Tuesday 16 July 2013

Keeping the data flowing in this mobile world

Keeping the data flowing in this mobile world | F5 DevCentral

 

It seems to me that you cannot check any technology news website these days without being bombarded by news about mobility, bring your own device (BYOD) and the arrival of 4G networks, bringing superfast internet access to millions of mobile workers across the country.

 

But while most users just care about getting the latest handset and being able to get a decent mobile connection when out and about, the service providers behind the scenes have a lot more to deal with. The increasing number of subscribers, the “always on” nature of today’s devices and the vast amount of data they create are causing headaches for service providers.

 

It’s something we know all about here at F5. As the features available to mobile users become richer and more advanced, it places additional strain on the networks. The trouble is that many of the networks and the infrastructure they run on are old, built before these superfast networks and advanced mobile devices were available.

 

This means that, sometimes, performance and security can be compromised. Some applications will not perform at their optimal speed if there is heavy traffic on the network while many applications from unofficial sources could pose a security threat to the user, the business and the service provider.

 

That’s why we believe in an application-orientated approach to security and centralised management and policy controls. This means you can tailor policies and protection for each application to each individual organisation, while centralising the management means a reduction in time and money spent on configuring policies and pushing them out.

 

Essentially, the key is to ensure that what goes on behind the scenes is seamless and easy to manage, so users get a fast, reliable and secure mobile service and providers don’t have to stress about ensuring they can deliver on those promises.

Our latest developments in the firewall market can help mobile service providers; click here to find out how. http://www.f5.com/about/news/press/2013/20130619/

Wednesday 19 June 2013

The BYOD dilemma for financial firms

The BYOD dilemma for financial firms | F5 DevCentral

 

We have spoken a lot about BYOD on DevCentral, but it continues to be a significant issue for countless businesses! Financial firms in particular are, understandably, grappling with the trials of enabling flexible, mobile working whilst protecting their highly confidential data.

 

We’ve talked at length about the view that BYOD can have a huge beneficial impact on businesses and it seems that the tide of consumer devices working their way into the office is showing no signs of turning.

 

However, a lot of the information held by financial firms is highly sensitive, either commercially or personally, and can be used to find out private information or learn about deals which may have an effect on the market. Clearly this information leaking out of employees’ pockets is an unacceptable situation, which is why many financial organisations are seen to be stonewalling BYOD initiatives and preventing it from becoming more widespread. Unfortunately for these firms, preventing BYOD is looking like less and less of an option as employees disregard these blanket policies in order to more efficiently do their jobs.

 

So what solution is there for financial businesses stuck between a rock and a hard place? It’s actually surprisingly simple: embrace BYOD. That doesn’t mean to say that there should be a laissez faire attitude to employees using unmonitored and unmanaged devices; far from it. What it means is that these businesses should put detailed and comprehensive policies in place and ensure that all devices which access the systems have mobile application management software enabled on them – controlling what can be accessed, and from where, at the application level.

 

The BYOD policy and implementation should make clear what kinds of files are permitted on BYOD devices and have policy engines to enforce these rules. Computer Weekly has a good primer on what kinds of policies should be put in place which is worth taking a look at.

 

BYOD is here already and it is up to businesses to ensure that its managed effective. Fortunately, it’s something that we’re well placed to help with.

Tuesday 11 June 2013

F5's 2013 EMEA Agility Conference

https://devcentral.f5.com/blogs/uk/posts/f5s-2013-emea-agility-conference

 

F5's Annual EMEA Agility Conference, this year taking us to sunny Monte Carlo, has now come and gone. While I have not brought the sun back with me to England, I can say I've brought back some great memories. There was a buzz all throughout the event greater than I've experienced at previous event, both in and out of F5 Networks.

As per the wrap up video: 500 customers & partners, from 37 countries, 12 breakout streams and a fantastic evening of dinner and entertainment in a restaurant with a retractable roof.

