research report catalogue · 2017-05-12 · research report catalogue may 2017 abstract through our...

Post on 20-May-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

RESEARCHREPORT

CATALOGUEMay2017

ABSTRACTThrough our in-depth reports, TechVision Research provides early perspectives on key technology trends which help our clients stay ahead of the disruptive technology challenges they’ll face. Our research agenda uncovers key technology inflection points and defines their impact by applying technical depth, pragmatic business experience, and rigorous analysis. This catalogue summarizes our current research focus covering critical technology areas impacting the enterprise. For more information please contact:contact@techvisionresearch.com

©2017TechVisionResearch–Allrightsreserved 2

TableofContents

Blockchain...........................................................................................................................................4PublishedResearch......................................................................................................................................4

BlockchainEnterpriseLevelSet................................................................................................................4Blockchain-basedIdentityManagement.................................................................................................4BlockchainLevelSetForBankingExecutives...........................................................................................5

UpcomingResearch......................................................................................................................................5Blockchain2.0:SmartContracts..............................................................................................................5

DataArchitectureandGovernance....................................................................................................6PublishedResearch......................................................................................................................................6

Data–TheFundamentalsAreBroken.....................................................................................................6FixingtheFundamentals—TheBusinessBlueprint..................................................................................6TheFutureofInformationSharing...........................................................................................................7TechVisionCrossTalkReport:IdentityandDataGovernance..................................................................7TheRiseofMachineLearning:ManagingtheOpportunities,HandlingtheThreats(New)....................8

UpcomingResearch......................................................................................................................................9FixingtheFundamentals–DataStrategy.................................................................................................9FixingtheFundamentals-DataAssetManagement...............................................................................9FixingtheFundamentals–EnterpriseFoundationalData.....................................................................10FixingtheFundamentals–DataDesignPractice....................................................................................10

PrivacyandDataProtection.............................................................................................................11PublishedResearch....................................................................................................................................11

EnterprisePrivacyGuidelinesinaChangingRegulatoryEnvironment..................................................11PrivacyBeyondCompliance...................................................................................................................12TheNewEuropeanPrivacyandDataProtectionRegulation—ComplianceorConsequences...............13EnterpriseInformationProtection.........................................................................................................13

NextGenerationEnterpriseIT&Innovation...................................................................................14PublishedResearch....................................................................................................................................14

TheEndofEnterpriseArchitectureandITasWeKnowIT.....................................................................14HowDoWeAccelerateEnterpriseInnovationinaCultureofRiskAversion?........................................15AnITOrganizationalStructurefortheFuture........................................................................................15WhyLargeTechnicalProgramsFailandHowtoMitigateRisk(New)...................................................16

IdentityManagementandSecurity..................................................................................................16PublishedResearch....................................................................................................................................16

TheFutureofIdentityManagement......................................................................................................16Blockchain-basedIdentityManagement...............................................................................................17PuttingIdentityintoContext:NextGenerationIAM..............................................................................17OpportunitiesinEuropewithElectronicIdentificationandTrustServices.............................................18TechVisionCrossTalkReport:IdentityandDataGovernance................................................................18GettingtoKnowYourCustomers:TheEmergenceofCIAM...................................................................19MachineLearningandArtificialIntelligenceonBigDataforCybersecurity(New)...............................20

UpcomingResearch....................................................................................................................................20IdentityofThings(IDoT).........................................................................................................................20TheCloudificationofIdentity—IDaaSMarketOverview........................................................................21Banking,IdentityandtheRegulators(New)..........................................................................................21

©2017TechVisionResearch–Allrightsreserved 3

IdentityGovernanceAdministration:TheJourneytothePeople-centric,Business-orientedFutureofAccessControl(New).............................................................................................................................22

InternetofThings.............................................................................................................................23PublishedResearch....................................................................................................................................23

InternetofThingsasaSecurityRiskAmplifierandRiskMitigationStrategies......................................23UpcomingResearch....................................................................................................................................23

EnterpriseIoTRealityCheck...................................................................................................................23IdentityofThings(IDoT).........................................................................................................................24UnlockingtheValueofIoTtotheEnterprise.........................................................................................24

ArtificialIntelligence/MachineLearning........................................................................................25PublishedResearch....................................................................................................................................25

TheRiseofMachineLearning:ManagingtheOpportunities,HandlingtheThreats(New)..................25MachineLearningandArtificialIntelligenceonBigDataforCybersecurity(new)................................25

AboutTechVision..............................................................................................................................27

©2017TechVisionResearch–Allrightsreserved 4

BlockchainPublishedResearchBlockchainEnterpriseLevelSet

By:GaryRowe,PrincipalConsultingAnalystThisreportprovidesguidanceforenterpriseleadersastothebusinessvalueandtimingofblockchain,ordistributedledgertechnology.Ourgoalinthisreportistoseparatethehypefromrealityandprovideourenterpriseclientswithanswerstothewhat,when,whoandwhyquestionssurroundingthisspace.Blockchaincanbethoughtofasatoolorrecordingmechanismtosupportcommerce,smartcontracts,andothersimilarbusinesslogand“ledger”functions.Itcanbethoughtofasaprotocolofdistributed,verifiablevalueexchange.BlockchainisbestknownasthetechnologybehindBitcoinandisusedasadecentralizedmeansofverifyingandrecordingBitcointransactions.ThefocusofthisreportistheapplicationofblockchainbeyondBitcoinfortheenterprise.Thisseminalreportisthefirstofaseriesofblockchain-relatedresearchreportsanditsetsthefoundationfororganizationstogetthebasicsofblockchainright,whileprovidingacontextforbalancinginvestment,opportunityandrisk.Thisreportwillfocusspecificallyonblockchainintheenterpriseandprovidesaroadmapfororganizationstoconsiderinresearching,piloting,deployingand,ultimatelyscalingusageofblockchain.Weincludeasetofpracticalstepsfororganizationstoconsiderastheywalkthefinelinebetweenbeingpreparedforatsunamiandimmediatelysellingtheircoastalpropertyandmovingtothemountains.

Blockchain-basedIdentityManagement

By:DougSimmonsandGaryRowe,PrincipalConsultingAnalystsThisisthesecondofourseriesofblockchain-relatedresearchreportsanditsetsafoundationfororganizationstounderstandhowblockchainordistributedledgerscanfitwithinanidentitymanagementecosystem.Theconvergenceofidentitymanagementandblockchainprovidesanopportunitytolookatblockchain-basedidentitymanagementfromtwoprimaryperspectives;firstfromanidentitymanagement-centricviewandsecond,fromtheperspectiveofhowblockchainhasevolvedtosupportabroadrangeofidentitymanagementusecases,includingpeople,applicationsanddevices.Thisreportfocusesonanext-generationidentityecosystemthatprovideseachpersonasinglesetofidentitycredentials,availableforuseacrossallelectronicservicesencompassinggovernment,consumer,andcorporateentities(i.e.,BringYourOwnIdentity,orBYOI).Blockchainhasthepotentialtobeavaluablepartofthisecosystembyenablingtherecordinganddistributionoftrustedidentitiesandassociatedinformationwithoutrequiringrelianceonaspecificcentralizedthird-partyauthority.

©2017TechVisionResearch–Allrightsreserved 5

BlockchainLevelSetForBankingExecutives

By: RhomaiosRam,PrincipalConsultingAnalystOverthelastfewyears,therehasbeenalotofblockchainhype,butmuchofthethinkingisfromtheperspectiveofatechnologylookingforausecase.Thisreportisfromtheperspectiveofaglobalbankingexecutiveevaluatingandleveragingtechnologytoaddressspecificbusinessgoals.Thefocusisontheapplicabilityofblockchaintoimprovetheefficiencyandeffectivenessofbankingserviceswhilemaintainingregulatorycompliance.ThepragmaticexperienceofrunningbothEuropeantransactionbankingandProductManagementatDeutscheBank,andsubsequentlydevelopingtheirdigitalbankingstrategyincludinganassessmentofblockchainandotherdisruptivetechnologiesisdrawnuponindevelopingthisresearch.Theprimarygoalformostbankersthesedaysisregulatorycompliancecloselyfollowedbycostreduction.Blockchainhasthepotentialtoimpactbothgoals.Blockchainorsomevariationofdistributedledgershavethepotentialtoreducecostandimproveefficiencyintheoperationalandriskaspectsofbankingandatthesametimeimprovethetransparencyandauditabilityrequiredtodemonstratecompliance.Inthisreport,wewilldescribethecurrentbankingprocessesaswellasexpectedchangesoverthenextseveralyears.Banksarebeingdisintermediatedandarefacingincreasingregulatorypressureleadingtotheneedtoconsidersubstantivechanges.Thisreportfocusesonhowblockchainordistributedledgersmayhelpsolverealbankingproblemsandbeintegratedintheexistingbankingworld.Wealsodescribeatimelineandasupportingsetofservicesthatwillbenecessaryfordistributedledgerstobeasignificantelementwithintraditionalbanking.

