Guest Blog Post by Stephen Nola, Group Executive, IT-as-a-Service, Dimension Data
At Dimension Data we are all about accelerating ambition and this includes enabling Cisco’s ambition to build the world’s largest global Intercloud, a network of clouds to address customer requirements for a globally distributed, highly secure cloud platform. Dimension Data is partnering with Cisco to provide our cloud technology in Cisco-branded managed service offerings and the public cloud – a core component of the enterprise hybrid IT solution.
As cloud adoption is maturing, companies are taking a more holistic approach to incorporating cloud into the modern IT landscape. This transformation is increasingly application centric which means that organisations will be sourcing multiple delivery models that are best aligned to applications that are fit for cloud, born for the cloud, and not for the cloud, ever.
The formula for hybrid IT will include public and private cloud, managed hosting and managed services on and off premises. Cisco realizes that Dimension Data’s highly connected and integrated solutions leverage new and flexible consumption models for enterprises all over the world. In fact, Dimension Data offers our Managed Cloud Platform on five continents with datacenters strategically located to address regulatory compliance and data sovereignty for multi-national companies.
Dimension Data has been accelerating adoption of Cisco technology for over 23 years. Inclusion in the Intercloud ecosystem is good for our clients and will enable greater reach for Dimension Data’s Cloud. As Cisco Intercloud subscribers, enterprises around the world will leverage Dimension Data’s global network of inter-connected cloud datacenters as a core component of their hybrid cloud strategy. Dimension Data is proud of our Cisco heritage and our strategic partnership that will take our companies and our clients into the future.
Stephen Nola, Group Executive – ITaaS Steve was appointed Group Executive – ItaaS in 2013. Since he joined Dimension Data in 1989, Steve has held a number of key roles in the Group. In 2011, he was appointed Chief Executive Officer, Cloud Business Unit. Prior to this, Steve was Chief Executive Officer of Dimension Data Australia from 2001. Before being appointed Chief Executive Officer for the Australia region, Steve was Chief Executive Officer for Dimension Data Integration, and Joint Managing Director of Dimension Data Australia. Before joining Dimension Data Australia (formerly known as Com Tech Communications) Steve worked for Telstra from 1987 to 1989. Steve is a member of the advisory board at RMIT for the Bachelor of Information Technology course and a member of the Starlight Foundation Victoria Board. He holds a Bachelor of Electrical Engineering (Honours) from the Royal Melbourne Institute of Technology (RMIT), majoring in robotics.
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address the opportunities and risk of secure mobility from the top down.The first blog in this series discussing how concerns outweigh actions when it comes to mobility security can be found here. The second blog in this series highlighting how IT and business leaders can work together to develop secure mobility policies can be found here. The third blog in this series discussing how to close the gap between vision and real-world implementation can be found here.
Throughout this blog series, we’ve discussed several key aspects of implementing secure mobility policies and programs to ensure organizations can reap the benefits of mobility now and in the future. It’s clear that mobility is a top priority for IT and business leaders and most have a clear vision of the role mobility can and will play in their organization. Overall, they see both the risks and the rewards.
That said, responses gathered in the recent Dimension Data Secure Mobility Global Survey point to a gap between that overall vision and the likely real-world outcomes organizations will face – given that a number of crucial initial steps can ultimately save time, reduce costs, and, most importantly, ensure appropriate security controls are in place.
In this post, I’ll highlight the real opportunities and risk regarding mobility and security – and how business leaders can address the disparity between vision and actual deployment now and for years to come.
Understanding the Opportunity and the Real Risk
The threat to an organization’s proprietary information is certainly foremost in the minds of IT and security leaders. Interestingly, 71% of respondents of the recent Dimension Data survey indicated that their business leaders view employee utilization of personal mobile devices as potentially dangerous, costly and not business critical.
IT concerns about secure enterprise mobility risk are many. These include the introduction of malware into the environment from largely unmanaged devices or devices that organizations have little to no control over and the data leakage challenges by allowing users to have various parts of data outside of the network. In addition, many IT leaders ask:
“How are we actually going to deploy mobility security?”
“How are we going to support the users?”
“Will our IT help desk be able to meet the around-the-clock requests that today’s users demand?”
This week we are celebrating with more than 25,000 attendees at the Moscone Center in San Francisco, and many more viewers on line the 25th anniversary of Cisco Live and it’s an exciting time for Cisco and our partners! As John Chambers described it so eloquently in his Monday keynotes, customers are embracing the opportunities around the Internet of Everything and are looking for us to help them realize the benefits and manage the transition. And cloud deployment is certainly a critical component of this new IT world.
Cisco is Moving Fast with ourPartners to deliver on the Promise of an Intercloud
Read Robert Lloyd bio.
Rob Lloyd President, Development and Salesintends to demonstrate in his keynotes how fast Cisco has been able to move by driving a partner-centric Cloud strategy.
You can watch on line Rob’s keynote for a deeper dive into what is happening both at Cisco and with our customers as the Internet of Everything becomes a reality. Find out what Cisco is doing today, what we’re planning in the future, and what others are doing to tap into the power of the Internet of Everything.
Edison Peres, Senior Vice President, Worldwide Channels at Cisco.
A partner-centric approach differentiates Cisco and our partners
Innovation is required to meet the rapidly changing business requirements for cloud, mobile and the Internet of Everything. With that, new Intercloud reference architectures are being added to the Cloud and Managed Service Program for partners who deliver Cisco Powered services.
Aligning Your Strategy and Business for Cloud Success
Dr. Gee Rittenhouse and Faiyaz Shahpurwala
This afternoon , Cisco executives Dr. Gee Rittenhouse –CDO and Faiyaz Shahpurwala -- Senior Vice President, Cloud Infrastructure and Managed Services share our hybrid cloud strategy with you, including solutions such as Cisco InterCloud and Intelligent Automation for Cloud. They also discuss in their keynotes the role of applications and our partner ecosystem.
Our customers have been asking Cisco to expand beyond our hosted collaboration and SaaS offerings (such as WebEx, Meraki and Cisco Cloud Web Security) with a richer set of cloud services. Today, in San Francisco, we are announcing a substantial expansion of those services with new infrastructure-as-a-service offerings and cloud disaster recovery applications that leverage the cloud platforms of new Intercloud partners Dimension Data and Sungard Availability Services. They join Telstra as our first Intercloud partners.
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility vision and real-world implementation. The first blog in this series discussing how concerns outweigh actions when it comes to mobility security is here. The second blog in this series highlighting how IT and business leaders can work together to develop secure mobility policies is here.
There is a gap between the vision for secure mobility and the real-world implementation.
How do we know a gap exists? A recent Dimension Data Secure Mobility Survey report indicates 79% of IT leaders believe mobility is a top priority and 69% of those surveyed already have a mobility roadmap in place. The vision looks good, right? However, only 29% of those implementing their roadmap have tested their core applications, and only 32% have conducted a security audit of the applications.
Today, IT is faced with the challenge of providing any user from any location on any device access to any of the corporate applications, all while keeping assets and users secure. These perimeters add up to a complex equation and it’s contributing to this gap in IT leaders’ approach to vision and action for mobility deployments. How can IT and business leaders work to address this disparity?
Listed below are a few steps that should be considered to help turn the secure mobility vision into a reality. Taking a careful assessment of what mobility can offer and applying these steps can make the difference between a successful implementation and being derailed by unforeseen problems.