Protection is still the main driver for security, but a new CA Technologies study released today reveals that Asia Pacific & Japan (APJ) organizations are approaching security from new perspectives, recognizing its potential to deliver frictionless and positive customer experience and contribute to business growth in the increasingly competitive application economy.
The study titled “8 Steps to Modernize Security for the Application Economy,” sponsored by CA Technologies (NASDAQ: CA) shows how mobility, APIs and business growth have brought a balanced view of control and enablement to security, leading to an increase in investment by APJ organizations.
“As more organizations understand the impact of the application economy in the increasingly connected Asia Pacific & Japan business landscape, security is moving from being a back-room afterthought to being a core business function,” said Kenneth Arredondo, president & general manager, Asia Pacific & Japan, CA Technologies. “In the world of ever-increasing connected devices, organizations will leverage security to deliver better customer experience and contribute to positive business outcomes.”
Key findings from the study show four key trends influencing the perception and implementation of security in APJ enterprises:
- Security as a business growth enabler: 48 percent of APJ respondents recognize that business enablement is an important benefit of security and can drive growth. Additionally, 68 percent of respondents have seen or expect to see increased revenue from new services enabled by improved security.
- Increase in security investment: This new view toward security and the protection and business enablement it offers has sparked an increase in security investment. According to APJ respondents, an average of 26 percent of all IT spending will be devoted to security in the next three years, up from 17 percent today.
- Spurring innovation through open APIs: Success in the application economy requires businesses to innovate and release applications more quickly, and API-assembled apps will lead the way. To facilitate that need, 74 percent of APJ respondents have opened their data as APIs to accelerate mobile and web application delivery, improve customer engagements and open new revenue channels and opportunities. This adds new considerations to the protection factor of security.
- The impact of mobility: Improving the mobile customer experience was cited by 42 percent of APJ respondents as one of the top security priorities. In addition, 55 percent of respondents say mobility has a big or significant impact on security practices and policies with respect to customers. This trend is expected to continue upwards as mobility, BYOD and the Internet of Things continue to drive an increasingly “unwired enterprise” where perpetual connectivity adds a complexity and security risk that must be addressed for employees, customers and partners.
Resources For tips on how to advance security for today’s business environment, read “
8 Steps to Modernize Security for the Application Economy.”
For a graphical representation of the survey results, download this
infographic.
Survey Methodology 650 senior IT and business leaders from financial services, healthcare, manufacturing, retail telecommunications and media / entertainment in six markets in Asia Pacific and Japan, namely Australia, China, India, Japan, Korea and Singapore, participated in the CA Technologies-sponsored study conducted by Vanson Bourne.
About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at
www.ca.com.
Follow CA Technologies Legal Notices Copyright © 2015 CA. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
No comments:
Post a Comment