Basket £ 0.00 (0 items)
You are here: HomeArticle › Smart business: flexible, mobile & secure (IBM South Bank, London)

Smart business: flexible, mobile & secure (IBM South Bank, London)

26 September 2012, Networking Seminar

This briefing explores the real challenges of enterprise mobililty and flexibility, and shares flexible workplace best practices you can leverage to gain productivity and deliver cost efficiencies.

Download the presentation slides

Consumerisation of IT – or as it's now more commonly known, BYOD – is just a case of when, not if. When employees bring their personal mobile devices to work and use them to share files or data inside and outside the office, it is difficult for IT to maintain visibility and control. According to Gartner, the consumerisation of IT will be the most significant trend affecting IT during the next ten years. So, why is this happening now?

Sponsored by:

IBM 

Consumerisation of IT is here to stay due to simple, accessible and pervasive technology. It frees people to work anytime, anywhere. By balancing these freedoms with control and an understanding of the risks, enterprises can embrace consumerisation and unlock the opportunities of a workplace without limits.

This enterprise flexibility requires a strategic approach – enabling you to understand, manage and reduce the security risks, the financial exposure and the management chaos.

This strategy needs to be supported by an infrastructure that helps you to:

  • Retain visibility and control by managing and protecting the company and bring your own liabilities.
  • Standardise access to the right data and the right applications, independent of the device.
  • Share corporate data confidently with secure access, backup and file sharing.
  • Protect data wherever it goes with contextural-awareness.

This briefing explores the real challenges of enterprise mobililty and flexibility. Over the next few years, emerging technological and social trends will continue to have far-reaching implications for the enterprise in terms of agility, mobility and security.

This seminar will share flexible workplace best practices you can leverage to gain productivity and deliver cost efficiencies including:

  • Build a workplace strategy and roadmap that drives innovation and productivity.
  • Enable secure anytime, anywhere access instead of restricting usage.
  • Improve enterprise workplace performance.
  • Implement desktop virtualisation to streamline IT management and application delivery.

Venue: IBM South Bank, London

76/78 Upper Ground, South Bank, London SE1 9PZ

Agenda

9.00 Registration – tea & coffee
9.30 Introduction
  Ian Jones, NCC
9.45 Creating the flexible enterprise – balancing risk and reward…
  Simon Gale, CTO, IBM Workplace Services

Increasingly, employees have more cutting-edge technology at home than they do at work. Where once the business led and the 'early adopters' followed, now most IT departments are desperately trying to hold back the tide and prevent the consumerisation of IT from breaching the perimeter network and mixing with the standardised, more predicable world of corporate IT. The secret is in standardising access and service…

So how do you allow staff to work in their own time, from their own devices, without compromising the business? By accepting that it’s already happened and coming up with a joint strategy developed by the IT department and the board to manage it, without suffocating it.

10.30 Securing the mobile enterprise
 

Glenn Ambler, client technical architect, IBM Security Services

Providing access to and managing data in the era of mobile computing will transform the way we protect data in the future. As servers and storage get virtualised or as resources move to the cloud and more mobile devices proliferate in businesses, you need to understand how to ensure you have all your bases covered while actually reducing the risks associated with information management and network access. Rob will address key questions such as:

  • How can your organisation demonstrate its ability to remain compliant with strict infrastructure security mandates?
  • How can you ensure you scan your entire IT infrastructure for vulnerabilities to the multiple threats that crop up daily?
  • Even for organisations that are able to collect a list of all areas that could expose their data, how can this be done in a time-efficient and cost-effective way to ensure that none of these vulnerabilities becomes a security violation?
  • From the research discussed earlier: major security concerns – key security concerns revealed by IT departments.
11.15 Break
11.30 Threat horizon 2014 – managing risks when threats collide
 

Simon Gale, CTO, IBM Workplace Services
 

An insight from recent research from one of the UK's most innovative smart enterprise solutions providers regarding the IT department's struggle to meet employee requirements to integrate personal mobile devices (phones, tablets and so on) into the enterprise.

  • The usage of mobile devices in the enterprise – where are the benefits?
  • Personal devices in the workplace – IT department major concerns with the usage of personal devices for business purposes.
  • Mobile apps in the enterprise – enterprise app usage, purpose, development and policy.
12.00 Panel discussion
 
  • What are the technology trends expected to impact organisations in the next two to five years?
  • What strategic drivers should serve as catalysts for change?
  • How can we assess and identify the security and compliance issues?
  • How has the growth in mobile and personal technology impacted the corporate security environment?
  • How has the ubiquity of smart devices changed the mobile security landscape?
  • How can organisations profit from the opportunities while managing the risks?
12.30 Lunch & networking
13.45 Close

Events Archive

 

Contact

For more information about The National Computing Centre and our services, please contact us at the details below:

Email: info@ncc.co.uk
Telephone: +44 (0)870 908 8767
Fax: +44 (0)870 134 0931

Click here for more contact information


TwitterFollow us on Twitter
Linked InJoin our LinkedIn Group
FBLike us on Facebook

 

Management Guidelines

NCC Guidelines Vol 5 No 1

more in Management Guidelines

 

Professional Development

Cloud Computing

more in Professional Development

 

Analyst Digest

September 2016 Bulletin published

more in Analyst Digest