• HYBRID WORK IS HERE TO STAY?

    HYBRID WORK IS HERE TO STAY?

    NOT SO FAST SAYS THE DATA
    ANALYSIS
  • FEATURED INFOGRAPHIC

    FEATURED INFOGRAPHIC

    2021 Top 10 SMB Business Issues, IT Priorities, IT Challenges
    GET IT NOW
  • NEXT CHANNEL - THE FUTURE OF PARTNER ECOSYSTEM

    NEXT CHANNEL - THE FUTURE OF PARTNER ECOSYSTEM

    Networked, Engaged, Extended, Hybrid
    DOWNLOAD NOW
  • 2021 SMB & MIDMARKET PREDICTIONS

    2021 SMB & MIDMARKET PREDICTIONS

    Top 10 SMB & Midmarket Predictions for 2021
    READ NOW
  • SIMPLIFY. EXPAND. GROW.

    SIMPLIFY. EXPAND. GROW.

    #SMB #MIDMARKET #UPPER MID-MARKET #CHANNEL
    LEARN MORE
  • DIGITAL TRANSFORMATION

    DIGITAL TRANSFORMATION

    Delivering Connected Business
    LEARN MORE
  • WHITE PAPER

    WHITE PAPER

    SMB Path to Digitalization - Prologue and Epilogue
    DOWNLOAD
  • SECURITY RESEARCH

    SECURITY RESEARCH

    SMB & Midmarket Security Adoption Trends
    LATEST RESEARCH
  • MANAGED SERVICES RESEARCH

    MANAGED SERVICES RESEARCH

    US SMB & Midmarket Managed Services Adoption
    LEARN MORE
  • CLOUD RESEARCH

    CLOUD RESEARCH

    SMB & Midmarket Cloud Adoption
    LATEST RESEARCH
  • CHANNEL PARTNERS

    CHANNEL PARTNERS

    Transformation or Consolidation
    LATEST RESEARCH
  • COVID-19 IMPACT

    COVID-19 IMPACT

    on SMB IT Spend Growth Rates
    FULL ANALYSIS
  • WHITE PAPER

    WHITE PAPER

    Windows 10 PCs - Strategic SMB Investment for Modern World of Work
    LEARN MORE
  • NEW SMB CUSTOMER RESEARCH

    NEW SMB CUSTOMER RESEARCH

    PC and software purchasing trends
    LEARN MORE
  • 2020 CHANNEL PARTNER PREDICTIONS

    2020 CHANNEL PARTNER PREDICTIONS

    Channel Partner Predictions for 2020
    READ NOW
  • ANALYTICS & ARTIFICIAL INTELLIGENCE

    ANALYTICS & ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • BUYERS JOURNEY

    BUYERS JOURNEY

    Influence map & care-abouts
    LEARN MORE
  • SAAS RESEARCH

    SAAS RESEARCH

    US SMB & Midmarket SaaS Adoption
    LEARN MORE
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18

Techaisle Blog

Insightful research, flexible data, and deep analysis by a global SMB IT Market Research and Industry Analyst organization dedicated to tracking the Future of SMBs and Channels.

IBM – motivating midmarket firms to think strategically about cloud security

A blog “Big Data in the Cloud - an ideal solution for SMB banks” that we wrote touched a nerve, in a good way. Post blog, in our several discussions with both large and community banks we find that cloud objection is largely based on the size of the bank. In addition, regulatory compliance concerns are huge as most midmarket businesses and banks in particular spend a lot of money being compliant. With the move to cloud they want to make sure that the investment extends to the cloud without being exposed to security breaches and from a regulatory point of view.

What is clear is that migration to cloud is forcing businesses to think differently about security, in very standardized ways because the delivery of cloud service is standardized. It is also pushing them to automate security because utilization of cloud is dynamic, elastic, automated and fluid thus making manual or even semi-automated security processes unmanageable. However, this approach creates multiple vulnerabilities. The bad guys themselves are taking advantage of all the cloud technologies and are becoming a lot faster and more automated than the businesses. Security therefore becomes a moving target and cloud security is a perfect opportunity for businesses to improve defenses and reduce risks.