UpcomingResearchBlockchain2.0:SmartContracts

ByScottDavid,J.D.,LL.M.,PrincipalConsultingAnalystSmartcontractsaresimplysharedprogrammablescriptsthatcanbeexecutedbasedonthetermsofanagreement.Smartcontractscanbenefitfromblockchainsecurity,time-stampsandtransactionverificationwithoutrequiringanintermediary.Thisrepresentstremendousdisruptiveopportunitiesaswellassomemajorchallenges.Aquestionwewilladdressishowsmartcontractswillscaleandhowwilltheymaybeintegratedintoexistinglegalandregulatoryenvironments?Forexample,whathappenswhenapartyinasmartcontracttransactiondisputestheclaim?Technicalproofmaybethere,buthowwillthisbeenforcedandrecognized?Inthisreport,wewilldescribesmartcontracts,theirsynergywithblockchainandsomeofthehurdlesthatmustbenavigatedtoprovideenterpriseswithreal-worldsolutions.We’llexaminewherethetechnologyandacceptanceofthetechnologyistodayandwhereweseeitmovingoverthenextseveralyears.Wewillalsoprovideasetofspecificrecommendationsastohoworganizationscaneffectivelyandefficientlymoveforwardwithblockchain-basedsmartcontractsandbepreparedtoactquicklywhenthetimeisright.

©2017TechVisionResearch–Allrightsreserved 6

DataArchitectureandGovernancePublishedResearchData–TheFundamentalsAreBroken

By:NoreenKendle,PrincipalConsultingAnalystTheworldhastransitionedfromanindustrialtoaninformationage,wherewehavebecomeextremelydependentoninformationalongwiththedataonwhichitstands.Withtherapidgrowthoftechnology,theworldcontinuestomovefartherawayfrom“hands-on”observation,operations,andmanagementoftherealworldtoutilizingthedatarepresentationoftherealworld.Ourdependencyondatahasgrownexponentially,whileourabilitytoidentify,understand,manage,andutilizedatabecomesmorechallengingovertime.Despiteallthethousandsoftoolsandtechnologiesmarketedas“fixes”forthedataissues,ourdatachallengescontinuetogrow.Ourgrowingdataissuesareonlythesymptomoftheunderlyingproblem–Thefundamentalsofdataarebroken.Inthisreport,wehaveidentifiedthebrokenfundamentalsofdataandfivebasicstepsorganizationscantaketoaddressthesebrokenfundamentals.Theseinclude:establishingthebusinesstodataconnection;usingabusinessblueprint;creatingadataoversightframework;establishinganenterprisedataconstructionpractice;buildingthedataassetmanagementinfrastructure;and,standing-upadataassetmanagementpracticefocusedonenterprisefoundationaldata.Intheend,iforganizationsdonotfixthefundamentals,theywillneverbeabletoeffectivelyclean,identify,integrate,manage,andutilizetheirdataassetsforevenbasicoperations,letalonetakeadvantageofthefullpowerofthoseassetsfortruebusinessintelligence,riskavoidance,predictiveanalytics,artificialintelligence,anddatamonetization.Informationistrulypowerful,butonlyifthedataisright.

FixingtheFundamentals—TheBusinessBlueprint

By:NoreenKendle,PrincipalConsultingAnalystMosteverythinginatypicalorganizationtodayisbasedonitsdatarepresentation:fromrecordingandoperationstopredicting,planning,reporting,aswellasdecision-making.Yetdatachallengeshavebecomeoneofthemostunderestimatedissuesorganizationsfacetoday.TechVisionhasfoundthatmanyorganizationsareinadysfunctionalcycleofdatachaoswheredataistypicallydisjointed,untrustworthy,redundant,large,andcomplex.Historically,datawasbelievedtobeatechnologycomponent,butthatfundamentalunderstandingofdataisflawed.Dataisarepresentationoftherealworld,it’sthings,events,andtheirrelationships.Thus,datatrulyisanimportantbusinessassetandnotatechnologycomponent.Thismisunderstandingofdataisatthecoreofourbrokenfundamentalsofdatathathasledtomanyofourdatachallenges.Inthisreport,weshiftthefocusfromdatasymptomstotherealproblem:thebrokenfundamentalsofdata.Specifically,thisreportaddressesthefirstoffivestepstotake,leveragingaBusinessBlueprinttoeffectivelyestablishasustainablebusinesstodataconnection.

©2017TechVisionResearch–Allrightsreserved 7

TheFutureofInformationSharing

ByFredCohen,PrincipalConsultingAnalyst

ThetensionbetweensharingandrestrictinginformationhasexistedsinceAdamandEvefirsttastedthatappleintheGardenofEden.Today,thevelocity,volume,variety,andveracityofinformationbeinggeneratedin,about,andbetweenorganizationsismakingthattensiontopofmindtoindividualsandorganizationsofallsorts.Informationsensitivityrangesfromoneextreme(Idon’tcarewhoknows)totheother(Ifthisgetsout,itcouldthreatenmysurvival).Whilemostinformationfallsbetweentheseextremes,understandingandconscientiouslybalancingtheneedforsecrecyandopennessacrossthecontinuumisrequired.Thisreportdiscussestheutilityofinformationbasedonhowwidelyitisknownandthestateofthepresentandlikelyfutureartinfindingthebalancebetweensecrecyandsharing.Specifically,organizationsshouldfocuson:

• Understandingthetypesandimportanceofinformationgathered,produced,stored,transmitted,andshared;

• Usingandsharinginformationeffectivelyandefficientlytosupporttheorganization’scollectiveactions;

• Havingproperprocessesforcontrolanddispositionoftheseinformationassets;• Preventinginformationoverloadcausedby“oversharing”;• Preparingforthebusinessandtechnologychangeswhichcanimpactthebalance

TechVisionCrossTalkReport:IdentityandDataGovernance

ByBillBonney,GaryRoweandNoreenKendle,PrincipalConsultingAnalystsModeratedbyTedRitter,CISSPWhataretheconnectionsbetweenidentityanddataintheenterprise?Whenoneprotectsidentity,theyareultimatelyprotectingdata:datathatisarepresentationoftheidentity.Unfortunately,asdiscussedinthisnewCrossTalkreportbyTechVisionResearchmostorganizationsdon’thavedatamanagementandevenwhentheydohavedatamanagement,theidentitydataisusuallyleftoutofthediscussion.AtTechVisionResearchwecontinuallyseedatamismanagementunderminingallaspectsofthebusinessfunction.AsNoreenKendlehasexperienced“datamess-upisequalopportunityacrossalltypesofdata,includingidentitydata.”Noreengoesontosay,“I’veseencompaniesoverwritebigtextfieldswithidentity-relatedinformationprimarilybecausetheydon’twanttostopandenhancethedatabaseschemaandstructures:thisincludescreditcardnumbers,socialsecuritynumbers,etc.”Obviously,thisisahugeprivacyissuebecausethefieldsarenotidentifiedasidentityfieldsandtheITstaffisoblivioustothesituation.

©2017TechVisionResearch–Allrightsreserved 8

BillBonneyspeaksfromexperiencebuildinganIdMpracticeashe“agreesthatoverloadingisanissue.”But,asBilllikestopointout,“It’snotjustoverloading,it’smakingassumptionsaboutwhatisinafieldandassumptionsabouthowthefieldisevaluatedandbeforeyouknowityouhavesub-processesbuiltuparoundafalselyvalidatedfield.”Thisestablishesafalsefoundationthateventuallycausestheentiretrustchaintobreak.AsBillstates,“inevitably,someonewillusethedatabasedonhowitwasfirstcreated(thefieldlabelofrecord).”Thisisasymptomofafargreaterproblem.ThereisahugeassumptionmadebyITstaffandtheidentitymanagementtoolstheyusethatthedatafieldsareaccuratelyrepresentingthedatastoredinthefield.Thisjustisn’tso!Giventhisrealityofidentityanddatamismanagementintheenterprise,thisreportfocusesonthefollowingkeyconcerns:• Theevolutionofidentitydataasitsowndomain• Theimpactofsilosonidentitydatamanagement• Thepotentialofvirtualdirectoriesasanidentitydatamanagementapproach• Theimpactofdatareuseonidentityandtheresultingauthenticitydecay• Identitydatagovernance:isbuiltonafoundationofquicksandTherearethingsorganizationscanbedoingtodaytoaddresstheseconcerns.Specifically,thisreportdiscussesafive-stepprogramforidentitydatagovernancebasedupontheteam’sexperienceworkingwithdataandidentityinF1000enterprises.

