Top 5 Mistakes That Make IT Executives Irrelevant

Post on 17-Jan-2017

330 views 1 download

Transcript of Top 5 Mistakes That Make IT Executives Irrelevant

AVOIDING IT EXECUTIVE IRRELEVANCE

HOW CIOS, CTOS AND CISOS CAN STOP MAKING MISTAKES

AND START ADDING VALUE

Who We Are

Ericka Chickowski Shaun Donaldson• Experienced business and

technology journalist• Covers IT security, tech

innovation, how tech trends affect real people

• Publications include Dark Reading, DevOps.com, Entrepreneur and InformationWeek

• Chief Content Strategist at Bitdefender Enterprise.

• Responsible for supporting relationships with strategic alliance partners, enterprise customers and analysts

• 10+ years in tech world

CIO

CTO CSO

Where is IT Executive Leadership Headed?

CIO

CTO CSO

Where is IT Executive Leadership Headed?

CIO

CTO CSO

Where is IT Executive Leadership Headed?

CIO

CTO CSO

Where is IT Executive Leadership Headed?

"Feathered Tyrannosaurus model" by Marcin Polak from Warszawa / Warsaw, Polska / Poland - Tyranozaur RexUploaded by FunkMonk. Licensed under CC BY 2.0 via Commons

"VHS-cassette" by Groink - Own work. Licensed under CC BY-SA 3.0 via Commons

What’s Your Number One Directive?

What’s Your Number One Directive?

Keeping Data Center Lights On?

"CERN Server 03" por Florian Hirzinger - www.fh-ap.com - Own work (Florian Hirzinger). Licenciado sob CC BY-SA 3.0, via Wikimedia Commons

What’s Your Number One Directive?

Making Sure Endpoints Run

Smoothly?

What’s Your Number One Directive?

Building and Maintaining

Applications?

What’s Your Number One Directive?

Keeping Data Safe?

What’s Your Number One Directive?

Keeping Data Center Lights On?

Building and Maintaining

Applications?

Making Sure Endpoints Run

Smoothly?

Keeping Data Safe?

What’s Your Number One Directive?

Keeping Data Center Lights On?

Building and Maintaining

Applications?

Making Sure Endpoints Run

Smoothly?

Keeping Data Safe?

Yes?

How The CEO Sees You

YOU HAD ONE JOB

The Real IT Directive

The Real IT Directive

The Real IT Directive

The Real IT Directive

The Real IT Directive

The Real IT Directive

How The LOB Sees You

YOU HAD ONE JOB

Symptoms of IT Executive Irrelevance

Shadow IT

Symptoms of IT Executive Irrelevance

Hiring of CDOsShadow IT

You’re Doing It Wrong: Mistake #1

Ignoring DevOps and Continuous

Delivery

You’re Doing It Wrong: Mistake #2

Underestimating the Value of Automation

You’re Doing It Wrong: Mistake #3

Leaving Data on the Table

You’re Doing It Wrong: Mistake #4

Failing to Experiment

You’re Doing It Wrong: Mistake #5

Viewing Cloud as a Cost Reduction

Tool

Next Steps

CLOUDBIG DATA

MOBILITYSECURITYSOCIAL

FORCES OF CHANGETHE GREATEST

Mode One

Mode Two

Bimodal IT is Tipping the Scales

Address endpoints in isolation:ServersDesktopsLaptops, mobileBYODVirtualizedCloud

= Pain x (Linux, Mac, Windows, iOS, Android)

IT-Secured Services – Easy?

• Built for traditional, static datacenters• Deep functionality, so long as it’s

Windows• Patchwork of agents, add-ons, and

consoles• Result of “feature arms race”• Struggle to retool for virtualisation• Cloud undready

Vertical Endpoint SecurityEndpoints

• Windows laptops, desktops, servers• Linux servers

Feature Pack 1

• Anti-virus, spyware, malware, heuristics, cloud intelligence

• Basic firewall (Windows only)

Feature pack 2

• File/folder/drive encryption• Data loss prevention

Endpoints

• Advanced management (redundancy, scaling)• Central log roll-up

Traditional

• Servers• Desktops• Laptops

Mobile

• BYOD• Mobile devices

Virtualised

• Servers• VDI• Private cloud

Cloud

• Servers• PaaS, SaaS,

DaaS

• With each, the goal is protect the data• Difficult to get insight and control across the

estate

Horizontal Endpoint Security

P2V

Datacentre Virtualisation Example

Designed for traditional hardware islands

Duplicated footprint impacts performance

Unsynchronized management

Creates Usability Headaches

Element VMware vShield Integration Bitdefender SVE

Centralize, deduplicate Inspection through VMware API’s Inspection using security vendor technology

Hypervisor requirements

ESXi (vSphere) environment with vShield Endpoint license, vShield Manager

installed

ESXi, Xen, Hyper-V, KVM, etc., and any mix thereof

Endpoint footprintvShield Endpoint driver embedded in

VMware Tools. Optional BD Tools (GUI, memory & process scanning)

BD Tools (GUI, memory & process scanning)

Virtual Appliance Tied to ESXi hypervisor; one per host, no host migration

Independent of hypervisor; fail-over between hosts, migration a non-issue

Operating Systems Windows Windows, Linux

Public cloud Not technically practical/possible Yes (AWS as a Module)

A Problem that can be Solved, Carefully

Horizontal, Scalable Management - GravityZone

Management as a Cloud, in the Cloud, from the Cloud…

Questions

Ericka Chickowski Shaun Donaldson• ericka@chickowski.com• Twitter: @ErickaChick

• sdonaldson@bitdefender.com• @ShaunLDonaldson

Check Out The Ebook!

More About Bitdefender

http://businessresources.bitdefender.com/top_5_ways_it_executive_risk_irrelevance

http://www.bitdefender.com/business/