While most midmarket businesses are reactive, hunting after point solutions when something goes wrong, others are taking a proactive approach to risk and threat so that they have more fluidity in the way they respond when a threat occurs.

IBM security is on a path to help businesses think differently about cloud security. It is moving the businesses along a maturity curve from reactive to proactive to optimized. Optimization refers to the difference between being able to weather an attack and continue with business and how much time could one can shave off and how much cost could be optimized for being able to respond to that event in reducing risk.

As Sharon Hagi, Global Strategist and Senior Offering Manager, IBM Security, said in an interview “the state that IBM is advocating goes beyond reactive or proactive. We call it the optimized state where organizations use automation coupled with predictive security analytics to drive towards a higher level of efficiency. By mixing the elements of proactive approach, automation and security intelligence businesses can actually get to the point where they are a lot more efficient and they actually reduce time and cost to respond to risk.”

IBM is differentiating and trying to distance itself from others in a number of different ways. IBM has a managed security services practice with ten plus security operation centers around the world servicing 133 different countries with 6,000 security professionals and its research lab X-Force provides actionable threat intelligence and insights for business and IT leaders. IBM monitors 10,000 security customers globally, 70 million end-points with 20 billion events per day, has made enormous investments in security intelligence analytics platform that allows it to distill information, identify threats and respond quickly.

But for banks and businesses that come under deep regulatory scrutiny, security goes beyond managed services and is a major psychological barrier to cloud adoption triggering a high level of fear-factor. Recently, we posed a fundamental question of “Why do you want security” to banks and midmarket businesses in general. The responses received could easily be bucketed into five categories:

Continue reading
  0 Comments

SMB and Midmarket mobility security risk sources

Techaisle’s global SMB survey shows that mobility security is the 2nd top IT challenge for small businesses and 4th top IT challenge for midmarket businesses. To delve deeper, during the course of the Techaisle SMB 2015 Mobility Adoption & Trends survey, respondents were asked “When it comes to security risk in the mobile computing context, which of the following represents a source of exposure or uncertainty within your organization?” To a surprisingly high degree of candidness SMB concerns with mobility security revolved around users. As figure below demonstrates, SMB IT respondents ranked three user-attributable issues

  1. User neglect/irresponsibility,
  2. Lack of user knowledge/awareness, and
  3. User mishap

amongst their top five concerns, trailing only “general malware infection” as a mobility security threat. Data is where the user is and to say that the enemy is inside the tent would be an understatement.

SMBs recognize the exposure and vulnerability but Techaisle survey shows that only 16% of SMBs worldwide are fully prepared to handle mobility security challenges. Data also shows that like manageability, security is an important constraint on mobility adoption within the SMB market. Most MSPs, channel partners and suppliers continue to focus on BDR and/or anti-malware security as they are easy to offer and deploy but they represent a very narrow approach to larger security issues within SMBs.

Continue reading
  0 Comments

SMB & Midmarket IT challenges in supporting mobile workforce

If the “office” is defined by devices then “workplace” is defined by the ability to work from wherever those devices (and their users) are located. In this vein, “work” typically includes a requirement to access corporate data with mobile devices.

Data from the Techaisle 2015 SMB Mobility Adoption and Trends survey finds that more than 80% of small business employees and 55% of workers in midmarket firms require mobile access to company data. Providing this access and the applications, devices and solutions represents an enormous investment for SMBs that are typically very conservative in their IT budget allocations.

techaisle-smb-employees-accessing-personal-company-data-resized

By more than a 2:1 ratio, SMB respondents believe that mobility is a means of driving growth in the business. But mobility does not deliver business benefits painlessly. The introduction of mobility solutions has created new issues for IT management, and suppliers who can help to address these issues will gain favor in this community.

Addressing the needs of the “dual mode” user is a non-trivial issue. In the Techaisle survey, both small and midmarket firms report that users access a combination of business and personal resources via their business-connected (both corporate-owned and BYOD) mobile devices. This reinforces the importance of some of the solutions being currently used or planning to be used by SMBs. These are solutions that help manage mobile devices that deliver access to corporate information without downloading data and applications themselves (such as thin clients and Windows-as-a-Service) and methods of securing data when it is exchanged between mobile devices and external users and where users themselves move seamlessly between corporate and personal usage modes on devices that are connected to corporate networks.

