IBM expands its ecosystem by opening APIs for QRadar

Tags

, , , ,

IBM today (8 December 2015) made some interesting information security announcements. The first was that IBM is opening the APIs of its IBM Security QRadar to allow developers to build custom apps utilizing the platform’s advanced security intelligence capabilities. The second announcement is that IBM has created a marketplace community called IBM Security App Exchange to engage developers to create and share apps based on the company’s security technologies.

The rationale behind IBM opening up the APIs for QRadar is to extend the ecosystem to encourage and engage developers and partners to further utilize the capabilities of its advanced security platform and take it deeper into the enterprise. In the newly built community, IBM and partners including Bit9 + Carbon Black, BrightPoint Security, Exabeam and Resilient Systems already have populated this exchange with dozens of customized apps that extend IBM Security QRadar security analytics in areas like user behavior, endpoint data and incident visualization. This opening of the APIs allows the security community to rapidly build new QRadar applications using software developer kits. IBM Security will be monitoring and testing every application before it is posted to the App Exchange to examine the integrity of these community contributions to the platform.

To further address cyber threats in the enterprise space, there is a need for a more open and collaborative approach to security to get more developers involved and more applications integrated into the advanced platform of IBM. Enlarging the ecosystem will allow IBM to integration with third-party technologies and provide even better visibility into more types of data threats.

With thousands of customers now standardizing on IBM’s security technologies, opening this platform for closer collaboration and development with partners and customers changes the economics of fighting cybercrime,” said Marc van Zadelhoff, Vice President, Strategy and Product Management, IBM Security. “Sharing expertise across the security industry will allow us to innovate more quickly in order to help stay ahead of increasingly sophisticated attacks.”

Who benefits from this announcement are software security tool developers wanting to partner with IBM Security to get access to some of the best security analytics out there. IBM Security operates one of the world’s broadest security research and development, and delivery organizations.

IBM was also announcing today a new release of IBM Security QRadar, which further integrates QRadar with IBM BigFix endpoint security management to help customers better prioritize threats and patches on user devices.

Wearable banking? What, a magic ring?

Tags

, , ,

When I read this article this morning, I had to laugh.  Because most millennials I know never wear a watch, and tell the time via their phones.  And even if their phone functionality makes it to a watch, they will still spend their time on it playing games, not purposefully using it for authentication.

But as the ‘gamers’ they are, if you offered them a personal identifier in the form of a “magic ring”, they would snap it up in a heartbeat.  Given the craze for wearables such as FitBit, I see wearable jewelry as the way forward for authentication, especially two factor authentication.  Earrings, bracelets, rings and necklaces can be personalized, made “funky” and can be fashion forward for the younger generation.  But then more subtle versions can be made for others who are less fashion conscious.

Gucci passcode, anyone?

 

Evolution of business models

Tags

, , , , ,

This is the time of year where pundits such as myself start hyping what we think will be happening next year in order to predict trends and patterns and show we know what we are doing. 😉

For me, the trend to watch is the evolution of business models, both in technology and in go-to-market strategies.  Because too much is changing in the industry for things to continue in a static pattern of how we sell, what we sell and how we engage.  Too much is being asked of technology, and not enough is done in process change of how we use the technology.  Or, as shown this week in France, how the technology is being used by others in ways we did not foresee where private communication abilities are used in ways we do not expect.

In terms of technology, we have enabled access so much so that the users are in control, not the IT department nor the government trying to restrict or audit what we do or say.  This can be seen in hybrid cloud structures, in how we use mobile technology, and in how restructured communication has usurped traditional structured forms of dialogue.  For example, Twitter as a faster source of news than the news channels.  Policing the new forms of communication has become difficult.  I work with an educational organization that has no internal policy on Facebook communication, so much so that the main users got together to agree on a structured policy before the institution even thought about mandating one.  There is shadow IT, and there is also shadow communications.  And frankly, one drives the other.

One of the points I want to make here is that communication is driving many technological shifts.  Or as the Microsoft ad says, it is not the technology that is mobile, it is you.   How we work, when we work, and how we communicate is pushing the technology to work in different ways for us.   We have not had major technological breakthroughs, rather we have pushed the limits of how we work to the point the technology has had to adapt.

A good example is the storing of data.  As I am writing this blog post, the system is saving my work every few minutes automatically. More of what is created is saved and tracked, adding much more data storage available and larger digital footprint is created.  We have had to adopt faster means of storing and processing to the front of the network, thus one of the trends for 2016 is the use of flash as a primary storage technology going forward.  Part of the driver for this is cost and performance, but another main portion of this is process change and digital process transformation.