TheRiseofMachineLearning:ManagingtheOpportunities,HandlingtheThreats(New)ByDavidGoodmanandBillBonney,PrincipalConsultingAnalystsArtificialIntelligencehasgainedmassivetractionoverthelasttwo-threeyearsinthebusinessworldaswellasthroughpopularmedia.Theexpressioncoversawiderangeofapplicationareasandimpactsatamultitudeoflevels.Todayartificialintelligencefortheenterprisetranslatestomachinelearningwhichisabusinessopportunityandincreasinglyanecessityforautomatingcomplexprocesses,themanagementandanalysisofbigdataandasavitalextensiontocybersecuritymeasuressuchasfraudprevention.Whencombinedwithdistributedledgertechnologysuchasblockchain,formachinestoeffectivelyrunahighly-distributed,cloud-basedorganizationwithminimalhumanengagementorinterventionhasthepotentialtogobeyondsciencefictiontoawholenewreality.AsthemediainterestinAIspirals,managersandemployeesare,notsurprisingly,concernedthat‘intelligentmachines’willeventuallyrobthemoftheirjobsastheywillbelessexpensiveandmoreeffectivethantheyare.However,puttingasidethelonger-termpossibilitiesassociatedwithAI,aswithanylearningprocess,therearegenuineconcernsaboutthereliabilityofthematerialfromwhichamachinehasderiveditslearning.Inparallel,thereareunresolvedquestionsregardinganyliabilitiesassociatedwithdecisionsandeventsthatensuebecauseofamachine-learntprocessandhowtheycanberesolved.Wearealongwayfromthenightmarehumanvsmachineconflictsenvisagedinmanymoviesbutthetimehascometoappraisehowwemakethemosteffectiveuseofthetechnologythatisavailabletoustodayandoverthecomingtwo-threeyears.

©2017TechVisionResearch–Allrightsreserved 9

Thisreportcovers:• Layingthegroundworkforbecomingamoredata-centricorganization• Identifyingprojectswhichcreateproperpredictivemodelsthatsolverealproblems• Creatingadataenvironmentthatistrustworthyenoughforuseinmachinelearning• Creatingtheproperbalanceofmachineandhumandecisionmaking

UpcomingResearchFixingtheFundamentals–DataStrategy

ByNoreenKendle,PrincipalConsultingAnalystTogetanywhereonemustknowwheretheyaregoing.Similarly,adatastrategydefinesthedesiredstateforanorganization’sdataassets–theorganization’sdatavision.Yet,evenwithaformaldatastrategyinhand,manyorganizationsmakelittleprogressachievingthisvision.Mostdatastrategieslackamethodtoachievethedatavision.Thisleadstoacontinuouscycleofdatachaos.ArealisticdatastrategybeginswithaDataOversightFrameworkdefiningthepath,theplanandthedatainfrastructurenecessarytoachievethedatastrategy.Thisreportoutlinestheprocessnecessarytoachievearealistic(realworld)datastrategy,startingwithaDataOversightFramework.Thisreportcovers:• Howtodefineanenterprisedatavisionandknowwhatonelookslike• HowtodevelopaDataOversightFrameworkandtheinfrastructuretosupportit• HowtocombinetheDataOversightFrameworkanddatavisiontoestablishasuccessful,

sustainableanddefensibledatastrategy• ExperiencedefiningandimplementingdatastrategiesatFortune500companies

FixingtheFundamentals-DataAssetManagement

ByNoreenKendle,PrincipalConsultingAnalystAsdiscussedinFixingtheFundamentals–TheBusinessBlueprint,itiscriticalthatorganizationsgetthedataright.However,gettingthedatarightisonlyhalftheformulatofixingthefundamentals,theotherhalfiskeepingthedataright.Asdiscussedinthisgroundbreakingreport,datais“organic”inthatitcontinuestodecomposeanddeteriorateasitages.Aswithanyotherbusinessasset,theorganizationmustmanageitsdataassetsandthisrequiresbuildingaDataAssetManagementstructure.ThisreportdefinesanddiscussesaDataAssetManagementFrameworkasanecessarysteptokeepingthedataright.ADataAssetManagementFrameworkincludesthemethods,processes,andprocedure,andtoolsrequiredtomanagedataasanassetanditutilizesthedatainfrastructuredevelopedfromtheorganization’sBusinessBlueprintanditsdatadesignpractice.Thisreportcovers:

©2017TechVisionResearch–Allrightsreserved 10

• Establishingthedifferencebetweengettingthedatarightandkeepingitright• ThestepstocreatingaDataAssetManagementFrameworkincludingthetoolsrequiredto

managedataasastrategicbusinessasset• ExamplesofsuccessfulDataAssetManagementFrameworks• Lessons-learnedandbestpracticesestablishingDataAssetManagementFrameworksatFortune

500companiesFixingtheFundamentals–EnterpriseFoundationalData

ByNoreenKendle,PrincipalConsultingAnalystMostpeopleagreethatdataisanimportantbusinessassetandshouldbemanagedassuch.Aswithanyasset,itsvalueisdirectlyproportionaltotherigorthatmustbeappliedtoproperlymanagetheasset.However,alldatadoesnothaveequalvaluetotheorganizationanddeterminingthisvalueisbecomingincreasinglydifficult.Thisisprimarilybecausethedifficultyofunderstanding,governing,managingandfindingthesedataisincreasingexponentiallyasthevolumesoforganizationaldatagrow.Thecostsformostorganizationtoproperlymanageallitsdataisnotpractical.Therefore,organizationsmustdetermineallitsdata’svalueandthenfocusonmanagingitshighestvaluedatafirst.Thisreportdescribesamethodforunderstandinganddeterminingthedifferenttypesofdatawithintheorganization.Thisunderstandingmaybeusedtodifferentiatethelevelofrigornecessarytomanage,govern,architect,secureandutilizethesedata.TheprocessbeginswithidentifyingEnterpriseFoundationalData(EFD)asatypeofdatathatisthecoredataoftheorganization.ThisreportfocusesontheEFDanddescribeshowonemayidentifythistypeofdataandthemethodstomanageandgovernit.Thisistheonlywaytheorganizationmaycost-effectivelymanageitsdataasakeybusinessasset.Thisreportcovers:• Howtoassessthevalueofdatatotheorganizationinthefaceofincreasingdifficultyto

understand,governandmanagedata• Howtotriagedataassetstodeterminethehighestvalueassetstofocusonfirst• Howtoclassifythedifferenttypesofdatawithintheorganizationstartingwithdefiningand

identifyingtheorganization’sEnterpriseFoundationalData(EFD)• Bestpracticesandreal-worldexperienceidentifyingEFDandFortune500companies

FixingtheFundamentals–DataDesignPractice

ByNoreenKendle,PrincipalConsultingAnalystEnterprisesfaceaterribledatadesignsituation:theircurrentdatasystemsareinastatethatisoftentoodifficultandtooexpensivetocorrectorinmanycasesthatisimpossibletochange.AtTechVisionResearchourexperienceshowsthatratherthancontinuallychasingthedatachallengesofexistingsystemsit’softenbetterfortheenterprisetoproactivelyfocusonthearchitectureanddesignoffuturedatasystemswiththegoalofgettingthedatarightinthefirstplace.Thisapproach

©2017TechVisionResearch–Allrightsreserved 11

requiresachangeintypicaldataarchitectureanddesignapproachesusedtoday.Whenitcomestodatadesign,unlesswechangehowwearedoingthings,wewillcontinuetogetthesameresults.Thereportdefinesanddiscussesaproactivedatadesignpracticethatcoverstheidentification,architecture,design,anddeploymentofdatastructures/systemsthroughouttheorganizationincludingtheorganization’smeta-information.ThisprovenpracticeusestheBusinessBlueprintasthefoundationforalltheorganization’sdataanddatastructurestoformaholisticdatainfrastructuretyingalltheorganizationsdatasystemstogether.Asdiscussedinthisreport,usingtheBusinessBlueprintasthefoundationandapplyingthedatadesignpracticethroughouttheenterpriseestablishesanappropriatedatainfrastructuretoassuredataconsistencygoingforward.ThisdatainfrastructuremaybeutilizedbyDataIntegration,DataAssetManagement,InformationSecurity,andBusinessIntelligencefunctionswithintheorganization.Developingthisdatainfrastructureiscriticalforintegrating,managing,securingandgainingintelligencefromtheorganization’sdataassets.Withouttheproperdatainfrastructure,doingthisisdifficultatbestandmorelikelyit’simpossible.Thisreportcovers:• Howtomakethedecisionwhentocontinuetoinvestinlegacydataarchitectureanddesignand

whentoshiftthefocustofuturedatasystems• Howtochangedatadesignpracticesthatareentrenchedintheorganizationalzeitgeistand

retooltogetthedataright• Howtodevelopaproactivedatadesignpracticecoveringtheidentification,architecture,design

anddeploymentofdatastructures/systems• HowtousetheBusinessBlueprintasthefoundationforachievingenterprise-widedata

consistency• Usingthedatainfrastructureasavehicletointegrate,manage,secureandleveragethe

organization’sdataassets

PrivacyandDataProtectionPublishedResearchEnterprisePrivacyGuidelinesinaChangingRegulatoryEnvironment

ByJillPhillips,J.D.,PrincipalConsultingAnalyst

Facedwithallthedifferentprivacylaws,culturalbackgrounds,businessneedsandexpectations,andcompetingresources,thequestionbeingaddressedinthisreportishowtobuildaprivacyprogramthatdeliversdataprotectiontoallyourcustomers,yourbusinesspartners,andyourworkforce.Thisreportisdesignedtoprovideanexperienced-basedframeworkforbuildingaprivacyprogramorreviewinganexistingprivacyframework.Webreakdownenterpriseprivacyprogramsinseveralstepsandposeasetofquestionstohelpframeyourenterpriseprivacyprogram.