Mobile devices are an essential component of mobility but mobility itself extends beyond hardware to applications, solutions and work habits. Techaisle’s 2015 SMB Mobility Adoption Trends research shows that the “dual mode” SMB user represents a specific problem for SMB IT staff and the challenges of supporting a mobile workforce go well beyond the device.

techaisle-top-5-smb-challenges-supporting-mobile-workforce-resized

Small and midsized businesses have different challenges in supporting the mobile workforce

Looking first at the small businesses, we see that managing TCO – which includes, in addition to typical IT expenses, service charges that are unique to mobile devices – is rated as the most significant challenge by small business respondents. These firms also struggle with the “on ramps” to mobility: finding appropriate suppliers and solutions and integrating multiple screens are also ranked in the top five challenges encountered by 1-99 employee firms in support of the mobile workforce.

techaisle-top-5-midmarket-challenges-supporting-mobile-workforce-resized

Midmarket firms also count TCO as their most significant challenge. Rather than struggling with mobility on ramps, though, midmarket firms are more concerned with security/data protection and mobile management. Network security, protecting corporate data on mobile devices and managing these devices are all top-five mobility challenges for midmarket IT – and further evidence of why mobility solutions addressing these issues are essential to this community.

  0 Comments

SMB Mobility Security preparedness and threat sources

Techaisle’s recently completely study US SMB Mobility Solutions Adoption Trends shows that SMBs are more optimistic than they ought to be about their current mobility security profiles, but even so, less than 20% of US SMBs believe that they are “fully prepared” today. Like manageability, security is an important constraint on mobility adoption within the SMB market. Suppliers need to help SMB clients to establish frameworks that protect against both external and employee threats to information security.

In many ways, it is difficult or impossible to isolate security as an issue in mobility. Security is intrinsic to the devices, applications and solutions used by SMB firms that have adopted mobility, and security is an essential factor in supporting the mobile workforce. Techaisle wants to highlight two findings from the US SMB 2015 mobility survey that are specific to security, and which are important to understanding and supporting the SMB mobility market.

techaisle-smb-mobility-security-perception-threat-sources

Current mobility security posture within SMBs
The first of these data points concerns the current mobility security posture within US SMBs. As the data shows, SMBs are cognizant of the challenges associated with securing mobility-dependent workspaces and work patterns. Fully 45% believe that they are “as prepared as we can be,” but acknowledge that “requirements will change.” Nearly 20% state that they are “partially prepared” but have “known gaps and shortfalls,” and other 5% confess to being “not very well prepared.” In reality, it is likely that “partially prepared” describes a much greater swath of the SMB market than these figures suggest: requirements do indeed change continuously, and even firms that are confident that they are “fully prepared” (19%) may find that the threat landscape is more extensive and pernicious than they had imagined. Techaisle is aware that it is hard for suppliers to persuade potential customers that they “ought to want to” be more proactive with security – but with increasing frequency and severity of breaches and attacks, and the exposure that mobility’s flexible perimeter incurs, it is important for suppliers to position their solutions against the reality of the threat landscape rather than the SMB perception of exposure and preparedness.

SMB perception of mobile threat sources: the enemy is inside the tent
Second data point has to do with mobile threat sources. Techaisle survey data shows that the enemy is inside the tent. During the course of the Techaisle SMB 2015 survey, respondents were asked “When it comes to security risk in the mobile computing context, which of the following represents a source of exposure or uncertainty within your organization?” To a (surprisingly) high degree, SMB concerns with mobility security revolve around users. SMB IT respondents ranked three user-attributable issues – user neglect/irresponsibility, lack of user knowledge and awareness, and user mishap/thoughtlessness – amongst their top four concerns, trailing only “general malware infection” as a mobility security threat.

  0 Comments

Search Blogs

Find Research

Blog Archive

Research You Can Rely On | Analysis You Can Act Upon

Techaisle - TA