Another evolution of business models is the use of multiple cloud methods for business processes.  For me, hybrid cloud in 2016 will have shades of the outsourcing trends of the 1990s, where ultimately consumers and enterprises will have to decide if managing their own data is a core competency of theirs or not.  And many, facing privacy concerns and performance irritations, will take their data back in-house.

Privacy and security have become more significant concerns, thus one of the ongoing trends in Europe in 2016 is the push for cyber insurance. Businesses outside the United States are rapidly discovering what U.S. businesses and their customers have known for a few years: that a data breach is not a matter of if, but when, as shown by the September introduction of the International Cyber Consortium of insurers providing robust data breach cover to businesses domiciled outside the United States with revenues in excess of $5 billion. But systemic risks and exposure accumulation are limiting insurers’ ability to provide large corporates with the size of limits they need to cover their cyber risks, with a push for governments to step in and provide support.  Here is where evolution of insurance models is helped by big data and analytics. Using big data and modelling, insurers can learn what companies are using which cloud or network structures and platforms in order to show the connections that exist [between insured companies] and build up a probable maximum loss.  Insurers want to find out how enterprises cost and monitor aggregate risk as part of their cyber insurance coverage. So risk monitoring is a fairly big trend for 2016.

Cloud management, risk monitoring, and digital process transformation are all key themes for me in 2016, along with the evolution of privacy and security being baked into the IT infrastructure as to be always present and always on. This includes the addition of IoT into the framework.  Things as well as people will be engaging at all times.

The other portion of my views for 2016 is how we reach our audiences in our go-to-market strategies.  Traditional forms of communication are being overshadowed by all of the screaming and yelling done on social media.  Social media reminds of the saying “if a tree falls in the woods and no one is there to hear it, does it make a sound?”.  Very few of us are engaging on social media, most are trumpeting their wares and not engaging in dialog and feedback with those who are supposed to be listening.   “Old school” users of Twitter engage, those who came later just use it as a posting board.   Facebook is becoming more of people shouting at each other, and not actively sharing with each other.  This is why many young people are moving away from the platform to other more mobile apps geared more for the mobile lifestyle.   And we are watching less video these days, so catching the eye of a viewer is becoming more challenging.

Social media tools that highlight engagement and feedback, versus amplification of the message, are the ones to watch in 2016. It is about integration, innovation & automation to maximise potential engagement.  A personal favorite for me is Hubspot

I hope this gives you a flavor of what I am working on at present.  Feel free to reach out to engage me in a discussion on the topics!

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Data in the Cloud ….and Weather as a Service (WaaS)?

Tags

, , , ,

Are we seeing Weather as a Service (WaaS)? Perhaps it is viable more now than ever, as many businesses rely on weather data to maximize profits. Drug companies and pharmacies rely on weather forecasts to predict when to increase supplies of allergy medications. Agriculture companies use weather data to maximize crop yields. Better forecasting for adverse weather conditions could enable airport controllers, for example, to plan for disruption and enable flight path optimization to reduce fuel consumption.

So two announcements this week highlight the change towards a focus on smarter weather predictions and enhanced data analytics for making money from data on the weather.

IBM announced Wednesday that it has purchased the Weather Company. [It is essentially buying everything except the actual TV network.] IBM is taking the Weather Company’s digital assets, including the Weather Channel mobile app, weather.com, and critically for IBM all the company’s forecasting data and technology. The Weather Company owns the largest commercial meteorological database in the world, along with massive facilities that collect radar, satellite, and other weather information.

And in the UK, having lost the lucrative BBC contract in August, the Met (UK Meteorological Office) announced this week its plans to raise £2bn by offering commercial supercomputing services over the web using a powerful Cray supercomputer.

According to the article announcing the purchase in ComputerWeekly, the Met forecasts that it estimates it will generate its extra revenue for the UK Treasury between 2016 and 2020. “Almost half of the revenue (£933m) will come from companies working to predict the scale and timing of climate change. Another quarter (£526m) will be raised through providing services to the renewable energy sector, which includes wind, solar and hydroelectric power, as well as nuclear power generation. The Met Office estimates that potential customers in the aviation industry, including foreign air forces, could buy up to £295m of services.”

Are IBM and the Met on to something here? So much of climate change is about adaption and response to conditions that are somewhat unpredictable. In terms of big data and smarter analytics, can weather prediction become even more useful as a pattern predictor that can teach us how to apply analytics in other industries?

