Technology Challenges: Reshaping IT Environment
S. Mohini Ratna,
Editor-VARINDIA
With the increase of security threats in geometrical progression, it does not require the genius of a rocket scientist to understand that security landscape is witnessing the incorporation of more security vendors who are all set to lure the customers with their value added services. However, they will do well by keeping in their minds that value has a value only if its value is valued. To sum up, it is suffice to say that the vendors should help the users defend the network in a better way.
As connectivity from any device to many cloud systems is being expanded, the impact of threat is also increasing. As multiple devices that connect to various networks and services through a wide range of applications are being embraced by people, the chances of more vulnerabilities are looming large on the horizon. What is of utmost importance is that the need of the hour is that we should delve deep into the security threats that have to overcome for seamless functioning of business.
There is no denying that pain points are often accompanied by innovations which are taken recourse to by the people to fix a problem or a challenge. The adage ‘Necessity is the mother of invention’ is very pertinent here. Innovation, the lifeblood of technology world, takes place when there is a meeting of all these three things-pain points, interesting challenges and aspirational goals. This is the case which finds resonance all over the world. And this is also the case in emerging markets like India. There are big aspirations for everybody to be online in the country. In the context, I would like to thank the NKN (National Knowledge Networks) and BharatBroadband Network for their continuing efforts for providing better connectivity for the people of India.
Of late, I am given to understand that CIO and CISOs was being approached these days by the stakeholders concerned for making any purchasing decisions. While this may be a right step, the role of Value Added Distributor cannot be soft-pedaled. Now, I turn to the challenges one faces while going for customized software vendor. Once you have purchased from them, it is gold mine for them. But huge recurring expenses will make it difficult for the users to shift to other vendor. One can take the services if the supplier will share the IPR and during the time that the Beta testing is taking place an escrow account can be established to keep the intellectual property safe.
It seems the coming quarter would be much interesting in terms of business transition for better reshaping IT environments. Till then wait and watch.
For More Contact:
mohini@varindia.com
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.