Skip to main content Skip to Footer

LATEST THINKING


Security Implications of the Accenture Technology Vision 2015

Managing edge devices, as well as the end-to-end set of technologies that enable intelligent decisions, will be essential to future operations.

Overview

In Technology Vision 2015, we outlined how leading businesses are stretching their boundaries in the digital era—and creating a fabric connecting customers, services and devices through the Internet of Things (IoT).

In the process, they are disrupting and reshaping entire markets. Most importantly, they are looking to collaborate in the “We Economy” to tackle global challenges that transcend business and industry borders.

We found that security is a central tenet across all of the trends described in Tech Vision 2015.

VIDEO

Cyber Security plays a key role in today’s digital business

Examine the 5 security implications emerging out of this year’s Tech Vision.

BACKGROUND

Specifically, security is a top priority to:

  • Protect connected Internet of Things edge devices that businesses use to deliver results in the Outcome Economy, while assuring data integrity to enable decision making at the edge.
  • Ensure businesses can ingest, process and generate insights from big, diverse data as they leverage digital platforms and share data through the Platform (R)evolution.
  • Transform into Intelligent Enterprises that rely on smart software (automation, machine learning and cognitive computing), and a collaborative model of humans and machines in a Workforce Reimagined.
  • Build customer trust as businesses deliver highly personalized products and targeted services in the Internet of Me era.

Analysis

Since security is the foundation for these trends, we are focusing this year’s Security Implications on five themes or chapters to help prepare business leaders to stretch their digital boundaries:

  • Chapter 1—Edge Autonomy. Enabling autonomous devices at the edge. What is the security impact of using IoT edge devices to enable business decisions?

  • Chapter 2—Data Integrity. Making data-driven decisions at Internet of Things scale. How can businesses make sure edge data is reliable for analytics?

  • Chapter 3—Big Data Security. Securing the three Vs. What security controls will scale to protect big data?

  • Chapter 4—Security Platforms. Maximizing protection across digital ecosystem platforms. How can businesses leverage their platforms to securely operate in a broader digital ecosystem?

  • Chapter 5—Customer Trust. Building customer trust in a digital economy. What security and privacy approaches reinforce customer trust in the age of hyperpersonalization?

RECOMMENDATIONS

We recommend businesses be vigilant with their security and privacy practices so that they neither compromise their customers’ experiences nor lose their trust.

Following truly proactive and ethical data stewardship practices, and offering enhanced services that are consistent with customers’ expectations of privacy and personalized seamless experiences, will strengthen trust and participation in the digital economy.

We encourage you to read the full report and contact us to discuss innovative ways to secure the new digital ecosystem, expand your connectedness and enable a rich and trusted customer experience in our shared digital future.

5 SECURITY IMPLICATIONS

Cybersecurity plays a key role in today’s digital business. Examine each of the 5 security implications emerging out of this year’s Accenture Technology Vision.
Edge Autonomy
The acceleration of the Internet of Things (IoT) is introducing billions of connected devices and machines. Protect these devices, and their data, with these 5 guidelines.


Big Data Security
Big Data creates increasing security concerns for business. We recommend a three-pronged approach to protecting big data from sophisticated attacks.


Data Integrity
Data integrity must be maintained for optimal business performance. Follow our 5 guidelines to secure the complete data life cycle.


Security Platforms
Security platforms can be used to increase security and counter complex security attacks. We outline 6 steps to better understand and benefit from digital platforms.


Customer Trust
The Internet of Things economy demands highly personalized products and services. Customer data must be protected - follow these four responsible data management practices.c

INFOGRAPHIC

DOWNLOAD INFOGRAPHIC (PDF 600 KB)