © 2015 Accenture All rights reserved.
As the IoT proliferates, businesses will use data passed between interconnected
devices, applications and processes to determine customer context, and then
collaborate through platforms to provide the intelligent products and services that
customers desire in the Outcome Economy. A connected digital ecosystem,
combined with edge computing and smart M2M communications, will expand the
ability to use data collected from IoT devices to drive significantly faster decisions.
To optimize decisions, businesses will require edge data that is accurate,
authentic and complete. Accenture proposes three key strategies:
1.Protect data on edge devices
2.Implement assurance that scales
3.Tie IoT protocols to business models
Data Integrity:
Making data-driven decisions at Internet of Things scale.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
3
Securing the three Vs.
8
Big Data Security:
Copyright © 2015 Accenture All rights reserved.
Businesses are experiencing exponential growth in data as more devices get
deployed at the edge and business processes become increasingly digital—
causing their data repositories to reach capacity. For Intelligent Enterprises to
fully reap the benefits of software intelligence and embrace a collaborative
workforce model of humans and machines (or what Accenture deems Workforce
Reimagined), it will be critical to securely process and protect big data.
Traditional database management systems cannot scale enough to handle the
data volume, acquisition velocity or data variety–what is often referred to as the
three Vs. Enterprises should focus on two key areas:
1.Secure big data processing platforms
2.Embed security into data
Big Data Security:
Securing the three Vs.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
4
Security Platforms:
Maximizing protection across digital
ecosystem platforms.
10Copyright © 2015 Accenture All rights reserved.
With the evolution of the IoT and digital industry ecosystems, platform-based
businesses will offer new opportunities for growth and profitability.
Platform security is a vital capability to operating in the digital ecosystem.
Businesses must understand the potential cyber-physical risks of delivering
platform-based services and augment existing security efforts with digital platform
intelligence. Accenture outlines 5 approaches to maximize security platforms:
1.Understand physical security risks
2.Evolve data security intelligently
3.Plan security into the platform
4.Utilize existing platforms to augment security intelligence
5.Shift to security DevOps
Security Platforms:
Maximizing protection across digital ecosystem platforms.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
5
Customer Trust:
Building customer trust in a digital
economy
Copyright © 2015 Accenture All rights reserved.
One of the key determinants of success for digital businesses will be the ability to
deliver products and services that are highly personalized based on individual their
specific habits and preferences. Accenture calls this trend the Internet of Me.
To maximize customer data and deliver personalization, businesses must apply
more stringent security measures to protect privacy—and ultimately build and
maintain trust with customers. We share 5 strategies to build customer trust:
1.Build trust by taking transparency seriously
2.Follow basic data protection guidelines
3.Take advantage of privacy-preserving analytics
4.Innovate to appeal to privacy-wary customers
5.Empower customers with tools
Customer Trust:
Building customer trust in a digital economy.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
Digital Business Era: Stretch Your Boundaries
14
Edge
Autonomy
Data
Integrity
Big Data
Security
Security
Platforms
Customer
Trust
1 2 3 4 5
5 Security Implications
Copyright © 2015 Accenture All rights reserved.
15
Accenture Technology Vision 2015
Digital Business Era: Stretch Your Boundaries
Security Implications
www.accenture.com/securityvision
www.accenture.com/technologyvision
#techvision2015 #cybersecurity
@accenturelabs
Copyright © 2015 Accenture All rights reserved.

Contenu connexe

En vedette

En vedette (15)

AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
 
AI is the New UI - Tech Vision 2017 Trend 1
AI is the New UI - Tech Vision 2017 Trend 1AI is the New UI - Tech Vision 2017 Trend 1
AI is the New UI - Tech Vision 2017 Trend 1
 
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture LabsGender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
 
Accenture at Oracle OpenWorld 2015
Accenture at Oracle OpenWorld 2015Accenture at Oracle OpenWorld 2015
Accenture at Oracle OpenWorld 2015
 
Change Management
Change ManagementChange Management
Change Management
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Growth Game Changer
Growth Game ChangerGrowth Game Changer
Growth Game Changer
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.
 
Being digital: Embracing the future of work
Being digital: Embracing the future of workBeing digital: Embracing the future of work
Being digital: Embracing the future of work
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
 
Five Steps to Digital Success in the Insurance Sector
Five Steps to Digital Success in the Insurance SectorFive Steps to Digital Success in the Insurance Sector
Five Steps to Digital Success in the Insurance Sector
 

Plus de Accenture Technology

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

IT Security: Implications for the Technology Vision 2015

  • 2. Each year, our Technology Vision pinpoints the emerging technology trends that will impact large enterprises in the next 3-5 years based on our insights and research. Security is a pervasive issue for organizations in the We Economy. To help executives understand and plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of this year’s Technology Vision. Accenture Technology Vision 2015 Digital Business Era: Stretch Your Boundaries Copyright © 2015 Accenture All rights reserved.
  • 3. Digital Business Era: Stretch Your Boundaries Succeeding in the We Economy 3 Edge Autonomy Data Integrity Big Data Security Security Platforms Customer Trust 1 2 3 4 5 5 Security Implications Copyright © 2015 Accenture All rights reserved.
  • 4. 1 Edge Autonomy: Enabling autonomous devices at the edge Copyright © 2015 Accenture All rights reserved.
  • 5. The Accenture Technology Vision 2015 highlights how the rapidly growing Internet of Things (IoT) is introducing billions of embedded sensors, smart machines, wearable devices and connected industrial equipment. Businesses are beginning to interconnect these “things” to enable the delivery of intelligent products and services through the digital ecosystem. In time, this connected intelligence will be used to deliver what customers really want: results, or what Accenture calls the Outcome Economy. There are 4 key actions to take to enable edge autonomy: 1.Prioritize protecting edge devices 2.Boost security for edge device infrastructure 3.Include system context in security planning 4.Manage edge intelligence with new governance model Edge Autonomy: Enabling autonomous devices at the edge. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 6. 2 Data Integrity: Making data-driven decisions at Internet of Things scale. 6Copyright © 2015 Accenture All rights reserved.
  • 7. As the IoT proliferates, businesses will use data passed between interconnected devices, applications and processes to determine customer context, and then collaborate through platforms to provide the intelligent products and services that customers desire in the Outcome Economy. A connected digital ecosystem, combined with edge computing and smart M2M communications, will expand the ability to use data collected from IoT devices to drive significantly faster decisions. To optimize decisions, businesses will require edge data that is accurate, authentic and complete. Accenture proposes three key strategies: 1.Protect data on edge devices 2.Implement assurance that scales 3.Tie IoT protocols to business models Data Integrity: Making data-driven decisions at Internet of Things scale. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 8. 3 Securing the three Vs. 8 Big Data Security: Copyright © 2015 Accenture All rights reserved.
  • 9. Businesses are experiencing exponential growth in data as more devices get deployed at the edge and business processes become increasingly digital— causing their data repositories to reach capacity. For Intelligent Enterprises to fully reap the benefits of software intelligence and embrace a collaborative workforce model of humans and machines (or what Accenture deems Workforce Reimagined), it will be critical to securely process and protect big data. Traditional database management systems cannot scale enough to handle the data volume, acquisition velocity or data variety–what is often referred to as the three Vs. Enterprises should focus on two key areas: 1.Secure big data processing platforms 2.Embed security into data Big Data Security: Securing the three Vs. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 10. 4 Security Platforms: Maximizing protection across digital ecosystem platforms. 10Copyright © 2015 Accenture All rights reserved.
  • 11. With the evolution of the IoT and digital industry ecosystems, platform-based businesses will offer new opportunities for growth and profitability. Platform security is a vital capability to operating in the digital ecosystem. Businesses must understand the potential cyber-physical risks of delivering platform-based services and augment existing security efforts with digital platform intelligence. Accenture outlines 5 approaches to maximize security platforms: 1.Understand physical security risks 2.Evolve data security intelligently 3.Plan security into the platform 4.Utilize existing platforms to augment security intelligence 5.Shift to security DevOps Security Platforms: Maximizing protection across digital ecosystem platforms. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 12. 5 Customer Trust: Building customer trust in a digital economy Copyright © 2015 Accenture All rights reserved.
  • 13. One of the key determinants of success for digital businesses will be the ability to deliver products and services that are highly personalized based on individual their specific habits and preferences. Accenture calls this trend the Internet of Me. To maximize customer data and deliver personalization, businesses must apply more stringent security measures to protect privacy—and ultimately build and maintain trust with customers. We share 5 strategies to build customer trust: 1.Build trust by taking transparency seriously 2.Follow basic data protection guidelines 3.Take advantage of privacy-preserving analytics 4.Innovate to appeal to privacy-wary customers 5.Empower customers with tools Customer Trust: Building customer trust in a digital economy. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 14. Digital Business Era: Stretch Your Boundaries 14 Edge Autonomy Data Integrity Big Data Security Security Platforms Customer Trust 1 2 3 4 5 5 Security Implications Copyright © 2015 Accenture All rights reserved.
  • 15. 15 Accenture Technology Vision 2015 Digital Business Era: Stretch Your Boundaries Security Implications www.accenture.com/securityvision www.accenture.com/technologyvision #techvision2015 #cybersecurity @accenturelabs Copyright © 2015 Accenture All rights reserved.