Enterprise IT and the ever shifting focal point

Tags

, ,

Dell’s planned acquisition of EMC, combined with the upcoming split of HP, highlights a problem that has faced enterprise IT since the beginning of the computing era.

The problem is the shifting focal point of the enterprise portfolio.  In the beginning, we had the centralized resources (mainframe, supercomputer, VAX, CDC, etc).  And the workflow, purchasing, manpower, etc were all centered around it.   Then we hit decentralized computing (minicomputers), distributed computing (UNIX), open source computing, mobile computing, and so forth. We have gone from proprietary OS to more standard OS to open source OS to mobile platforms and so forth.

Here is my point: we no longer have a central focal point, and the enterprise portfolio is now more diverse, more disseminated and from that point, harder to predict or protect. With cloud models and subscription pricing, we even go further down the decentralized path.

IT purchasing has been about decision making at a central point in the organization. And as computing has disseminated into the organization, the ability to sell and create profit as in the previous times has stumped the more centrally oriented IT salesforce. IT vendors need to reorganize themselves to look more like the portfolio of the enterprises they serve.

Just my humble opinion. #backseatdriver

 

Servicing the IoT – an industry onto itself?

Tags

, , ,

I was reading the press release from last week’s Gartner Symposium in Florida.  Although I do not agree with the timing of the events they predict, two of them are of distinct interest to me given my own areas of research in marketing automation and IoT infrastructure.

First point:  All of the enabled objects (IoT) will require service and maintenance.  Well, they do now already require service and maintenance, but with the “phone home” ability of connectivity and some level of intelligence, the down time of objects can be significantly reduced.  This will be helpful given our reliance on said objects will increase as a function of their intelligence.

It is likely that an unique service industry will develop in and around IoT objects, and those who provide service to infrastructures will need to add knowledge about internet enabled devices to their portfolio.  Real time automation again rears its head, so those with skills in simulation and utility management will benefit.

Second point: A certain percent of business content will be authored by machines.  [To be frank, given the poor writing skills of many of the millennials I teach, this can only be a good thing. 😉 ]   Seriously, there are many items that can be automated in terms of corporate communication.  I would agree that business reports can become automated and their contents more automatically disseminated. And preferably NOT in terms of increasing the volume of email!

I have to say I like their point 5, and agree with the statement: “Smart building components cannot be considered independently, but must be viewed as part of the larger organizational security process. Products must be built to offer acceptable levels of protection and hooks for integration into security monitoring and management systems.” It is clear that holistically a smarter workplace must be greater than the sum of its parts.   Integration and baking security into the workplace is a necessity for protection of corporate capital.

 

Enterprise Athlete? How your firm could measure your performance in future

Tags

, , ,

As you know, I am actively researching the connected office.  When I saw these two articles on the Deloitte experiment in Canada and the launching of Humanyze’s smart employee badge, this gave me food for thought.

How do you want to be measured by your employer?  If you are a professional athlete (or like me, an amateur one), your coach keeps track of your stats and your performance by defined metrics.  In my sport, your performance and PBs show direction and improvement. Working with your coach and other athletes in terms of sharing best practices are an indirect function of that improvement.

As an employee, you have been measured by both qualitative and quantitative metrics in the past that are related to output and productivity.  How much I speak in a meeting I do not believe tells you about what I said and how much I prepared for that meeting with facts and figures instead of opinion and rumors.

Measuring for feedback is admirable.  But what exactly you are measuring, and who “owns” that data are both important aspects of that feedback. Network cohesiveness and call completion, measured separately, is one thing but correlated to each other would give you a fuller story.

But can you measure group happiness? In the Canadian article, it discusses Hitachi and its Human Big Data, a wearable device that is outfitted with sensors and collects data 50 times per second. The firm uses data gathered from the device to gauge the happiness of the group.  It could be that the group is actively interacting about how unhappy they are!

What I find admirable about this is measuring existing employees to help them become more productive, vs. finding ways to fire them due to behavior.  I hope that is the rationale for the tools, and not the latter.

 

Wearables in the Enterprise – more than watches and glasses

Tags

, , , , ,

When you hear the term “wearables”, you think of smart watches, fitbits and other consumer oriented devices. But the real market for wearables will be in the enterprise, such as on the shop floor, warehouses and in the conference rooms. This is the research I am working on right now.

