siliconindia logo
CIO City >>  Expert  >>  

Divin Proothi

"With the increase in the number of connected devices on the planet, large scale enterprises are able to take an advantage of IT services being ‘available anywhere and anytime’ for the business"

 

Use and Implementation of Cloud in business
Cloud serves as an ubiquitous source of information for any business. With the increase in the number of connected devices on the planet, large scale enterprises are able to take an advantage of IT services being “available anywhere and anytime” for the business besides the apparent financial benefits that the technology is associated with. However, as a company Cloud path are treated with extreme care owing to the sensitivity of the IP and the extremely regulated nature of the pharmaceutical industry. A risk-based approach is taken when evaluating cloud solutions – understanding the information context, analyze security considerations and embed them into the operating model for any IT service being delivered over cloud.

Building an effective DLP programme
There’s a huge misconception around DLP - that implementing such a solution can make enterprise information ‘leakageproof’. No DLP solution in the world can offer that. It is not sufficient for the IT function just to implement DLP technology. It is extremely important to clearly communicate the ownership of the information to individual business functions and define structured processes for prevention of information leakage in order to make full use of the DLP technology. It is only then that an enterprise can move towards having a reasonable amount of assurance on the matter.

Ensuring Social Media as an asset for business
Social media has changed the way human beings interact in their day-to-day lives. A major reason for its dominance and outreach is how well social media websites are able to engage their users. Even if organizations don’t directly benefit from the use of social media websites for purposes such as marketing and advertising, they have a lot to learn from social media especially in the area of enterprise collaboration. Increased  user engagement would in turn imply more knowledge sharing that would benefit the organization’s collaboration priorities. Knowledge is the real asset for every organization regardless of the industry they operate in and the exchange of knowledge is of paramount importance.

Mobile devices to minimize threat, loss and risk
With the onset of BYOD practices, it is important for organizations to develop a standard specifying the minimum security requirements for a personal device being used for business purposes. Traditional IT asset management practices do not apply in such a scenario and hence it is even more important to have an oversight on the information accessed by or stored on mobile devices (company-owned/ personal). Selective wipe features on most commercially available Mobile Device Management (MDM) solutions helps you achieve that.