Phy-gital Roundtable: Breakfast Roundup from Germany and Netherlands

02 May '15 | Debjyoti Paul

German Shoppers: Meet Them in the Fast Lane to Phy-gital

15 January '15 | Ralf Reich

Shoppers Will Share Personal Information (But They Don’t Want to be “Friends”)

15 January '15 | Anil Venkat

Modernize or Perish: Property and Casualty Insurers and IT Solutions

14 January '15 | Manesh Rajendran

Benelux Reaches the Phy-gital Tipping Point: Omnichannel Readiness is Crucial

13 January '15 | Anil Gandharve

The New Omnichannel Dynamic: Finding Core Principles Across Industries

13 January '15 | Debjyoti Paul

Technology does not disrupt business – CIO day 2014 Roundup

02 December '14 | Anshuman Singh

Apple Pay – The Best Is Yet To Come

02 December '14 | Indy Sawhney

Digital transformation is a business transformation enabled by technology

01 December '14 | Amit Varma

3 Stages of FATCA Testing and Quality Assurance

06 October '14 | Raman Suprajarama

3 Reasons why Apple Pay could dominate the payments space

18 September '14 | Gaurav Johri

Beacon of Hope: Serving Growth and Customer Satisfaction

05 August '14 | Debjyoti Paul

The Dos and Don’ts of Emerging Technologies Like iBeacon

30 July '14 | Debjyoti Paul

What You Sold Us On – eCommerce Award Finalist Selections

17 July '14 | Anshuman Singh

3 Steps to Getting Started with Microsoft Azure Cloud Services

04 June '14 | Koushik Ramani

8 Steps to Building a Successful Self Service Portal

03 June '14 | Giridhar LV

Innovation outsourced – a myth or a mirage or a truth staring at us?

13 January '14 | Ramesh Hosahalli

What does a mobile user want?

03 January '14 | Gopikrishna Aravindan

Paradigm Shifts in Security Space

Posted on: 12 April '10

In the past few years, security technology product providers have awakened, and stopped their age-old habits of stuffing more and more features into their product set without the clarity of perception or value it would bring to the businesses they are serving. They have moved to annuity models that include signatures and preemptive patching for intrusion prevention and detection systems, virus definition updates, and product upgrades. In essence they are getting into the business of providing meaningful content, rather than rich features.

I remember a commercial that Chrysler used to air on television in the US in the late 80’s and early 90’s. Their brand ambassador and chief spokesperson was also their legendary CEO, Lee Iacocca. His tag line, with the introduction of the Jeep Grand Cherokee – perhaps the Grand Daddy of the ubiquitous Sports Utility Vehicle (SUV), and in the wake of the overwhelming Japanese automobile competition was, “Lead, follow or get out of the way!”

This phrase has a significant parallel in today’s dynamically changing world of disruptive technologies. One can either get lost in this chaotic shuffle or make one’s stand as an organization to become a pioneer, trendsetter or trailblazer, or simply adapt to the changing ecosystem. Yes, I am talking about the Security opportunities being created as we transition to a cloud-computing environment. This is a game changer, since it creates significant challenges for Security Management, Privacy, Identity and Data Governance. Moving from legacy systems to web enabled services is one thing. Moving to a cloud-based infrastructure is another ball of wax! The opportunity for both established players as well as start ups in this environment to address specific areas and create long term value is substantial.

The lines are blurring

The complexity of managing Security is being compounded significantly by both the proliferation as well as cross-pollination of Social Networking, Wireless LANs, mobile appliances, streaming video, USB sticks, micro-drives etc that span across both consumer and enterprise landscapes. Most organizations have been traditionally slow to adapt to the security challenges introduced by these rapid technology enablers, that on occasion also prove to be productivity and bandwidth dampeners, based on their use or abuse (read FaceBook, Twitter). Wireless devices submit huge challenges for network security with the introduction of even a single rogue access point anywhere on the network. You may be very savvy in establishing controls and policies when you deploy enterprise applications, but do you have the necessary security oversight when it comes to smart phones that have inundated the market place?

And what about ‘Work from Home’ and the dual role that your laptop may be playing at your workplace and at home? The probability of contamination is extremely high, even if one happens to be a conscientious employee. Remember that your organizational security posture is only as strong as your ‘weakest link’!

Most multinational companies (MNCs) are generating almost half of their revenues outside of their country headquarters. As International commerce continues to explode, enterprises are being forced to comply with International, national, industry and organizational requirements, due to the proliferation of all forms of communication – from instant messaging to video conferencing. These organizations are being subject to multiple jurisdictions and the regulations stemming out of these requirements are driving the need for increased controls, policy enforcement, information management and search capabilities, leading to very strict data retention and audit policies. The ramifications are such that an organization is beholden to exhibit all means of electronic communication upon request.

Someone once famously said, “What perimeter security? There is no perimeter anymore!” This is true now more than ever.


We are beyond the cusp of a global IT revolution wherein, organizations will have to proactively come up with multi-pronged approaches to resolve not just the current set of security challenges, but also find, recognize, and secure the future.

It is crystal clear that Security is not just an IT problem anymore – it is a business risk that results in tangible losses of revenue, reputation or worse yet, both!

I would be covering the missing piece of Governance, Risks, and Compliance in my next blog.

Do share your thoughts, suggestions, and experiences.

Mindtree Blog Archives

Mindtree blog Archives are a collection of blogs by various authors who have independently contributed as thought leaders in the past. We may or may not be in a position to get the authors to respond to your comments.

  • Nabarun Sengupta

    According to the 2009 Gartner report, financial fraud was up by 47% in 2008 from 2007, approximately 687 data breaches were reported. It was estimated these accounted to an amount over $70 million. The exponential curve continues to be a concern in this year’s Gartner report. I think, along with the IT organizations we should also join hands with the government to secure our future.
    The concern on which we should emphasize is the reaction of government over this issue. President Obama had committed to make cyber security a top priority in his administration. Just in seven months time frame it got pushed down the priority ladder.
    If the trends continue to be same, the day is not far away when cyber warfare will become a catastrophe for any government and it will be a cause of total annihilation.