Initial deployments should be industrial applications that have use cases that are specific with clear efficiency metrics and goals. Although some believe the “killer app” is the ability to work hands-free, the real level of personalization is the ability for the environment to recognize the user and his/her needs via their role in the organization. Entry/physical access, two factor authentication, personal preferences for heating and lighting, all of these can come from user recognition.

Another aspect of wearables is worker protection. For example, integrating intelligent textiles into clothing provides the possibility of changing color when exposed to damaging chemicals and/or radiation, warning the user of exposure in a way more immediately noticed than gauges or readings. Shape memory fabrics/garments can potentially be manufactured as novel fabrics which respond to the temperature stimulation, protecting workers by telling them when they might be in danger of cold or heat. And shear thickening fluid can be used for use in protective clothing as liquid body armour as it behaves as a liquid until it is exposed to mechanical stress. At that point, within a matter of milliseconds, it hardens into a solid. So when there is no threat to the wearer’s safety, he or she experiences little impairment in flexibility or range of motion, which is excellent for a warehouse or dock worker.

The eventual use of wearables among knowledge workers will be more of a generalized phenomenon, particularly when the devices become as multifunctional as their smart phones are. As many wear company badges for access to facilities, these could be become not only more fashionable but multifunctional as RFID and other technologies could be added to adapt the functionality to the role of the wearer.

Interested?  Get in touch with me.

Learning from those who tread there before…..

Tags

, ,

Today it is more a personal note. I’ve making a number of personal and professional decisions recently; some naturally occurring and some influenced by personal choice.  As I have moved through my career, I have always relied on a network of professional contacts and personal friends as sounding boards and sources of information. Some of them have recently being extremely helpful during my recent convalescence through my hysterectomy and I have been grateful for them in sharing their own life experiences.

What I have found interesting is there are certain subjects we do not discuss (one example being menopause).  And yet, when we do discuss them, we find a vast wealth of information and support available from those who have tread there before.  Maintaining networks across different age groups is critical for personal growth and support.

What I have found interesting lately is how few people network properly.  They only network when they need someone, and then do not stay in contact afterwards.  For me, it is about the longitudinal relationship built on trust and mutual respect that adds the value. “Shallow networking” for the ‘here and now’ is actually more work to build, decay and rebuild relationships.

On the other end, one of the (few) joys of being an educator is the ability to see someone go through personal growth over time, and see what they can become, as well as your subtle role in that growth process.  As I network for the long term, some of these relationships become fruitful now more frequently and with great blossoms than expected.

Like most of us, I use LinkedIn and I was touched yesterday to see how much influence I had on a particular person’s career path when they called me out in an Update as to one of the strong women in their lives (in this case not referring to my weightlifting hobby 😉  ).

Why do you network?  For me, it is not only a way of growing my personal brand but adding fulfillment to my efforts, and knowing I have a source of strength behind me, and in front of me.

Wishing you a successful weekend!

 

 

 

 

 

… a great piece of digital real estate…

Tags

, , , , ,

As I dig into my mailbox this morning, I am reminded by one of my mails to make sure I use my email properly, in that “Your email signature is a great piece of digital real estate you can use to introduce yourself further and keep people up to date…”

Self-branding has gotten to be huge in terms of volume of the message these days. You need to stick and label yourself where ever possible to let people know who you are and what you do. We can define this as digital real estate, or measurement of the digital footprints you leave when you stomp all of the Internet. What used to be mind share is now digital real estate impact (a la Trump or Kardashian).

As I do several things, I was recently challenged personally by one of the better self marketing gurus to create a tag line for the bottom of my mail to sell myself best in one sentence. I did that, and now you see my one liner:” I have a finely honed sense of strategy after 20 years as a market analyst, and can help you cut through all the slideware to get to the specific message you want to get across. ”

As someone who has loved stand-up comedy, I associate a one liner with a good joke.

Is digital real estate a good joke?   Like many, I have created digital real estate to help sell me and my narrative out in the vast internet wilderness.   If you do not, it is hard to make an impact.  But if you do, then like real estate it needs to be properly managed and maintained.

Can your digital real estate get so large that you cannot manage it?  For some rock stars and politicians, this may be the case.  Reputation management is getting to be a good business to get into.

But I am focusing on refining my message, and need to upkeep my digital real estate more often in this era of instant messaging and messages.

But this intrigued me into looking at digital real estate measurement (as a good economist, I like a nice index), so I am examininig how digital real estate can be measured.

If you have seen a good measurement, let me know.  I am starting with this article as a basis for discussion.