©2017TechVisionResearch–Allrightsreserved 12

Inleadingprivacyprogramsforthepast15yearsatGeneralMotors,Chevron,andDell,JillPhillipshasdevelopedapragmaticapproachtobuildingandimprovingprivacyprogramsthatwemodelinthisreport.Leveragingthesuccessinbuildingandleadingprivacyprogramsovertheyears,,shehasdistilledsomelessonslearnedintoanoutlinewithfourbasicsteps—areferencearchitectureforbuildingorimprovingaprivacyprogram.

PrivacyBeyondCompliance

ByScottDavid,J.D.,GaryRowe,JillPhillips,J.D.,PrincipalConsultingAnalystsPrivacyisbroken,andpeopleandbusinessesarepayingtheprice.Thecostsofprivacycompliancekeepgoingup,whiletherealbenefitstoindividuals(suchascustomers,employeesandindependentcontractors)keepgoingdown.ThisfoundationalresearchreporthelpsITexecutivesframethealready-too-broad“privacy”discussiontomorecost-effectivelydealwithcompulsoryprivacycomplianceissues.Thisreportexploreshowcompaniesmaygetmaximumleveragefromtheirprivacycompliancecosts,anddelivermorebenefittotheircustomers,partners,shareholdersandemployees.“Privacybeyondcompliance”isaninvitationtoembraceprivacycompliancecostsandeventoincuradditionalcostsinthoseorganizationalsettingswhereanounceofprivacypreventionmaybeworthapoundofsecurityorpotentialliabilitycure.InthepropercircumstancesanROIispossiblethatpotentiallyconvertsprivacyfromanisolatedregulatorycostcenterintoanintegratedprofitcenterforthewell-managedenterprise.Inthisreport,TechVisionResearchexploresthewaysinwhichprivacy-relatedsunkcostscanhelptoimproveoverallenterpriseinformationsystemintegrity.ThisreportsuggeststhattheROIfromprivacyexpensescanbeimprovedbythoughtfulleverageofunavoidableprivacy-relatedcosts,andthereportidentifiesmorethanadozenexamplesofsituationsinwhichprivacy-relatedcostscanbereasonablymanagedasa“leveragedinvestment”towardimprovingsecurityand/ormitigatingotherenterpriserisks.Inthisreport,wealsosuggestthat“privacy”challengesareasymptomoftheunderlyingillnessofenterpriseinformation“leakiness”causedbynetworkcomplexity.Pluggingtheseleaksrequiresexpendituresdirectedtoimprovethereliabilityofboththetechnology,thepeopleandtheprocessesineachenterprisenetworksystem.Webelieveenhancingthis“socio-technical”systemreliabilityyieldsadditionalbenefitsbyimprovingsecurityandmitigatingamultitudeofenterpriserisks.Thisreportcovers:• Therelationshipbetweenprivacy-relatedsunkcostsandoverallenterpriseinformationsystem

integrity• Thevalueoflookingatprivacyissuesthroughthebroaderenterpriserisklens• Theopportunitytoconvertprivacycostsintopositivebusinessoutcomes• Thevalueoffocusingonsocio-technicalsystemreliability• Integratingprivacycostsintotheoverallenterpriseriskplanning

©2017TechVisionResearch–Allrightsreserved 13

TheNewEuropeanPrivacyandDataProtectionRegulation—ComplianceorConsequences

By:DavidGoodman,D.Phil.,PrincipalConsultingAnalystTheEUwantstobuildasinglemarketfitforthedigitalagebytearingdownregulatorywallsandmovingawayfrom28nationalmarketstooneinwhichthefreemovementofpersons,services,andcapitalisensured.Tocomplicatematters,the15-year-oldSafeHarbouragreementbetweentheEUandtheUSisnolongervalidbecauseitdoesnotoffersufficientprotectiontothefundamentalrightsofEuropeans.UpdatestotherulesrelatingtodataprotectionandprivacyinEuropeaswellastherestoftheworldarelongoverdue.NewEuropeanlegislationwillreplacethecurrentchaosinwhicheachEUMemberStatehasitsownseparatedirectivewithabravenewworldinwhichtherewillbeonelawacrosstheentireEUimplementingstiffpenaltiesforviolations.ThenewlegislativelandscapewillrequireanybusinessoperatinginEuropeincludingUSmultinationalstomakeconsiderablechangestotheirprivacyanddataprotectionpoliciesandstrategieswithinthenexttwoyearsinadvanceofthelegislationcomingintofullforce.ThisdocumentexaminesthecurrentsetofrulesandtheproposedlegislationandwhatthiswillentailforEuropeanandUSbusinessesresponsibleforanydatarelatingtoEUcitizens,withrecommendationsonwhatactionsshouldbetakenassoonaspossibletoensurecomplianceratherthanfacetheconsequences.

EnterpriseInformationProtectionBy:FredCohen,PhD.,PrincipalConsultingAnalystEnterpriseinformationprotectionstartsandendswiththebusiness.Itinvolvesunderstandinghowthebusinessworksandwhyitworksthatway,turningthatunderstandingintoasetofdefineddutiestoprotect,andcarryingoutthosedutiestoaffectreasonableandprudentoperationofthebusiness.Becauseenterpriseshavemanymovingparts,structuringaprotectionprogramrequiresanarchitecturalcontexttobeeffectiveandefficient.Thisreportidentifiesthestructureofsuchanarchitectureandtheelementitnormallycontains.Takingthisasastartingpoint,detailstypicallygetfilledinatincreasinglevelsofdetailasthespecificsoftheneedsoftheenterprisearestructured.Akeythingtounderstandaboutthisarchitectureinspecificandenterpriseinformationprotectioningeneral,isthatitpermeatestheentireenterprise.Theboardandtopmanagementareresponsiblefordefiningthedutiestoprotectbecausetheyunderstandthebusinessandareultimatelyresponsiblefortakingriskstoreaprewards.Todothiswell,therisksandrewardsmustbeunderstoodbythedecision-makers,andnotmerelyoutlinedbysurrogates.Topmanagementisresponsible,allthewaytotheboard,responsibleofanyattempttodelegatetheactivities.Oncedutiesarewelldefinedandriskmanagementdecisionsaremade,operationalresponsibilitymustbecarriedout,andlikeanyothersuchsituation,controlmustbeexercisedresponsiblyortheprotectionprogramandtheenterprisewillgetandremainoutofcontrol.Likeacarwithoutadriver

©2017TechVisionResearch–Allrightsreserved 14

(orcomputer),itwillcareendowntheroadandeventuallytherewillbeaccidentswithsubstantialconsequences.Evenifanenterpriseoutsourcesallitsinformationtechnology,thearchitecturalrequirementsanddutiestoprotectremainandmustbeactivelypursuedandproperlymanagedtoavoidtheliabilityandthebusinessconsequencesofprotectionfailures.Atfinerlevelsofdetail,theprotectionprograminvolvesmanydifferentelements,butattheendoftheday,thoseelementsultimatelygobacktoprotectingtheutilityofcontenttoassuretheinformationoperationssupportingandenablingbusinessfunctionsmeetthebusinessneeds.

NextGenerationEnterpriseIT&InnovationPublishedResearch

TheEndofEnterpriseArchitectureandITasWeKnowITByJohnMellarsandGaryRowe,PrincipalConsultingAnalystsCorporateITingeneral,andEnterpriseArchitecture(EA)hasnotevolvedwiththetimes.Theproliferationofthecloud,theascentofMillennialstoITleadershippositionsandtheacceleratingpaceoftechnologychangearedrivingtheneedforfundamentallynewapproachestoEAandIT.Enterprisesmustbecomemoredynamicandflexible,whileenablingdisruptiveimprovementsorriskenterpriseITrapidlybecomingirrelevant.Thereisapervasivemovementtothecloudandenterprisesareleveragingtheflexibilityandcostofadvantagesitoffers.SoftwareasaService(SaaS),PlatformasaService(PaaS),andInfrastructureasaService(IaaS)arechangingthewayITworksandtheyofferindependenceatthebusiness-unitlevel;independencethatthreatenstheentiremissionofIT.ITandEAdon’tneedtobeinthemiddleofeverybusinessunittechnologydecision,whichis,ofcourse,whyEAwascreatedinthefirstplace.LegacytechnologygovernancemodelssuchasEAdon’tfullytranslatetothisnewwayofusingcloud-basedservices,rapiddeployment,microservicesandnewmodelsforapplicationdevelopmentoperations.Tounderscorethispoint,vendorsnowcompetebasedonthefunctionsandcapabilitytheyofferlinkedtoorganizationalbusinessrequirements,notbasedonenterpriseITandtechnologygovernancestandards.ThisapproachcompletelysidestepsprocessesestablishedbytheCIOthroughitsITandEAteams.TheresultissignificantorganizationalfrictionandoftenEAspecifically,andIT,ingeneral,areincreasinglyseenbythebusinessunitsas“businessprevention.”ThegoodnewsisthereisastrongfutureforEnterpriseArchitectsandtheCIOteamtosupporttheenterprisemovetowardsanewcloud-basedITservicesmodel.Asdiscussedinthisreport,organizationsshouldbetakingseveralstepsincluding:• Empoweringbusinessunitstousetechnologyasameansofachievingsuccesswithfull

accountabilityfortheresults• Movingtowardsapointwheretheorganizationthinks“CloudFirst”

