"Put Identity and Security at the Center of Digital Transformation"

[ad_1]

The coronavirus crisis has accelerated the digital transformation of many Australian businesses, but the benefits may be less if digital identity is not an integral part of the process, writes Ashley Diffey, Country Manager for Australia, New Zealand and Japan at enterprise security specialist Ping Identity.

Did the pandemic give your organization the push it needed to get serious about digital transformation? If the answer is yes, you are not alone. Industry watchers expect the coming year to bring a flurry of high-tech activity as Australian organizations across all industries leverage recent experiences with communication and collaboration technologies into enterprise-wide initiatives.

Accelerating the transformation process is a good strategy for many businesses, according to Guy Holland, managing partner in KPMG’s Digital Delta and Technology Advisory department. “With 80% of revenue growth predicted to come from digital offerings and operations over the next three years, IT leaders should continue to transform their operating models and invest in key enablers such as integrated cloud platforms, agile ways of working, intelligent automation, AI, blockchain and advanced data and analytics,” he noted earlier this year.

Ashley Diffey, Country Manager ANZ & Japan, Ping Identity

For it to apply

Good advice – but embarking on IT programs and deriving a measurable return on investment of time and money have always been two very different things, as any project manager who’s been around a few times can attest.

Digital transformation is no exception. A recent global study by McKinsey & Company found that only 16% of organizations believe their efforts have led to sustained and improved performance. That’s hardly a compelling argument for loosening purse strings at a time when funds have never been tighter.

The same “Unlocking Success in Digital Transformation Survey” found that giving employees access to the digital resources and information they need to operate more effectively more than doubled the chances of transformation success.

To be safe

Streamlining and securing this approach can be a challenge for businesses that don’t include a rethinking of cybersecurity strategy, protocol, and processes as part of their digital transformation planning process.

Implementing multiple digital solutions and requiring employees to use a unique login and password to access each one is no recipe for productivity; in fact the opposite. It can hinder their ability to operate effectively to the point where they fall back on old ways and solutions instead of taking full advantage of transformative digital infrastructure and technology.

Conversely, eliminating multiple logins and making workforce identity the centerpiece of your security strategy allows employees to access these systems quickly and securely. A strong, centralized authentication service that works across all applications, clouds, directories and devices is an essential part of this transformation.

A zero-trust, identity-centric approach

In addition to the productivity gains such a simplified approach can provide, this model allows organizations to redirect their IT resources away from routine tasks, such as dealing with password reset requests, and toward initiatives that can help the business move forward.

Identity-based security can also provide better protection than the traditional perimeter-based model, especially if digital transformation includes increased remote work and ipso facto increases the potential attack surface.

Given the well-documented threat posed by cybercriminals in today’s uncertain times, strengthening your security posture should be an imperative for Australian businesses of all sizes and categories.

Positioning for growth in post-pandemic Australia

The next couple of years will be challenging for businesses that survive the COVID-19 crisis and the drop in customer activity and demand caused by regulation of shutdowns. Digital transformation is likely to be essential for many on the road to recovery. Making simple and secure access a priority will increase the likelihood of this investment and deliver cost savings and productivity improvements that will facilitate survival and growth.

[ad_2]

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *