HP Innovation Journal Issue 13: Winter 2019 | Page 39
For GDPR compliance purposes, state-of-the-art security
technology is not mandated, but firms must “take [it] into
account” (Article 32 of the GDPR) when deciding what to do.
Companies should protect their systems from cyberattacks
and, just as importantly, from insider threats from employ-
ees—both accidental and malicious. The latter accounts for
the majority of security breaches. IDC identifies the follow-
ing main security solutions in the Future WorkSpace:
•
•
•
•
•
•
Identity (including biometric authentication)
as the new enterprise security perimeter
Endpoint threat management (70% of security
breaches originate at the endpoint)
Encryption technologies
Security must be integrated in the blueprint of any digital
initiative, it must be “by design and by default” and cannot
be an afterthought. Any company ignoring these basic
principles is taking an undesirable level of risk exposure of
penalties and reputational damage.
From a management point of view, enterprise mobility
management (EMM) solutions are expanding to support
modern PC management structures, what IDC calls Unified
Endpoint Management (UEM) platforms. We believe that
nearly two-thirds of Windows 10 Devices (PCs and tablets)
are currently managed via UEM, which effectively provides
benefits to both end users and IT departments:
•
Policy enforcement and compliance solutions
on devices, apps, and content
Audit trails supporting a forensic investigation
in the event of a breach (Article 33 of GDPR)
•
End-user devices with an advanced built-in
security configuration
Employees use an average of three types of devices on
a typical working day. A unified UX experience gives
employees the same “look and feel” across devices and
seamless business process flows.
IT departments can apply a consistent enforcement and
management of worker activities and device settings on
any client form factor (phone, tablet, laptop, PC, etc.),
which is fundamental for data loss protection (DLP) and
GDPR purposes.
TOP IT DIGITAL INVESTMENTS
SECURITY
57%
(including data privacy systems)
INFRASTRUCTURE
48%
(including datacenter, strorage, and networking)
MOBILITY
38%
(including mobile apps and devices)
CLOUD
36%
(both public/private)
APPLICATIONS
34%
(including custom applications)
0%
10%
20%
30%
40%
50%
60%
Source: IDC Digital Transformation Executive Sentiment – Survey 2018, IDC, May, 2018
37