©2017TechVisionResearch–Allrightsreserved 15

• PhasingoutEnterpriseArchitecturewithinITascurrentlydefinedgivenbusinessfrictionandchallenges

• RevampingcentralITtoprovideforEnterpriseentityneedssuchasprocurementofservices,security,disasterrecovery,datainterchange,andservicemanagement

• EstablishinganewChiefInnovationTechnicalOfficer(CITO)roletoleadinnovationcentersofexcellencetosupportthebusinesses

WhatisEnterpriseArchitectureinthis“newandchanged”environment?Itiswhatwecallthe“cloudification”ofEA.Asdiscussedinthisgroundbreakingreport,enterprisearchitectsaremorphingintoenterpriseITProductManagers(EIPM).Theconceptisoptimizingthechoiceofproductsandservicesfortheenterprisetooptimizeflexibility,businessutilityandspeedofdeployment.ThisreportdescribesthatpathtowardsthenextgenerationofIT.

HowDoWeAccelerateEnterpriseInnovationinaCultureofRiskAversion?

ByFredCohen,PhD.,PrincipalConsultingAnalystAtTechVisionResearch,webelievethereisafundamentalrequirementforgreaterinnovationtomaintain(orestablish)businessrelevancyforinthemodernenterprise.Butthisisoftendifficultinlargeorganizationsastheyareinnatelyriskaverse.Thisdifficultyleadstoasloweradoptionofchangeandaculturethatisresistanttoinnovation.Butfailuretoinnovatecanleadtostagnationandultimatelyobsolescencethatmaybeunrecoverable.Thisreportdiscussesstrategiesforinnovationthatremovethebarrierstoproductivitywithoutintroducingunduerisktothelargerenterprise.Ofcourse,thereisnoonesizefitsallsolution,sowedescribeaframeworkforevaluatingwhichinnovationstrategiesaremorelikelytobeappropriateindifferentcircumstances.Wealsodescribeinvestmentstrategiesthatmodelappropriateinnovationinvestmentbasedonthewillingnesstoaccommodaterisk,theappetiteforchange,andthecorporatecultureinplay.Acceleratinginnovationisbestdoneusingasystematicapproach,startingwithaboard-leveldecisionaboutthestrategicintentandvalue.Budgetfollowsthisunderstandingandtop-levelbuy-in,andamixedstrategyisthendeveloped.Fromthere,executioninvolvesinstigatingculturalchangesandemployingamixofactivitiesthataremeasuredovertimetoachievethegoalsandadaptasneeded.Wealsodescribebasicguidelinesforinnovationinvestmentthatbalancethedisruptivevalueofinnovationagainstcurrentoperationalandbusinessneeds.

AnITOrganizationalStructurefortheFutureByJohnMellars,PrincipalConsultingAnalyst

“AnITOrganizationalStructurefortheFuture”continuesthediscussionwebeganintheTechVisionreport“EndofEAandITasWeknowIT”andaddresses,inamoredetailedfashion,foundationalconceptsofaproposedorganizationstructure.Inthisreport,weintroducetheroleofBusinessIntegratedDevOps(BIDevOps)teams,intowhichwesuggesttransferringportionsoftheexistingcentralITorganization,thusdissolvingasignificantpercentageofthelegacyITorganizationintothevariousLineofBusinessunits.WealsofurtherelaborateontheroleoftheChiefInnovationTechnologyOfficerthatweintroducedinthepreviousreportanddiscussthestreamlinedcentralITorganizationourCITOwouldbetaskedtolead.

©2017TechVisionResearch–Allrightsreserved 16

Tobringtheseconceptsforward,weestablishfiveprinciplesforthistransitionanddevelopatlengththereasoning,newroles,andimportantcaveatsfortheorganizationaltransformationweadvocate.WebelievetheresultofthistransitionisamoreagileITcapabilitythatismoreresponsivetothebusiness,yetabletoleveragetheyearsofinstitutionalknowledgeandgroundinginthekeyprocessesresponsibleforthegovernanceofITassets.WebelieveitisimperativethatITisleveragedbythebusiness,andforthebusiness,andwethinkthismodelprovidesanexcellentblueprintforundertakingthetransformationaljourney.

WhyLargeTechnicalProgramsFailandHowtoMitigateRisk(New)

ByJoeTeplitz,PrincipalConsultingAnalystWhydosomanylargetechnicalprogramsfail?Atbest,failuremeansnoeconomicreturn;atworst,itmeanssignificantincreaseinreputational,customer,operational,andbusinessrisk.Often,thefailureissobadthatthebestriskmitigationtechniqueiswritingofftheentireproject.Infinancialservicesorganizations,majorprogramsincludeaverylargeITcomponent.Unfortunately,ITisgenerallyundisciplinedaboutdevelopingandstatingaccuratevalueorpaybackmetricsforitsownprograms.Thislackofdisciplineinjectssignificantriskintotheoverallprogram,evenwhentheprogrammanagementfunctionisindependentofIT.ThisreportinvestigatesItscontributiontoprogramriskandidentifiesthekeyriskfactorsorganizationsmustaddressforprogramsuccess.Foreachriskfactor,thereportidentifiestherisktype,itsimpactonoverallrisk,mitigationstepsandbestpracticestoreducetherisk,aswellaskeymetricsformeasuringthisriskreduction.Thisreportcovers:• Thefundamentalsoflargeprogramfailure• Establishingaccuratevalueorpaybackmechanismsforprograms• Instillingdisciplineintotheprocesstoreducerisk• Keysuccessfactorsandmetricstoachievelargeprogramsuccess

IdentityManagementandSecurityPublishedResearchTheFutureofIdentityManagement

By:GaryRowe,DougSimmons,DavidGoodman,D.Phil.,BillBonney,PrincipalConsultingAnalystsIdentityManagementisatthecoreofthesecureITinfrastructurethateverycompany,governmentagencyandinstituteofhighereducationstrivestoachieve.Itisoneofthemostfundamentalbuildingblocksinsupportofanylevelofcommunication,collaborationorcommercewithinanorganizationoracrosstheInternet.

©2017TechVisionResearch–Allrightsreserved 17

Despitethedecadesofinvestmentandhardwork,manyorganizationsfacegreateridentitymanagementchallengestodaythantheydid15yearsago.Today,manyorganizationsstrugglewithahodge-podgeofsilo’d,poorlyornon-interoperableIAMfunctionsthatareimpossibletogovernproperlyandarehinderingproperriskmanagement.Thishighlyactionablereportsupportsourclientsastheydevelopfive-yeartechnologyinfrastructureplans.Inthisreport,wemakespecificprojectionsastowherewebelieveIdentityManagementwillbegoingoverthenextfiveyearsandwedescribeamodelforidentityabstractionthatprovidesanextensibleservicesorientedarchitecture.ToprovideourclientswiththemostcomprehensiveviewofIdentityManagement,weaugmentourownexpertisewiththeinsightsofwhatweconsidertobethetopthoughtleadersandindustryexpertstodeliverthemostcomprehensiveperspectiveontheFutureofIdentityManagement.

Blockchain-basedIdentityManagement

By:DougSimmonsandGaryRowe,PrincipalConsultingAnalystsThisisthesecondofourseriesofblockchain-relatedresearchreportsanditsetsafoundationfororganizationstounderstandhowblockchainordistributedledgerscanfitwithinanidentitymanagementecosystem.Theconvergenceofidentitymanagementandblockchainprovidesanopportunitytolookatblockchain-basedidentitymanagementfromtwoprimaryperspectives;firstfromanidentitymanagement-centricviewandsecond,fromtheperspectiveofhowblockchainhasevolvedtosupportabroadrangeofidentitymanagementusecases,includingpeople,applicationsanddevices.Thisreportfocusesonanext-generationidentityecosystemthatprovideseachpersonasinglesetofidentitycredentials,availableforuseacrossallelectronicservicesencompassinggovernment,consumer,andcorporateentities(i.e.,BringYourOwnIdentity,orBYOI).Blockchainhasthepotentialtobeavaluablepartofthisecosystembyenablingtherecordinganddistributionoftrustedidentitiesandassociatedinformationwithoutrequiringrelianceonaspecificcentralizedthird-partyauthority.

