Upload
others
View
8
Download
0
Embed Size (px)
Citation preview
AN IDC INFOBRIEF | OCTOBER 2019
Securing Data Monetization in ASEAN
In partnership with
The 7 DataMonetizationModels
Executive SummaryThis InfoBrief looks at the value of data and focuses on data monetization, management and analytics (cloud and DevSecOps). The key objective is not to take away the business goals but look for ways to secure data privacy.
Using data and analytics better, internally
Becoming a distributor of insights
Building platforms of insights and services
Co-innovating and partnering on data with fintechs and the world of developers
Acquiring data: data augmentation for
“richer” data
Providing data: your data as other people’s assets
Producing data-based products
01
05
06
07
02
03
04
An IDC InfoBrief | Securing Data Monetization in ASEAN
2
Source: IDC Financial Insights, 2019
Key Considerations
An IDC InfoBrief | Securing Data Monetization in ASEAN
3
of ASEAN respondents agree analytics and business intelligence are critical to improving customer experience.
The demand to know the data you have, what data you want to use, how you can use it and that the integrity of the data is intact.
The ability to combine multiple data sources to create insight and value.64% of ASEAN respondents agree that analytics and business intelligence are important to drive topline revenue growth.
Local, regional and global regulations may need to be considered.Find out local personal privacy legislation or general data protection regulation (GDPR) compliance.Understand that customers expect organizations to be a trustworthy data custodian.
DevSecOps must become the model of choice.Embed security into the DevOps approach to ensure integrity and trustworthiness.
Onlyof respondents have implemented data lake architectures, while 33% are planning to in the next 12-18 months.
49%
43%
Robust data management
Strong data analytics
Understanding the data privacy landscape
Mobile and cloud are the key technology platforms
Source: IDC Asia Pacific Future of Work Study, 2019
Data Management
An IDC InfoBrief | Securing Data Monetization in ASEAN
4
Clean data, known data sources
Strong data acquisition, triage, classification and disposal processes
Ability to identify data-driven monetization opportunities within your industry of organizations acknowledge having had a data breach in the past 12 months.45%
Source: IDC Asia Pacific Digital Trust and Cyber Economics Study, 2019
is the implementation of architectures, tools and processes to achieve stated data governance objectives.
defines how data is accessed and treated within a broader data
management strategy.
Data Management Data Governance DATAGOVERNANCE
Data ArchitectureManagement
DataDevelopment
DataOperations
Management
Document& Content
Management
Meta DataManagement
Data Quality
Management
DataSecurity
ManagementReference &Master DataManagement
Data Warehousing
& BI Management
Data Privacy
An IDC InfoBrief | Securing Data Monetization in ASEAN
5
GDPR states that permission is needed for each method of use for personally identifiable information.
This is not just about compliance, this is a
customer expectation.
Whether business to business or customers (B2B/B2C), customers
expect you to be a trustworthy data custodian.
No such thing as blanket-approval, get into the habit now.
Cloud and Mobile Underpin Customer Relationships
An IDC InfoBrief | Securing Data Monetization in ASEAN
6
Scale, ease-of-use, flexibility and expectation fuel a cloud/mobile architecture.
The application programming interface (API) economy is upon us, but this required detailed understanding of the processes, approaches and challenges.
Embedding security into the process is critical since API’s expose internal data.
Guaranteeing data integrity is also critical as data can be exposed externally.
Ensuring security by design and default.
DevSecOps model is the way forward:
25%of ASEAN organizations are implementing a DevSecOps approach.Source: IDC AP Digital Trust and Cyber Economics Study, 2019
Amplifies its ecosystem synergy through digital connections.
Connector:Discovers, matches and transacts
among multiple parties.
Reintermediary:
Leverages the digital platform as a means to innovation.
X-as-a-Service:Provides ecosystem for
data sharing and value creation.
Data Monetization:
An IDC InfoBrief | Securing Data Monetization in ASEAN
7
Essential GuidanceEmerging business models for the Future Enterprise require mature and secure data management and DevSecOps practices:
Many to many ecosystemsOutcome-based personalizationExtreme transparencyAsset sharingDynamic pricingValue sharing Ecosystem governance
This IDC InfoBrief was produced by IDC Custom Solutions. Copyright 2019 IDC. Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For more information, visit: www.ap.idc.asia or email: [email protected]
Source: IDC DX Practice, 2019
BUSINESS MODEL FEATURES
Micro Focus can help secure data and ensure privacy8
Control of assets, including:ModificationAccessRetention and disposition
Role-based accessBusiness-driven data controls when data is createdPolicy-based discovery and remedy of personally identifiable information/confidential dataEncryption
Data protection and redundancy based on datacenter standardsAccess controls business driven
Ensuring asset is provisioned on proper class of servicesPersonal asset converted to business asset
Future-proofing data when applications are nearing end-of life
Integrity
Confidentiality
Availability
Confidentiality, Integrity and Availability (CIA)
Where do you begin? Implementing Controls Data Lifecycle Management
Discover where the private and sensitive data residesClassify the sensitivity of dataDetermine current risk exposure> RISK SCORE
Based on data sensitivity and risk: Define data management policies
Transparency in data handling processes and procedures
Define appropriate accessEnforce access controlsEncrypting / tokenizing / masking sensitive data
How data is acquired?What data is important to preserve, maintain and protect?What data should be removed / deleted / destroyed?
Provide a reliable understanding about how data are processed
PRO
TECT
CON
TRO
L / I
NFO
M
IDEN
TIFY
Data Privacy Protection Framework
For more information: Visit microfocus.com/SRG
Identify Sources Classify Apply Policy
In-ScopeData
Manage
Monitor
Notify
Move
Redact
Encrypt/Mask
Delete
Data for Disposition
Focus only on in-scope information
Apply analytics to high-value, sensitive
information
Manage user rights to data and enforce identify privileges
Build customer trust and confidence with controls
Protect data in use, in transit and at
rest - globally
Monitor for abnormal behavior and data
exfiltration
Data Not In Scope
INFORMATIONSECURITY