 

We took a lot of footage at the event which I'll share here:

 

F5's Nathan Pearce takes us on a walk through the solutions expo at F5 Agility EMEA 2013 talking with some of the exhibitors along the way.

 

F5's Nathan Pearce talks with Michael Pellett from Camelot at the DevCentral booth at Agility 2013 - EMEA.

 

F5's Nathan Pearce sits down with former F1 World Champion Damon Hill at the F5 Agility conference in Monte Carlo, Monaco.

 

F1 World Champion Damon Hill took a turn at the wheel of the F5 F1 simulator. Check out how he did!

 

F5's Nathan Pearce sits down with Stefaan Hinderyckx from Dimension Data at the F5 Agility EMEA conference in Monte Carlo, Monaco.

 

Joe Pruitt sits down with Mika Kytövaara from Santa Monica Networks at F5 Agility 2013 in Monte Carlo, Monaco.

 

F5's Joe Pruitt sits down with the CEO from Payoda, Anand Purusothaman, to talk about his company and the exciting new version of the AppViewX product.

 

F5's Nathan Pearce talks with Ferry Kemps from Onsight at the F5 Agility Conference in Monte Carlo, Monaco.

 

F5's Nathan Pearce sits down with WebSense to discuss their product lines at F5 Agility 2013 in Monte Carlo, Monaco.

 

F5's Nathan Pearce wraps things up at the 2013 F5 Agility conference in Monte Carlo, Monaco

 

Thanks all and see you next year!!

Tuesday 21 May 2013

How was it for you? - Delivering good experience for the always-on customer

How was it for you? - Delivering good experience for the always-on customer | F5 DevCentral

 

It’s an undeniable fact that customers are increasingly connecting to services with expectations of an always-on, anytime, anywhere accessibility. There is a massive opportunity for businesses to engage more frequently with a switched on and interested consumer-base, but it brings the challenge of delivering the kind of seamless experience that they expect – in fact, it has been worked out that the average internet user will be put off visiting a site again if confronted with a delay of just 250 milliseconds. That’s quicker than the blink of an eye.

 

This means that the pressure is on for companies to deliver websites and online applications with as few delays as possible, otherwise there’s a risk that they will, quite literally, lose business. I don’t think many business leaders appreciate just how critical to the bottom line this is!

 

While a lot of delays suffered can be down to the connection to the end-user’s device (traditionally known as “the last mile”), there is a lot that can be done to reduce the page load speeds from the server side. For example, if you can tell that a user is accessing the site on a mobile device, high bandwidth images will be unnecessary and a mobile-friendly version of the site can, even should, be delivered instead. Time and money invested here to ensure maximum speed and availability is a solid investment in revenue.

 

It is something of a surprise that mobile access is so widely neglected when you consider that the latest statistics from Ofcom indicate that 39 per cent of the UK population access the internet on their mobiles. This figure is only going to get higher as smartphone penetration increases - estimated to reach 75% by 2016. It’s imperative that businesses address this shortcoming in order to boost the bottom line.

 

Good user experience is a key part of revenue generation and should be a top priority.

Thursday 16 May 2013

RIP SMS

RIP SMS | F5 DevCentral

 

Informa recently reported that the number of messages sent using free chat apps like 'WhatsApp' has overtaken the number of traditional paid-for SMS messages sent. The BBC revealed that according to Ovum, more than £15bn of SMS revenue was lost in 2012 due to popularity of chat apps. When you bear in mind that the Apple app store only opened in 2008 and that WhatsApp only launched in 2009, this is quite incredible.

 

Free apps aren't just muscling in on the messaging territory of mobile service providers; WhatsApp is now rumoured to be considering a voice chat function. If we can text and make calls for free on the go, what does the future have in store for mobile service providers? It seems likely that free messaging apps will follow in Skype’s footsteps by making traditionally paid-for services free for all. As communication apps continue to take their piece of the pie, mobile service providers will need to look for alternative opportunities to generate revenue. 

