Story image

New research prompts businesses to get ready for ‘EoT’

23 Oct 17

Blackberry recently released the revealing findings from a new global research whitepaper that surveyed IT decision makers on corporate IoT deployments.

The report was conducted by 451 Research to uncover the huge opportunities of IoT for enterprises (EoT) – but also the significant risks it poses.

“The proliferation of IoT is being led by enterprises, and they continue to require a unified endpoint management strategy that is capable of scaling to handle billions of connected devices,” says Marty Beard, chief operating officer, BlackBerry.

“We are focused on securing the EoT because for all its promise, the expanding adoption of connected things means that companies are only as secure as their most vulnerable endpoint.”

200 enterprise IT decision makers from wide range of vertical industries in the US, UK, Australia, Canada, France, Netherlands, Singapore, Norway, China and Austria were surveyed in the report.

78 of respondents indicated interest in a solution that allows them to manage all their endpoints in one place.

While this clearly shows imminent transformation, 63 percent noted that security is the top concern regarding digital technologies and processes. Despite this, only 37 percent actually have a formal digital transformation strategy in place.

The report found organisations are least prepared against external threats, with 61 percent citing hackers and cyberwarfare as their top concerns.

39 percent of respondents from very large organisations (more than 10,000 employees) revealed that a lack of collaboration among internal departments is a potential barrier to unified endpoint management, while 51 percent of mid-sized organisations felt the same way.

BlackBerry’s vice president of APAC, Paul Crighton says the EoT is a very exciting space.

“While smartphones, tablets and other mobile devices are considered as ‘business as usual’, we see a lot of new types of devices being considered in the workplace such as wearables and head-worn glasses,” says Crighton.

“This is the new normal, and we believe businesses are in a strong position to take advantage of the wide range of possibilities these will offer.”

Crighton says with this influx of connected devices, security will become even more business-critical.

“As the 451 Research report shows, EoT security is already fuelling conversations among the IT C-suite, but along with these new opportunities, EoT will represent a growing challenge for all organisations,” Crighton says.

“To succeed in a climate of constantly growing and evolving cyber threats, the EoT needs a layered security approach.”

Crighton says businesses need to take proactive steps towards building comprehensive and secure mobility strategies to move away from traditional MDM and EMM approaches and towards Unified Endpoint Enterprise Management (UEM) frameworks.

“CIOs, CSOs and heads of IT departments need to address these security challenges and collaborate with key business stakeholders to build holistic strategies that can protect the devices (the endpoint), but also and most importantly the data within, both inside and outside of the organisations’ walls,” Crighton says.

“The challenge lies in promoting collaboration and sharing of information without hindering information confidentiality and data security.”

McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
Forcepoint and Chillisoft - “a powerful combination”
Following Chillisoft’s portfolio expansion by signing on Forcepoint, the companies’ execs explain how this is a match made in cybersecurity heaven.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.
Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.