Tuesday,26 November, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

The ‘New IP’ is the Key to Reducing the Risk of Restrictive and Shadow IT in Enterprises in UAE, says Expert from Brocade

Published Jul 13, 2015

However organization’s goals are measured — by market share, cost savings, shareholder returns, or customer satisfaction - they all have one thing in common: Restrictive IT. Organizations in UAE cannot take the risk of not addressing restrictive technology, absorbing the growing cost, and mitigating the impact of a failing network.

Yarob Sakhnini, regional director, MEMA at Brocade says that the Chief Information Officer (CIO) is the broker between the needs of the business, the demands of the business units, the reality of the technology in place, and the budget required to get where the business wants to be.

Restrictive IT makes this a difficult balancing act. You can see how it prevents business goals from being achieved and inhibits business units’ ability to respond to opportunities and risks, but it is often just too complex and costly to replace.

Information, data, and the applications that employees and customers use today aren’t just business tools, they are business. Organizations have become less reliant on the physical - office spaces, retail outlets, product samples; and more reliant on the virtual – remote working, web sites and online shopping. However, when it comes to the network infrastructure, enterprises still rely on decades old physical infrastructures that are slow, costly, rigid, and unwieldy.

Sakhnini says that organizations need to be fast and agile to act on opportunities or to counter all risks. The physical infrastructures they have in place can’t support this. The virtualization of technology in response to the virtualization of the business has only highlighted and increased the pressure on the infrastructure.

The Impact on CIOs and their Organizations

According to a recent CIO survey commissioned by Brocade, 98 percent of CIOs admit they are worried about how they can enable their organization to remain or become more competitive. Two thirds are concerned about supporting organizational growth geographically or in employee numbers.

These issues often stem from problems such as patchy security updates, an inability to deploy new applications at the speed required, and challenges in enabling access to services, applications and systems via multiple devices. All of it is caused by the limiting effect of restrictive IT.

Old, inflexible infrastructures and lengthy time to deploy have left many business units within enterprises feeling there’s no choice but to step outside or around the IT department to meet their goals. The result is Shadow IT. It includes any deployment or use of technology devices, solutions or services not sanctioned by IT and any they may be completely ignorant of. Over 80 percent of CIOs believe business units will adopt Cloud services without IT’s involvement in the future.

Security breaches and failure to comply with data protection and management regulation are two of the most common results of Shadow IT. Over 71 percent of CIOs report “security issues” as a major factor in time spent reacting to problems instead of creating solutions.

Balancing Risk: Time to Talk About the Network

It’s likely that CIOs already know what is the most restrictive IT asset in your organization. In spite of significant advances in networking technology, in most organizations the legacy systems they have in place cannot support the business needs of today, let alone tomorrow. Costly, complex, but vital, old style network architectures have resisted attempts to improve their performance through the application of virtualization or the deployment of more network devices.

While business units in many organizations race to embrace the cloud as a seemingly viable work around, a complete transfer of the organizations data, services, communications and applications is unlikely to be feasible. The only way forward is to address the network issue. Only by building a solution that provides the agility, security and access to the organization’s needs, can goals be met while reducing exposure to risk.

Sakhnini concludes by saying that simply adding new solutions to an overburdened, under-utilized, and fundamentally flawed system won’t provide the organization with what it needs. A new approach to the old network is needed. One that encompasses financing and transitional technology, while reducing complexity and cost. Organizations today have an ‘old IP’ infrastructure – systems, methodology, and a design that is no longer effective. What is needed is a “New IP” - transitional solutions that when brought together provide an infrastructure that is agile, affordable, and automated.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks