Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization...

8
AN IDC INFOBRIEF | OCTOBER 2019 Securing Data Monetization in ASEAN In partnership with

Transcript of Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization...

Page 1: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

AN IDC INFOBRIEF | OCTOBER 2019

Securing Data Monetization in ASEAN

In partnership with

Page 2: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

The 7 DataMonetizationModels

Executive SummaryThis InfoBrief looks at the value of data and focuses on data monetization, management and analytics (cloud and DevSecOps). The key objective is not to take away the business goals but look for ways to secure data privacy.

Using data and analytics better, internally

Becoming a distributor of insights

Building platforms of insights and services

Co-innovating and partnering on data with fintechs and the world of developers

Acquiring data: data augmentation for

“richer” data

Providing data: your data as other people’s assets

Producing data-based products

01

05

06

07

02

03

04

An IDC InfoBrief | Securing Data Monetization in ASEAN

2

Source: IDC Financial Insights, 2019

Page 3: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

Key Considerations

An IDC InfoBrief | Securing Data Monetization in ASEAN

3

of ASEAN respondents agree analytics and business intelligence are critical to improving customer experience.

The demand to know the data you have, what data you want to use, how you can use it and that the integrity of the data is intact.

The ability to combine multiple data sources to create insight and value.64% of ASEAN respondents agree that analytics and business intelligence are important to drive topline revenue growth.

Local, regional and global regulations may need to be considered.Find out local personal privacy legislation or general data protection regulation (GDPR) compliance.Understand that customers expect organizations to be a trustworthy data custodian.

DevSecOps must become the model of choice.Embed security into the DevOps approach to ensure integrity and trustworthiness.

Onlyof respondents have implemented data lake architectures, while 33% are planning to in the next 12-18 months.

49%

43%

Robust data management

Strong data analytics

Understanding the data privacy landscape

Mobile and cloud are the key technology platforms

Source: IDC Asia Pacific Future of Work Study, 2019

Page 4: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

Data Management

An IDC InfoBrief | Securing Data Monetization in ASEAN

4

Clean data, known data sources

Strong data acquisition, triage, classification and disposal processes

Ability to identify data-driven monetization opportunities within your industry of organizations acknowledge having had a data breach in the past 12 months.45%

Source: IDC Asia Pacific Digital Trust and Cyber Economics Study, 2019

is the implementation of architectures, tools and processes to achieve stated data governance objectives.

defines how data is accessed and treated within a broader data

management strategy.

Data Management Data Governance DATAGOVERNANCE

Data ArchitectureManagement

DataDevelopment

DataOperations

Management

Document& Content

Management

Meta DataManagement

Data Quality

Management

DataSecurity

ManagementReference &Master DataManagement

Data Warehousing

& BI Management

Page 5: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

Data Privacy

An IDC InfoBrief | Securing Data Monetization in ASEAN

5

GDPR states that permission is needed for each method of use for personally identifiable information.

This is not just about compliance, this is a

customer expectation.

Whether business to business or customers (B2B/B2C), customers

expect you to be a trustworthy data custodian.

No such thing as blanket-approval, get into the habit now.

Page 6: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

Cloud and Mobile Underpin Customer Relationships

An IDC InfoBrief | Securing Data Monetization in ASEAN

6

Scale, ease-of-use, flexibility and expectation fuel a cloud/mobile architecture.

The application programming interface (API) economy is upon us, but this required detailed understanding of the processes, approaches and challenges.

Embedding security into the process is critical since API’s expose internal data.

Guaranteeing data integrity is also critical as data can be exposed externally.

Ensuring security by design and default.

DevSecOps model is the way forward:

25%of ASEAN organizations are implementing a DevSecOps approach.Source: IDC AP Digital Trust and Cyber Economics Study, 2019

Page 7: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

Amplifies its ecosystem synergy through digital connections.

Connector:Discovers, matches and transacts

among multiple parties.

Reintermediary:

Leverages the digital platform as a means to innovation.

X-as-a-Service:Provides ecosystem for

data sharing and value creation.

Data Monetization:

An IDC InfoBrief | Securing Data Monetization in ASEAN

7

Essential GuidanceEmerging business models for the Future Enterprise require mature and secure data management and DevSecOps practices:

Many to many ecosystemsOutcome-based personalizationExtreme transparencyAsset sharingDynamic pricingValue sharing Ecosystem governance

This IDC InfoBrief was produced by IDC Custom Solutions. Copyright 2019 IDC. Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For more information, visit: www.ap.idc.asia or email: [email protected]

Source: IDC DX Practice, 2019

BUSINESS MODEL FEATURES

Page 8: Securing Data Monetization in ASEAN - Micro Focus · 2019-11-01 · The 7 Data. Monetization Models. Executive Summary. This InfoBrief looks at the value of data and focuses on data

Micro Focus can help secure data and ensure privacy8

Control of assets, including:ModificationAccessRetention and disposition

Role-based accessBusiness-driven data controls when data is createdPolicy-based discovery and remedy of personally identifiable information/confidential dataEncryption

Data protection and redundancy based on datacenter standardsAccess controls business driven

Ensuring asset is provisioned on proper class of servicesPersonal asset converted to business asset

Future-proofing data when applications are nearing end-of life

Integrity

Confidentiality

Availability

Confidentiality, Integrity and Availability (CIA)

Where do you begin? Implementing Controls Data Lifecycle Management

Discover where the private and sensitive data residesClassify the sensitivity of dataDetermine current risk exposure> RISK SCORE

Based on data sensitivity and risk: Define data management policies

Transparency in data handling processes and procedures

Define appropriate accessEnforce access controlsEncrypting / tokenizing / masking sensitive data

How data is acquired?What data is important to preserve, maintain and protect?What data should be removed / deleted / destroyed?

Provide a reliable understanding about how data are processed

PRO

TECT

CON

TRO

L / I

NFO

M

IDEN

TIFY

Data Privacy Protection Framework

For more information: Visit microfocus.com/SRG

Identify Sources Classify Apply Policy

In-ScopeData

Manage

Monitor

Notify

Move

Redact

Encrypt/Mask

Delete

Data for Disposition

Focus only on in-scope information

Apply analytics to high-value, sensitive

information

Manage user rights to data and enforce identify privileges

Build customer trust and confidence with controls

Protect data in use, in transit and at

rest - globally

Monitor for abnormal behavior and data

exfiltration

Data Not In Scope

INFORMATIONSECURITY