Contenu connexe
Plus de Accenture Technology (20)
IT Security: Implications for the Technology Vision 2015
- 2. Each year, our Technology Vision pinpoints the emerging technology trends that will impact large
enterprises in the next 3-5 years based on our insights and research.
Security is a pervasive issue for organizations in the We Economy. To help executives understand and
plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of
this year’s Technology Vision.
Accenture Technology Vision 2015
Digital Business Era: Stretch Your Boundaries
Copyright © 2015 Accenture All rights reserved.
- 3. Digital Business Era: Stretch Your Boundaries
Succeeding in the We Economy
3
Edge
Autonomy
Data
Integrity
Big Data
Security
Security
Platforms
Customer
Trust
1 2 3 4 5
5 Security Implications
Copyright © 2015 Accenture All rights reserved.
- 5. The Accenture Technology Vision 2015 highlights how the rapidly growing
Internet of Things (IoT) is introducing billions of embedded sensors, smart
machines, wearable devices and connected industrial equipment. Businesses
are beginning to interconnect these “things” to enable the delivery of intelligent
products and services through the digital ecosystem. In time, this connected
intelligence will be used to deliver what customers really want: results, or what
Accenture calls the Outcome Economy.
There are 4 key actions to take to enable edge autonomy:
1.Prioritize protecting edge devices
2.Boost security for edge device infrastructure
3.Include system context in security planning
4.Manage edge intelligence with new governance model
Edge Autonomy:
Enabling autonomous devices at the edge.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
- 7. As the IoT proliferates, businesses will use data passed between interconnected
devices, applications and processes to determine customer context, and then
collaborate through platforms to provide the intelligent products and services that
customers desire in the Outcome Economy. A connected digital ecosystem,
combined with edge computing and smart M2M communications, will expand the
ability to use data collected from IoT devices to drive significantly faster decisions.
To optimize decisions, businesses will require edge data that is accurate,
authentic and complete. Accenture proposes three key strategies:
1.Protect data on edge devices
2.Implement assurance that scales
3.Tie IoT protocols to business models
Data Integrity:
Making data-driven decisions at Internet of Things scale.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
- 9. Businesses are experiencing exponential growth in data as more devices get
deployed at the edge and business processes become increasingly digital—
causing their data repositories to reach capacity. For Intelligent Enterprises to
fully reap the benefits of software intelligence and embrace a collaborative
workforce model of humans and machines (or what Accenture deems Workforce
Reimagined), it will be critical to securely process and protect big data.
Traditional database management systems cannot scale enough to handle the
data volume, acquisition velocity or data variety–what is often referred to as the
three Vs. Enterprises should focus on two key areas:
1.Secure big data processing platforms
2.Embed security into data
Big Data Security:
Securing the three Vs.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
- 11. With the evolution of the IoT and digital industry ecosystems, platform-based
businesses will offer new opportunities for growth and profitability.
Platform security is a vital capability to operating in the digital ecosystem.
Businesses must understand the potential cyber-physical risks of delivering
platform-based services and augment existing security efforts with digital platform
intelligence. Accenture outlines 5 approaches to maximize security platforms:
1.Understand physical security risks
2.Evolve data security intelligently
3.Plan security into the platform
4.Utilize existing platforms to augment security intelligence
5.Shift to security DevOps
Security Platforms:
Maximizing protection across digital ecosystem platforms.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
- 13. One of the key determinants of success for digital businesses will be the ability to
deliver products and services that are highly personalized based on individual their
specific habits and preferences. Accenture calls this trend the Internet of Me.
To maximize customer data and deliver personalization, businesses must apply
more stringent security measures to protect privacy—and ultimately build and
maintain trust with customers. We share 5 strategies to build customer trust:
1.Build trust by taking transparency seriously
2.Follow basic data protection guidelines
3.Take advantage of privacy-preserving analytics
4.Innovate to appeal to privacy-wary customers
5.Empower customers with tools
Customer Trust:
Building customer trust in a digital economy.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
- 14. Digital Business Era: Stretch Your Boundaries
14
Edge
Autonomy
Data
Integrity
Big Data
Security
Security
Platforms
Customer
Trust
1 2 3 4 5
5 Security Implications
Copyright © 2015 Accenture All rights reserved.
- 15. 15
Accenture Technology Vision 2015
Digital Business Era: Stretch Your Boundaries
Security Implications
www.accenture.com/securityvision
www.accenture.com/technologyvision
#techvision2015 #cybersecurity
@accenturelabs
Copyright © 2015 Accenture All rights reserved.