 

In addition to the revelation that free texts are overtaking their paid-for equivalents, this quarter has also revealed another first. This is the first time that smartphones have outnumbered basic phones in terms of worldwide shipments (in a total market of 418.6 million devices, 216.2 (51.6%) were smartphones). 

 

With smartphones becoming more and more prolific, apps are becoming an increasingly important part of our lives. And with communication services available free of charge, why would we choose to pay for our messages and calls, if we didn't need to?

Service providers need to find alternative ways to make revenue; rather than calls and texts, they should shift their focus to data. Securing and managing the data on our mobile devices is likely to become more of a priority as the uptake of smartphones and tablets continues to skyrocket. 

 

Context is something that has come up in several of our blog posts and this is one incident where it plays a truly crucial role. In order to remain competitive in this changing market, mobile service providers need to understand context; offering intelligence that allows them to deliver the right data to the right user at the right time, quickly and securely. Understanding what kind of data it is, who is accessing it, from which network, and from which device is key to its secure delivery. Once they understand that, mobile operators can build new products and services in order to keep their customers happy.  

 

While we may have a long way to go before the SMS is obsolete, any mobile service provider that chooses to ignore the threat posed by the arrival of free chat apps is going to get left behind. Apps and free chat apps in particular are about making data and communication accessible to all. Understanding context will empower service providers to build new revenue streams and secure an advantage over the competition. 

Friday 10 May 2013

Plan for the war, not the for battle: managing mobile devices

Plan for the war, not the for battle: managing mobile devices | F5 DevCentral

 

Ancient Chinese General Sun Tzu's relevance to Internet Security continues to impress me. Famous for his documented military tactics in ‘The art of War', Tzu stated, “Know thine enemy and know thy self; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal.”. Countless times have I reflected on this statement when considering the many different aspects of technology security. Today's focus will be on mobility.

 

Despite all the doom and gloom stories, mobility isn't evil. Personally, I think its a great idea and should be promoted. It is an enabler that keeps me working during situations that I would have previously deemed 'down time'. In fact, this post is being written on a tablet on the train somewhere in the English countryside. Mobility is great but, as Uncle Ben said to Peter Parker in Stan Lee's Spiderman, "With great power comes great responsibility!". Bringing us to the security element of mobility.

 

Security is about compromise. The best way to secure data is to ensure that no-one has access to it. But then what's the point of that data - Schrödinger's cat anyone? So, architecturally, we start with zero access and then work back from there until, eventually, we have data that is reference-able by the desired audience - we have implemented calculated risk. And with it the complexity added to the data's security by the technologies wrapped around it.

 

As important as many vendors will tell you their security boxes are its important not to lose focus on what it is we are trying to protect - the actual data. Concentrating on the technologies and devices around the data is a good way to lose sight of the original goal, a great way to add unnecessary complexity and leave the data itself open to danger. And this problem is big in terms of where the data could end up - refer previous post: "Data theft: 9,751 phones stolen last month".

 

Slashdot post "Popular Android Anti-Virus Software Fooled By Trivial Techniques" brought to my attention a great example of fighting the battle instead of the war. Anti-virus is a tactical solution and, in this case, was circumvented to provide access to data. If the security solution protected the apps and their individual data stores as entities in their own right - protected themselves even from the host operating system - then the data remains safe.

 

Sun Tzu told us to fight the war, not the battle - to not lose sight of what the security solution should be protecting. Are you fighting tactical security battles or are you winning the data protection war?