PuttingIdentityintoContext:NextGenerationIAM

By:DavidGoodman,D.Phil,PrincipalConsultingAnalystIdentityandaccessmanagement(IAM)hasmaturedfromitsrootsinbasicauthentication,authorization,andprovisioningtothepointwherecontextandrelationshiphaverapidlybecomeessentialfeaturesindeliveringonthepromiseofIAM.Asthecornerstoneofenterprisesecurity,context-basedidentitymanagementishowrisksandthreatsareassessedandmanaged,aspartofanoverallbusinessdigitaltransformationthatalsoincludesamoresophisticatedapproachtomarketingandbrandloyalty.Therearemanydriversforthisurgency,amongwhicharetheproliferationofCRMinformation,securityandIoTdataaswellassocialmediabusinessesthatarebuiltoninformationsharing.Inadditiontowhichtheinformationstoredatscaleinthecloudissomuchgreaterthanwhatanysingleorganizationhas.Withoutsomeformofcontextualization,thesemassivedatasourcesdon’teasilyintegratewithtraditionalIAMdata,whichlimitsitsusefulnessandtheabilitytobuildapplicationsthattakeadvantageoftheoverallproliferationofinformation.

©2017TechVisionResearch–Allrightsreserved 18

Almosteverycloud-andpremise-basedidentityvendoraswellasmostsecurityvendorsTechVisionResearchhasinterviewedareeithercommittedtoorarealreadyinvestingheavilyincontext-and/orrelationship-basedidentitymanagement.Simplyput,anidentitywithcontext,evenminimalcontext,isfarmorevaluableandusefultoanorganizationthanrawidentityinformation.Inthisreport,wedigdeeptoclearlydefinewhatthisis,whothemajorplayersare,theimpactoninfrastructuretechnologies,thefuturedirectionandprescriptiverecommendationsandnextstepforTechVisionResearchclients.Thisreportcovers:• Therealityofcontext-basedIAMandthevaluepropositionfortheenterprise• Thecontext-basedidentitymanagementecosystem:todayandtomorrow• TechVisionResearch’sshortlistofcontext-basedIAMvendors• Tenstepsanenterpriseshouldtaketobestleveragecontext-basedidentitymanagement

OpportunitiesinEuropewithElectronicIdentificationandTrustServices

By:DavidGoodman,D.Phil.,PrincipalConsultingAnalystTheworldwidefragmentationofelectronicidentitieshascaughttheattentionofmanygovernments,whicharetakingacloserlookatdevelopingamoreunifiedapproach.Asregulationsemerge,EuropeisleadingthewaythroughtheadoptionoftheElectronicIdentificationandTrustServices(eIDAS)Regulation.Overthecomingtwoyears,asdifferentaspectsoftheregulationcomeintoforce,eIDASwillhavetremendousimpactsonmostaspectsofelectronicbusinesstransactionsinEuropewhichpresentsopportunitiesforcostsavings,efficiencies,andcompetitiveadvantagebothforEuropeancompaniesaswellasUSmultinationalsoperatinginEurope.ThisdocumentdetailsthenewlegislationandprovidesanillustrationfromthebankingandfinancecommunityoutliningtheopportunitiesandobstaclesfacingthisindustrysectoralongsideTechVisionResearchGuidance.WealsoprovideadditionalmaterialexplainingthebackgroundtothecurrentinitiativesfrombothEuropeanandUSperspectives.

TechVisionCrossTalkReport:IdentityandDataGovernance

ByBillBonney,GaryRoweandNoreenKendle,PrincipalConsultingAnalystsModeratedbyTedRitter,CISSPWhataretheconnectionsbetweenidentityanddataintheenterprise?Whenoneprotectsidentity,theyarereallyprotectingdata:datathatisarepresentationoftheidentity.Unfortunately,asdiscussedinthisnewCrossTalkreportbyTechVisionResearchmostorganizationsdon’thavedatamanagementandevenwhentheydohavedatamanagement,theidentitydataisusuallyleftoutofthediscussion.

©2017TechVisionResearch–Allrightsreserved 19

AtTechVisionResearchwecontinuallyseedatamismanagementunderminingallaspectsofthebusinessfunction.AsNoreenKendlehasexperienced“datamess-upisequalopportunityacrossalltypesofdata,includingidentitydata.”Noreengoesontosay,“I’veseencompaniesoverwritebigtextfieldswithidentity-relatedinformationprimarilybecausetheydon’twanttostopandenhancethedatabaseschemaandstructures:thisincludescreditcardnumbers,socialsecuritynumbers,etc.”Obviously,thisisahugeprivacyissuebecausethefieldsarenotidentifiedasidentityfieldsandtheITstaffisoblivioustothesituation.BillBonneyspeaksfromexperiencebuildinganIdMpracticeashe“agreesthatoverloadingisanissue.”But,asBilllikestopointout,“It’snotjustoverloading,it’smakingassumptionsaboutwhatisinafieldandassumptionsabouthowthefieldisevaluatedandbeforeyouknowityouhavesub-processesbuiltuparoundafalselyvalidatedfield.”Thisestablishesafalsefoundationthateventuallycausestheentiretrustchaintobreak.AsBillstates,“inevitably,someonewillusethedatabasedonhowitwasfirstcreated(thefieldlabelofrecord).”Thisisasymptomofafargreaterproblem.ThereisahugeassumptionmadebyITstaffandtheidentitymanagementtoolstheyusethatthedatafieldsareaccuratelyrepresentingthedatastoredinthefield.Thisjustisn’tso!Giventhisrealityofidentityanddatamismanagementintheenterprise,thisreportfocusesonthefollowingkeyconcerns:• Theevolutionofidentitydataasitsowndomain• Theimpactofsilosonidentitydatamanagement• Thepotentialofvirtualdirectoriesasanidentitydatamanagementapproach• Theimpactofdatareuseonidentityandtheresultingauthenticitydecay• Identitydatagovernance:isbuiltonafoundationofquicksandTherearethingsorganizationscanbedoingtodaytoaddresstheseconcerns.Specifically,thisreportdiscussesafive-stepprogramforidentitydatagovernancebasedupontheteam’sexperienceworkingwithdataandidentityinF1000enterprises.

GettingtoKnowYourCustomers:TheEmergenceofCIAMBy:DavidGoodman,D.Phil.,PrincipalConsultingAnalyst

Tenyearsago,identityandaccessmanagement(IAM)solutionswererarelydeployedbeyondthecompanyfirewall,providingpermissionsandaccessrightstoenterpriseresourcestoemployeesandcontractors.Whenavailable,themanagementofcustomerandpartneraccesstoagenerallylimitedsetofresourceswasoftenpoorlycoordinated.Today,however,averydifferentsocial,technologyandbusinessenvironmentdemandsthatenterprisesmaketheircustomers’onlineexperienceassleekandpersonalizedaspossible.Andtodothis,enterprisesareembracinganewbreedofconsumerorcustomeridentityandaccessmanagement(CIAM)solutionsfromtheirIAMvendors.

TheinvestmentandcommitmenttoCIAMarebeingdrivenbyanever-increasingsophisticationofcustomerexpectationintermsofa‘joined-up’userexperienceandreal-timeavailabilityofrelevantresourcesavailableanywhere,anytimeandfromanydevice.Alongsidetheneedtoprotectthe‘disappearingperimeter’withadequatesecurityismeasuredtheneedtoaddresscompetitive

©2017TechVisionResearch–Allrightsreserved 20

advantageandmaintaincustomerloyalty.Boostingtransparencybetweenmarketingandlinesofbusinesshasthepotentialtodeepenthecustomerrelationship.

Inthisreport,weinvestigatethisemergingtrend,whatthemajorplayersaredoing,andwhatshouldbethenextstepsforTechVisionResearchclients.Thisreportcovers:• TheCIAMvaluepropositionandbusinessrationalefortheenterprise• GettingthebalancerightbetweenenterpriseIAM(EIAM)andCIAM• TechVisionResearch’sshortlistofCIAMvendors• FivestepsanenterpriseshouldtaketobestleverageCIAM

MachineLearningandArtificialIntelligenceonBigDataforCybersecurity(New)

By:FredCohen,PrincipalConsultingAnalyst

Theuseofmachinelearningandartificialintelligenceforcyber-securityarenothingnew.Buttheavailabilityoflargerdatasetsandtheevolutionoftechniquesapplicabletobigdatahaveproducedanewgenerationofsystemsthatimproveefficiencyandutility.Theneedforfargreaterscalebroughtaboutbythedramaticincreaseinthenumberofusers,uses,andsystemsinvolved,hasdriventhedevelopmentofmachinelearningandartificialintelligenceforcyber-security.Thebasictechnologicalchangesinvolvemathematicalalgorithmsthatexaminelargedatasetscontainingknownbadandknowngoodsamples.Thesemethodscreateequationsthatclusterknown“good”and“bad”samplesanddifferentiatethemfromeachother,thenapplythosesameequationstonewsamplestoclassifythemas“good”or“bad”.Thiscanthenbeappliedtoanyofawiderangeofproblems,includingmanyofthoseofcyber-security.Theenterprisebenefitsoftheseemergingtechnologiesareeconomiesofscale,efficiencyoflabor,anddetectioninareasnotpreviouslyaddressed.Thisreportdiscusses;(1)thebasicsofthesetechniques,(2)thewordsusedtodescribethemandwhatthosewordsmean,(3)thelimitations,benefits,andcostsofthesetechniques,and(4)theirapplicationtoCybersecuritytodayandintothefuture.Itthendiscussesproducttypesemerginginthemarketsandthecurrentandlikelyfutureutilityofapplyingtheseproducttypestoenterprises.Inthisreport,weinvestigatethisemergingtrend,andwhatshouldbethenextstepsforTechVisionResearchclients.

