Tag Archives: IDC
The Healthcare and Life Sciences industry has demonstrated its ability to take advantage of data to fuel research, explore new ways to cure life threatening diseases, and save lives. With the adoption of technology innovation especially in the mobile technology segment, this industry will need to find a balance between investments and risk.
ModernMedicine.com published an article in May, 2014 stating how analysts worry that a wide-scale security breach could occur in healthcare and pharmaceuticals industry this year. The piece calls out that this industry category ranked the lowest in an S&P500 cyber health study because of its high volume of incidents and slow response rates.
In the Ponemon Institute’s research, The State of Data Centric Security, respondents from the Healthcare and Life Sciences stated the data they considered most at risk was customer, consumer and patient record data. Intellectual Property, Business Intelligence and Classified Data responses ranked a close second.
In an Informatica webinar with Alan Louie, Research Analyst from IDC Health Insights (@IDCPharmaGuru), we discussed his research on ‘Changing Times in the Life Sciences – Enabled and Empowered by Tech Innovation’. The megatrends of cloud, mobile, social networks and Big Data analytics are all moving in a positive direction with various phases of adoption. Mobile technologies tops the list of IT priorities – likely because of the productivity gains that can be achieved by mobile devices and applications. Security/Risk Management technologies listed as the second-highest priority.
When we asked Security Professionals in Life Sciences in the Ponemon Survey, ‘What keeps you up at night?’, the top answer was ‘migrating to new mobile platforms’. The reason I call this factoid out is that all other industry categories ranked ‘not knowing where sensitive data resides’ as the biggest concern. Why is Life Sciences different from other industries?
One reason could be the intense scrutiny over Intellectual Property protection and HIPPA compliance has already shone a light on where sensitive data reside. Mobile makes it difficult to track and contain a potential breach given that cell phones are the number 1 item left behind in taxi cabs.
With the threat of a major breach on the horizon, and the push to leverage technology such as mobile and cloud, it is evident that the investments in security and risk management need to focus on the data itself – rather than tie it to a specific technology or platform.
Enter Data-Centric Security. The call to action is to consider applying a new approach to the information security paradigm that emphasizes the security of the data itself rather than the security of networks or applications. Informatica recently published an eBook ‘Data-Centric Security eBook New Imperatives for a New Age of Data’. Download it, read it. In an industry with so much at stake, we highlight the need for new security measures such as these. Do you agree?
I encourage your comments and open the dialogue!
The digitization of everything is creating a data explosion near you. Whether data is accumulating in the data center, in the cloud, on your laptop or mobile device, sometimes too much of something isn’t always a good thing. In a recent webinar cohosted by Informatica and Symantec, we polled our listeners to find out how the data explosion was impacting them. We also asked what type of unstructured and structured data is growing the fastest. Check out what they said. (more…)
Achieving IT Efficiency Through Consolidation And Legacy Application Retirement In Banking And Capital Markets
One of the top challenges among financial firms of all sizes is how to efficiently manage information within their organization in the face of explosive data growth. More and more data needs to be retained for a longer period to meet regulatory compliance. At the same time, they need to meet customer SLAs. The wave of mergers and acquisitions in the financial services industry leads to IT consolidations effort that leaves many legacy applications behind. The cost savings from IT consolidations would only be realized by retiring those legacy applications to eliminate the associated operational and maintenance costs. These legacy applications are kept around because the data needs to be retained for compliance.
Data Integration: Your Cloud Strategy’s Silver Lining??
Earlier this year, IDC projected that, “by the end of 2009, 76% of U.S. organizations will use at least one SaaS-delivered application for business use” and that “the percentage of U.S. firms which plan to spend at least 25% of their IT budgets on SaaS applications will increase from 23% in 2008 to nearly 45% in 2010.” Great news, right? But is your organization ready? Do you have an overall strategy for “The Cloud”? And if you have already made investments in SaaS applications, do you have a plan to ensure that secure, timely, consistent, and accurate information is being delivered across these systems and throughout the business? (more…)