HP Innovation Journal Issue 13: Winter 2019 | Page 39

For GDPR compliance purposes, state-of-the-art security technology is not mandated, but firms must “take [it] into account” (Article 32 of the GDPR) when deciding what to do. Companies should protect their systems from cyberattacks and, just as importantly, from insider threats from employ- ees—both accidental and malicious. The latter accounts for the majority of security breaches. IDC identifies the follow- ing main security solutions in the Future WorkSpace: • • • • • • Identity (including biometric authentication) as the new enterprise security perimeter Endpoint threat management (70% of security breaches originate at the endpoint) Encryption technologies Security must be integrated in the blueprint of any digital initiative, it must be “by design and by default” and cannot be an afterthought. Any company ignoring these basic principles is taking an undesirable level of risk exposure of penalties and reputational damage. From a management point of view, enterprise mobility management (EMM) solutions are expanding to support modern PC management structures, what IDC calls Unified Endpoint Management (UEM) platforms. We believe that nearly two-thirds of Windows 10 Devices (PCs and tablets) are currently managed via UEM, which effectively provides benefits to both end users and IT departments: • Policy enforcement and compliance solutions on devices, apps, and content Audit trails supporting a forensic investigation in the event of a breach (Article 33 of GDPR) • End-user devices with an advanced built-in security configuration Employees use an average of three types of devices on a typical working day. A unified UX experience gives employees the same “look and feel” across devices and seamless business process flows. IT departments can apply a consistent enforcement and management of worker activities and device settings on any client form factor (phone, tablet, laptop, PC, etc.), which is fundamental for data loss protection (DLP) and GDPR purposes. TOP IT DIGITAL INVESTMENTS SECURITY 57% (including data privacy systems) INFRASTRUCTURE 48% (including datacenter, strorage, and networking) MOBILITY 38% (including mobile apps and devices) CLOUD 36% (both public/private) APPLICATIONS 34% (including custom applications) 0% 10% 20% 30% 40% 50% 60% Source: IDC Digital Transformation Executive Sentiment – Survey 2018, IDC, May, 2018 37