Friday 3 May 2013

Network load-balancing: Failing at the speed of light

Network load-balancing: Failing at the speed of light | F5 DevCentral

 

The way in which applications fail is not binary - either on or off in state. Applications can fail to deliver data quickly, accurately, securely or appropriately for the requesting device. Network load balancing alone delivers no protection against these types of delivery failure. This significant limitation is due to a lack of appreciation of context in regard to:

 

  • the performance of remote networks beyond the data centre
  • unexpected application behaviour
  • the capability of the end user device
  • real time, end user experience analytics

 

Network performance

The slowest segment of data’s journey between server and a remote device is typically the last mile of delivery – the network connected directly to the end user technology. This is increasingly so for mobile devices however, irrespective of the medium, wireless or fixed-line, end-to-end performance management is a critical step toward a positive end user experience. The effect of poor performance caused by networks beyond the hosting data center are amplified by the inefficiencies of web applications and their protocols. Web applications are often developed in sterile lab environments lacking the difficulties of real world application access. Consequently, behavioural testing in these labs return acceptable results that are not mirrored in production environments. In the case of interactive applications, where data is received from and pushed to the data centre, the impact of minor latency becomes significantly increased.

 

Unexpected application behaviour

Unforeseen errors occur during application run-time. For example, uncaught exceptions, as they are referred to in programming terminology, occur when an application reaches a state that was unexpected by the developer. They make their way into applications via a number of means - inexperienced developers, oversight from pressure to release functionality quickly, bugs in API’s (application programming interfaces), to name just a few – and they typically result in an application crash. Unfortunately, requesting of developers to not make mistakes isn’t a viable solution. Such a symptom is a consequence of the human element in computing. The resulting experience for end users can range from meaningless or confusing application error messages to long delays ending with a session timeout and a web browser error. The cost to the enterprise is loss of business and damaged reputation.

 

Device capability

Optimal application responses for laptops, tablets and smartphones are not alike. For example, Apple’s IOS, the operating system found on iPhone’s and iPad’s, cannot consume web applications developed with Adobe’s Shockwave Flash. Nor can they interpret web applications developed in Microsoft’s Silverlight. The application delivery network must concern itself with the unique requirements of a growing list of end user device types and ensure the devices are connected to the appropriate service. Failing to do so leads to poor end user experience – errors, confusion and disappointment.

 

Real time analytics

Analytics provide enterprises with operational visibility. However, unless that visibility is derived from real time behaviour, includes detailed application and end user device information, then the data is of little use. Only end user experience related analytics can be used to measure successful application delivery. The analytics must include performance, operating system and web browser versions, network and application responsiveness, to be useful in determining service levels.

 

With a broad range of devices to support and varying remote network connectivity problems, IT departments must deliver access from anywhere and on any device securely, fast & always available, 24 hours a day. Solving todays application delivery issues requires intelligence in the network, delivering:

 

  • Application awareness: Total insight into how the application is supposed to look on the wire
  • User awareness: The ability to see which users are trying to access what application, from which devices.
  • Resource awareness: The intelligence to tie all the pieces of the application delivery infrastructure together to provide real-time visibility into the entire Application Delivery Network.

 

There is little strategic about the unintelligent forwarding of packets form device to device as performed by network load balancers. Gartner's Mark Fabbi shares this view, "Cisco's move limiting Application Control Engine development shows that the time for stand-alone load balancers has passed. IT leaders should focus on leveraging more advanced application delivery controller features to improve application deployments."

Thursday 2 May 2013

Big data is booming, but context is king

Big data is booming, but context is king | F5 DevCentral

 

The big data phenomenon is something that we at F5 Networks have been banging on about for a while now – after all the network plays such a vital role in ensuring businesses really get the most out of big data by letting that information flow freely.

 

One of the drums we have been constantly beating is that context is king; analysing big data is one thing but applying context to it, by tying together information from multiple sources, is the best way of really understanding it.

 

A report from the team at Gartner recently revealed that 42% of IT leaders have already invested in big data technology, or are planning to do so over the next 12 months. Interestingly the report added that a better understanding of big data – such as what it actually is and the benefits it can bring to an enterprise – will continue to drive adoption of these analytical technologies.

 

An article on Computer Weekly said the report went on to state that: “Organisations are becoming aware that big data initiatives are critical because they have identified obvious or potential business opportunities that cannot be met with traditional data sources, technologies or practices.” http://www.computerweekly.com/news/2240179450/Big-data-understanding-drives-spending

 

It’s great that businesses are identifying where big data can improve their decision making but as we keep saying that is just one step of the process. For a business to achieve decent return on investment (RoI) from its big data initiative there are many other aspects to consider.