UpcomingResearchIdentityofThings(IDoT)

ByBillBonneyandGaryRowe,PrincipalConsultingAnalystsTechVisionidentifiedtheInternetofThings(IoT)asamajortrendimpactingIAMinourFutureofIdentityManagementresearchreport.ThisreportprovidesmuchdeeperassessmentofhowidentitymanagementsystemsshouldembraceanddirectlysupportIoT-associatedidentity.TheIdentityofThingsshouldbeamajorconsiderationformostenterpriseidentityprogramsandthegoalofthisreportistobetterprepareourclientstonavigatethisdynamiclandscape.

©2017TechVisionResearch–Allrightsreserved 21

Thisreportcovers:• Scale:IoTintroducesfargreaterobjectstobemanaged• Security:IoTintroducesnewchallengesinidentifyingeasilycompromised“dumb”devicesnew

threatvectorsthatmustbeassessedandmitigated• Privacy:majorconcernsinexposingpotentiallysensitivedata• Context:whilethefocusofIDoTisdeviceidentity,theseidentitiestobeassociatedwithowners,

vendorsandentitlements• Value:beyondtheoperationaldetailstocreate,enableandmaintainIDoTatscale,thesedevices,

whenleveragedcorrectly,createnewopportunitiestogoin-depthwithcustomerneedsandproductcapabilities/usage

• ProsandconsofdifferentapproachestoIDoTincludingtradeoffsofbuilding/usingaseparateIDoTvs.leveragingexistingIAMsystems

• FuturetrendsinIDoTincludingtheimpactofblockchain-basedproductsandservices• Majorcurrentandexpectedmarketplayers• RecommendationsandtimelineforEnterpriseIT

TheCloudificationofIdentity—IDaaSMarketOverview

By:GaryRowe,PrincipalConsultingAnalystThetimeisrightformostorganizationstoconsidermovingsome,orall,oftheiron-premiseidentitymanagementtoanIdentityasaService(IDaaS)model.Thecombinationofapervasivemovementtothecloud,alargelydisappearingperimeter,theproliferationofIoTdevices,theneedtointegrateexternalidentities,therecognizedvalueofcontextualidentity,themovementtodecentralizedidentityandtherequirementforaflexibleITinfrastructureareallcontributingtothismovementtoIDaaS.ThisreportdescribestheIDaaSvalueproposition,thecurrentstateofIDaaSaswellasthevendorlandscape.Sincemostorganization’sIAMisnottotallycloud-based,we’llexamineco-existenceandmigrationpathsaswellastypicalmigrationplanningtimeframes.We’llalsoconsiderkeyenterpriseIDaaSrequirementsinlightofmajorvendorofferingsandwillincludeourIDaaSvendorshortlistinthisreport.Formostorganizations,itisn’tiftheywillmovetoIDaaS,itiswhenandwe’llprovidearoadmapguidanceforthistransition.

Banking,IdentityandtheRegulators(New)By:DavidGoodmanandRhomaiosRam,PrincipalConsultingAnalystsOverthelastfewyearspolicymakers,serviceprovidersandsoftwarevendorshavecometorealise,dataisabusinessassetthatwouldnotbeoutofplaceonacompanybalancesheet.Itisalsoapparenttoindividualsthatthedataheldaboutthembygovernmentsandbusinesseshasbothvalueandisincreasinglyatriskfrombeingmishandled,deliberatelyorotherwise.Ironically,asthevolumeofonlinesocialandcommercialtransactionsincreasesexponentiallydaybyday,theleveloftrustinsharingpersonaldataonlineisfallingequallyfastduetoconcernsaboutprivacyintrusionsandpotentialconsequencesofidentitytheft.

©2017TechVisionResearch–Allrightsreserved 22

WiththeemergenceofdataprotectionandrelatedregulationsthatwillgoalongwaytosafeguardingtheprivacyandrightsofindividualsontheInternet,opportunitieswillarisefortrustworthyorganizationstoactasidentityserviceprovidersoridentitybrokers.And,despitethebadpressbankershavereceivedoverthelasttenyears,mostpeoplestillinstinctively-anddemonstrably,albeitoftenthroughgrittedteeth,trustbankstoholdtheirmostvaluablefinancialassets.Sowhynottheirpersonaldataaswell,particularlyasthebanksalreadyhave,andarerequiredtohave,themostuptodatesensitiveinformationabouttheircustomers?Theansweristhatsomeforward-lookingbankshavealreadyrecognizedthepossibilitiesinleveragingthecocktailofregulation,customertrustandcompetitiveadvantage,andhavetakenstepstowardstoadvanceearlyexperiments.However,forthemajorityofbanks,theideasarestilldormantandhavenotconvincedseniormanagementtoexplorefurther.ThisdocumentlooksattheconfluenceofthenewslewofregulationsastheyimpactthebankingcommunityfromaholisticperspectiveanddemonstrateshowthiscanbetransformedintoanewsetofbusinessopportunitiesaswellaswhatshouldbethenextstepsforTechVisionResearchclients.Thisreportcovers:• Theemergingregulatorylandscapeasitimpactsthebanks• Theopportunitiesforbankstobecomeidentityserviceproviders• Sixstepsabankshouldtaketobestleveragethispotential

IdentityGovernanceAdministration:TheJourneytothePeople-centric,Business-orientedFutureofAccessControl(New)

By:VladShapiro,PrincipalConsultingAnalyst

Identity-relatedbusiness(IDM,AM,IAG)hasdevelopedrapidlyinthelast15-20years,andtodayisoneofthehottestandmostdemandedtopicsincurrentinformationsystemsmanagement.Inanutshell,theissueispeoplehavemanyaccessprofilesacrossoneormoreenterprises,andthereisnocentralauthorityempoweredtomakedecisionsaboutgrantingandcontrollingaccessandentitlementstoenterpriseresources,suchasapplications,physicaldevices,andlogicalsystems.Todaycontrolbelongstoresource/applicationadministrators,nottobusinessleadersandpolicymakersofthecompany,whichcreatesconflict,misunderstandingandultimatelysecurityissues.Sinceadministratorsdonothaveenoughinformationaboutrequiredpoliciesandbusinessleadersdonothavetheadequatetoolstoimplementthem,afundamentalconflictarisesthatisnoteasilyresolved.IdentityGovernanceAdministrationwascreatedtoaddressthisconflict.Itdefinesacommonframeworkusedbybusinessandtechnologyorganizationsindevelopingapracticalprogramtomanageallaspectsofgoverningaccesstophysicalandlogicalresources.Inthisreport,wewillshowtheevolutionofIGAfrombeingjustapartofITtoamodernbusiness-orientedframework,includingwhatsolutionsareavailabletoday,futuretrendsandrecommendationsforTechVisionResearchclients.ThisreportwillhelpourclientsbuildandsustainaneffectiveIGAprogram.Thisreportcovers:• HistoryandevolutionofIdentityandAccessGovernance:frompaperformstoIGAplatforms• ResponsibilitieswithinIGAandthefundamentalconflict• MainhistoricalshiftsinIGA:subjectshift,focusshiftandresponsibilityshift

©2017TechVisionResearch–Allrightsreserved 23

• Business-orientedmodel:description,availablesolutions,andtrends• People-centricapproachinIGApoliciesandgovernance• TechVisionrecommendations

InternetofThingsPublishedResearchInternetofThingsasaSecurityRiskAmplifierandRiskMitigationStrategies

By:BillBonney,ScottDavid,J.D.,PrincipalConsultingAnalystsIfwelookpastthefearandhypeofconnectingautonomousandsemi-autonomousdevicestogetherintheso-called“InternetofThings”orIoT,thereisaseachangeinhowweempowertheworker,enhancetheworkplaceandgotomarket.TheIoTispermanentlychangingbusinessmodelsineveryindustryand,asimportantly,theConnectedWorkerisfirstaConnectedConsumerwhocarriespersonalcommunicationdevicesandamyriadofsensorswiththemalways.ThecombinationofenhancedtrackingthroughRFID(radiofrequencyidentification);monitoringthroughdevice-borne,embedded,andwearablesensors;andautonomousorremotecontrolofadjustablemobiledevicesthatareconnectedto,orshare,anorganization’snetworkisamplifyingthecurrentrisksofexistingITsystemsandcreatingnewrisksthatmustbecataloged,ranked,andaddressed.Thisiswhatweseektounderstandandmanage.Inthisreport,wewillleavetheFUD(fear,uncertainty,anddoubt)aside,ignorethehype,andlookattherealrisksfacingtheenterpriseduetotheexplodinguseofpersonaldevices.

