We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.

Blog: Ron Powell Subscribe to this blog's RSS feed!

Ron Powell

Thanks for visiting my blog. As co-founder of the BeyeNETWORK, acquired by TechTarget in 2010, I am privileged to participate in many industry-related activities as a BeyeNETWORK expert covering business intelligence and analytics. These events provide me with a unique insider perspective into the business intelligence ecosystem, its products and the vendors that provide those products. I'll be sharing that invaluable information with you through this blog, which will also be a reflection my business philosophy. And, just to make this interesting, I'll be sure to include my personal point of view on a wide range of topics and share some of the stories of people I meet in my travels.

About the author >

Ron is an independent analyst, consultant and editorial expert with extensive knowledge and experience in business intelligence, big data, analytics and data warehousing. Currently president of Powell Interactive Media, which specializes in consulting and podcast services, he is also Executive Producer of The World Transformed Fast Forward series. In 2004, Ron founded the BeyeNETWORK, which was acquired by Tech Target in 2010.  Prior to the founding of the BeyeNETWORK, Ron was cofounder, publisher and editorial director of DM Review (now Information Management). He maintains an expert channel and blog on the BeyeNETWORK and may be contacted by email at rpowell@powellinteractivemedia.com. 

More articles and Ron's blog can be found in his BeyeNETWORK expert channel.

The importance of protecting your key intellectual assets and confidential reports is critical in today's economic environment. I recently spoke with Johnnie Konstantas, VP of marketing for Varonis. With all of the requirements regarding compliance and new regulations being instituted by government agencies in 2009, the importance of automating and monitoring access to key documents is of the highest priority. Also, the ability to limit access to employees that have been terminated is just as important.  Following are 5 security predictions for 2009 from Varonis:

Automation is essential - a tough economy usually means being asked to do more with less. While IT departments tend to traditionally run lean, hiring freezes are likely to extend here as well. This potentially means that IT operations directors will take a look at processes and tasks that are essential but labor intensive, and look for ways and technology by which to automate the functions. This type of spend is likely to get approval especially if payback is quick.

Efficiency over innovation - efforts aimed at increasing employee productivity and getting more from existing investments will definitely have an audience. These are good times for companies to offer customers tutorials and guidance on getting more from the functions of installed technology, especially if those functions help them save time.

Expenses must map to business benefit - while some new technologies and projects may be approved, it's almost a certainty that all new IT expenses have to show clear return on investment. Business managers will need to see short-term time savings in both time and money before approving any expense - even those requisite for operating the business.

Transparency to asset use - incidents of data loss and misuse have been on the rise and likely to increase with layoffs and job insecurity, which has increased in regard to the economic downfall and will continue to increase in 2009. Companies are mandating greater protections for information assets and asking IT personnel to show proof of measures taken to that end. Organizations too are looking to implement processes that charge data stewards with the continuous monitoring and safekeeping of critical company information.

Risk mitigation is good enough - while most organizations aim at 100% data loss prevention, during a downturn business managers must weigh cost of protection against acceptable risk. Measures that significantly reduce risk and provide adjunct operational benefits will be preferred to strictly preventive solutions with lengthy implementation time frames.

Posted January 30, 2009 1:28 PM
Permalink | No Comments |

Leave a comment

Search this blog
Categories ›
Archives ›
Recent Entries ›