 

One of the most important is getting the right infrastructure in place to ensure all that data can get from where it resides to where it needs to be without any hiccups. Many of the services that will be collecting the data – such as social media sites, CRM systems and so on – and the platforms to analyse them are hosted in the cloud.

 

This means application delivery becomes more important than ever; it helps all that traffic flow around the network, getting it from where it originates to where it’s analysed and finally to where those insights are acted on. That’s how to get the best out of big data, and where IT bosses should focus at least some of their energy when looking into big data technologies.

 

As big data matures from a massively-hyped buzzword into a technology that can actually benefit businesses it is vital that companies don’t ignore the context of all the data they are collecting and analysing. The best way to do that is to ensure the right applications are allowed to work as they should. That is the best way to ensure truly user-centric information in the era of big data.

Wednesday 1 May 2013

Infosecurity Europe 2013 - Interview with F5's Tim Hearn

Infosecurity Europe 2013 - Interview with F5's Tim Hearn | F5 DevCentral

 

F5 Sales Director, Tim Hearn, takes a seat to discuss working in the Public Sector.

Infosecurity Europe 2013 - chat with Cenzic's Stephen Bishop

Infosecurity Europe 2013 - chat with Cenzic's Stephen Bishop | F5 DevCentral

 

Stephen Bishop from Cenzic stopped by our stand at Infosecurity Europe 2013. We grab a few minutes of his time to talk about the F5/Cnezic partnership and our awesome joint solution.

 

Infosecurity Europe 2013 - Security discussion with JJ

Infosecurity Europe 2013 - Interview with JJ | F5 DevCentral

 

Taking 5 minutes to talk with F5 Security Solution Architect, Joakim Sundberg (JJ), at Infosecurity Europe 2013 in London.

 

Saturday 27 April 2013

'Going postal' in the age of the Internet

'Going postal' in the age of the Internet | F5 DevCentral

I check my post once a month. The post box, like for most people, is at the front of my house. But my driveway and daily entry/exit is at the rear of the house. Consequently, going to the letter box is a planned event. I know this makes me sound a bit lazy but let me present an argument in my defence.

Effort vs reward

Refer to this crude but effective effort vs reward chart - I've added a couple of points for context. Monday's are definitely high effort/low reward. Don't get me wrong, I love my job. But at the end of every Monday I always feel like I've been very busy and yet not actually removed anything from my To Do list. Typically, its a planning day. And then there's my most favourite thing ever, eating steak. The array of cuts, sizes, sauces. A veritable playground for the senses (Hey there vegetarians - just think of something else nice). But I digress...

Collecting the post occupies approximately 2 minutes of my time. While this is not very long in comparison to, say, my 90 minute journey to London, or, the torture of watching test match cricket, I remind you of the effort/reward chart. +90% of my post goes straight in the recycling bin. ~5% is not hugely important but is read and then shredded. Leaving the final ~5%, bills: Council Tax, Water Supply, Electricity,…..  Why would anyone like the postal service? My postman Tony is a pleasant chap but maybe my positive thoughts toward him could be best described as Stockholm Syndrome?

Bills: a process of informing the general public they have less money than they first thought. But all those listed above, typically utilities, can be, as I have done, set up as direct debits. So, why the post? The bill opening anxiety is not necessary! Begging the question, what is left for the post (all Hallmark days are being omitted intentionally - bah humbug and all that)?

I don't want to receive post, EVER! Its not necessary. But for such a grand change to happen there are a couple of other steps in the way. The first being my 92 year old grandfather. He doesn't have an email address and has never been on the internet. He's an admirable and well respected man but I doubt he has ever sat in front of a keyboard and he prefers to communicate via written letter than via telephone. The second being the need for a government-run email directory as a primary contact point for all - possibly linked to one's National Insurance ID or drivers license record. And lastly, but certainly not least, there's the need for always-on and always-secure access to the Internet.