UpcomingResearchEnterpriseIoTRealityCheck

ByBillBonney,PrincipalConsultingAnalystThisreporttakesahigh-level,enterprise-wideviewofthestateofIoTandthemarketsegmentswhereIoTpromisestransformationalchange.Inthisreport,TechVisionResearchdiscussesthekeyIoTenablingtechnologies,theirmaturity,andprovidesguidelinesforwhereweatTechVisionResearchbelieveorganizationsshouldbeontheirIoTjourney.ThisincludesoutliningsignificantareasofenterpriseriskcreatedbyIoTandhighlightingessentialstrategiesforaddressingthoseareasofrisk.Withthecontextdevelopedinthisreport,enterprisedecisionmakerswillunderstandimportantnextstepstheyshouldbetakingdowntheIoTdevelopmentpath.Thisreportcovers:• IdentifyingandclassifyingthedifferentmarketsegmentsmostsusceptibletoIoT’simpact• DefiningtheIoTjourneyfortheenterpriseandwhereweseeenterprisesonthisjourneytoday• DefiningenterpriseIoTriskandstrategiestomitigatetherisk

©2017TechVisionResearch–Allrightsreserved 24

IdentityofThings(IDoT)

ByBillBonneyandGaryRowe,PrincipalConsultingAnalystsTechVisionidentifiedtheInternetofThings(IoT)asamajortrendimpactingIAMinourFutureofIdentityManagementresearchreport.ThisreportprovidesmuchdeeperassessmentofhowidentitymanagementsystemsshouldembraceanddirectlysupportIoT-associatedidentity.TheIdentityofThingsshouldbeamajorconsiderationformostenterpriseidentityprogramsandthegoalofthisreportistobetterprepareourclientstonavigatethisdynamiclandscape.Thisreportcovers:• Scale:IoTintroducesfargreaterobjectstobemanaged• Security:IoTintroducesnewchallengesinidentifyingeasilycompromised“dumb”devicesnew

threatvectorsthatmustbeassessedandmitigated• Privacy:majorconcernsinexposingpotentiallysensitivedata• Context:whilethefocusofIDoTisdeviceidentity,theseidentitiestobeassociatedwithowners,

vendorsandentitlements• Value:beyondtheoperationaldetailstocreate,enableandmaintainIDoTatscale,thesedevices,

whenleveragedcorrectly,createnewopportunitiestogoin-depthwithcustomerneedsandproductcapabilities/usage

• ProsandconsofdifferentapproachestoIDoTincludingtradeoffsofbuilding/usingaseparateIDoTvs.leveragingexistingIAMsystems

• FuturetrendsinIDoTincludingtheimpactofblockchain-basedproductsandservices• Majorcurrentandexpectedmarketplayers• RecommendationsandtimelineforEnterpriseIT

UnlockingtheValueofIoTtotheEnterprise

ByBillBonney,PrincipalConsultingAnalystThisreportdivesdeeperintothecriticalsuccessfactorsnecessarytounlockthevalueoftheIoTeco-systemsthataredevelopingindifferentmarketsegments.Foreachmarketsegmentcovered,TechVisionResearchexaminesindetailthetransformationaloutcomesthatIoTpromises.Toachievetheseoutcomes,weoutlinethestageseachenterprisemustgothroughtobothdevelopthecapabilitiesnecessaryandproviderealworldguidanceforassessingtheavailabletoolstohelponeachievetheseoutcomes.Thisreportcovers:• DefiningIoTeco-systemsTechVisionResearchseesdevelopingfortheenterprisebasedon

marketsegmentation• OutliningthepotentialtransformationalbenefitsofIoTbymarketsegment• RealworldguidancetoassesstheemergingtoolsforenterpriseIoTimplementation,governance

andriskmitigation.

©2017TechVisionResearch–Allrightsreserved 25

ArtificialIntelligence/MachineLearningPublishedResearchTheRiseofMachineLearning:ManagingtheOpportunities,HandlingtheThreats(New)

ByDavidGoodmanandBillBonney,PrincipalConsultingAnalystsArtificialIntelligencehasgainedmassivetractionoverthelasttwo-threeyearsinthebusinessworldaswellasthroughpopularmedia.Theexpressioncoversawiderangeofapplicationareasandimpactsatamultitudeoflevels.Todayartificialintelligencefortheenterprisetranslatestomachinelearningwhichisabusinessopportunityandincreasinglyanecessityforautomatingcomplexprocesses,themanagementandanalysisofbigdataandasavitalextensiontocybersecuritymeasuressuchasfraudprevention.Whencombinedwithdistributedledgertechnologysuchasblockchain,formachinestoeffectivelyrunahighly-distributed,cloud-basedorganizationwithminimalhumanengagementorinterventionhasthepotentialtogobeyondsciencefictiontoawholenewreality.AsthemediainterestinAIspirals,managersandemployeesare,notsurprisingly,concernedthat‘intelligentmachines’willeventuallyrobthemoftheirjobsastheywillbelessexpensiveandmoreeffectivethantheyare.However,puttingasidethelonger-termpossibilitiesassociatedwithAI,aswithanylearningprocess,therearegenuineconcernsaboutthereliabilityofthematerialfromwhichamachinehasderiveditslearning.Inparallel,thereareunresolvedquestionsregardinganyliabilitiesassociatedwithdecisionsandeventsthatensuebecauseofamachine-learntprocessandhowtheycanberesolved.Wearealongwayfromthenightmarehumanvsmachineconflictsenvisagedinmanymoviesbutthetimehascometoappraisehowwemakethemosteffectiveuseofthetechnologythatisavailabletoustodayandoverthecomingtwo-threeyears.Thisreportcovers:• Layingthegroundworkforbecomingamoredata-centricorganization• Identifyingprojectswhichcreateproperpredictivemodelsthatsolverealproblems• Creatingadataenvironmentthatistrustworthyenoughforuseinmachinelearning• Creatingtheproperbalanceofmachineandhumandecisionmaking

MachineLearningandArtificialIntelligenceonBigDataforCybersecurity(New)

By:FredCohen,PrincipalConsultingAnalyst

Theuseofmachinelearningandartificialintelligenceforcyber-securityarenothingnew.Buttheavailabilityoflargerdatasetsandtheevolutionoftechniquesapplicabletobigdatahaveproducedanewgenerationofsystemsthatimproveefficiencyandutility.Theneedforfargreaterscalebroughtaboutbythedramaticincreaseinthenumberofusers,uses,andsystemsinvolved,hasdriventhedevelopmentofmachinelearningandartificialintelligenceforcyber-security.Thebasictechnologicalchangesinvolvemathematicalalgorithmsthatexaminelargedatasetscontainingknownbadandknowngoodsamples.Thesemethodscreateequationsthatclusterknown“good”and“bad”samplesanddifferentiatethemfromeachother,thenapplythosesameequationstonewsamplestoclassifythemas“good”or“bad”.Thiscanthenbeappliedtoanyofawiderangeofproblems,includingmanyofthoseofcyber-security.

©2017TechVisionResearch–Allrightsreserved 26

Theenterprisebenefitsoftheseemergingtechnologiesareeconomiesofscale,efficiencyoflabor,anddetectioninareasnotpreviouslyaddressed.Thisreportdiscusses;(1)thebasicsofthesetechniques,(2)thewordsusedtodescribethemandwhatthosewordsmean,(3)thelimitations,benefits,andcostsofthesetechniques,and(4)theirapplicationtoCybersecuritytodayandintothefuture.Itthendiscussesproducttypesemerginginthemarketsandthecurrentandlikelyfutureutilityofapplyingtheseproducttypestoenterprises.Inthisreport,weinvestigatethisemergingtrend,andwhatshouldbethenextstepsforTechVisionResearchclients.

©2017TechVisionResearch–Allrightsreserved 27

AboutTechVisionDirectExperience.ActionableResults.GreatValue.Thespeedatwhichtechnologychangesdemandsaresearchcompanythatisnimble,leveragesreal-worldexperiencewithoutsideperspectives,andmakesitsknowledgeavailabletoeveryoneintheenterprise;afirmthatwritesfor,andtakestheperspectiveof,theconsumersoftechnology.ThatfirmisTechVisionResearch.AtTechVisionResearch,wefocusonyoursuccess.Withanunparalleledcombinationofcutting-edgeresearch,high-impactworkshops,andexpertandpragmaticadvice,TechVisionhelpsyouleveragetechnologyto…

• Enabletheenterprisevision• Engagewithdigitallyempoweredcustomers• ExcelattheITfundamentals• Enhancecollaborationacrosstheenterprisevaluechain

Findoutmoreathttp://www.techvisionresearch.com/

top related