Matt Warman, Consumer Technology Editor at The Telegraph discusses a small step forward in making this a reality in, "Web access could be a human right". I do hope this becomes a reality while I'm still kickin'. The sad truth is that moving beyond the postal service can only work when it works for everyone. To help get there, in the mean time, surely the utility providers and government departments could provide an opt-out service. I would happily sign up for online communication, owning the responsibility to check my emails regularly. Wouldn't you?

Thursday 25 April 2013

Infosec 2013 – The BYOD Discussion Continues

Infosec 2013 – The BYOD Discussion Continues | F5 DevCentral

 

This week at Infosec has been a great opportunity to talk to fellow security experts and businesses alike and it’s no surprise that BYOD has remained top of the agenda.

 

In fact, our survey of 120 attendees during the first day of the event revealed that BYOD tops the challenges that IT leaders are facing when trying to secure their networks and devices. 87 per cent highlighted that it is more difficult than ever to secure their business from the threat of cyber attacks, with almost one in four citing the BYOD trend as the major factor in why their organisation is more vulnerable. It’s also no surprise that a high percentage of visitors to our stand this week came to talk to us about BYOD.

 

This may seem shocking to many – the BYOD debate certainly seems to have been going on for years. However, businesses of all sizes are continuing to negotiate the tricky process of managing new devices on the network and putting in place the right levels of authentication to enable the workforce, without too many restrictions for access. It’s certainly true that the introduction of smartphones, laptops and tablets to the workplace has undoubtedly been a huge step forward in enabling mobile working – but it’s also come with its fair share of threats to the business.

 

The good news is that there are all-encompassing solutions for businesses in the market but the solution doesn’t end there. It’s easy for me to talk to IT managers and CIOs about the solutions which are available through technology, but the processes set out within the enterprise environment are also key. It’s not a case of one size fits all. The number one focus for anyone looking to implement a BYOD solution has to be to first understand the user base and their needs. What types of device are they using? Where are they accessing information from? What type of data are they accessing remotely? Once you understand the workforce you can map your solution to ensure the right levels of authentication to protect the network and ensure the best possible end-user experience.

 

It’s been great to speak to so many businesses this week about the challenges they are experiencing and it’s good to hear that more businesses are looking at how they can better enable their workforce. Success is in the detail, though – it’s not a case of buying a solution to tick a box, it’s about establishing what your organisation needs and how you can better support your employees. If you keep that focus in mind, you won’t go far wrong.

Sunday 14 April 2013

Google antitrust pressure

Latest | UK | Technical Blogs | F5 DevCentral

 

On the 7th of June, 2004, the European Commission of the European Union filed a case against Microsoft for abuse of its dominant position in the market. It started in 1993 as a complaint from Novell of Microsoft licensing practices with a ruling not decided until the 17th of September, 2007. Thats fourteen years of what I can imagine to be a lot of lawyers fees.

 

But it wasn't all over for Microsoft, on the 6th of March, 2013, the European Commission fined Microsoft for non-compliance with browser choice commitments. The EC showing how serious it is about antitrust and proving that its initial case was not just a very public slap on the wrist.

 

But we are far from finished with antitrust cases from the European Commission and now it’s Google in the spotlight. From the FT yesterday, Google in peace deal with Brussels, "Google is bowing for the first time to legally binding constraints on how it presents search results, according to a draft agreement with the EU’s top competition authority.

 

Several people familiar with the deal told the Financial Times that the US internet giant will revamp its results page to include prominent links to rival search engines and clearer signposts for its own in-house services."

 

While fair trading is clearly important to the EU competition authority, are they going too far? Google's search engine isn't forced upon me in any way. I make the decision to trust Google with my questions because I'm happy with its results; it’s never let me down. Furthermore, I use their web browser, Chrome, which, yes, does default its search queries to Google's search service but this was my choice also and, equally, I am provided with the option to change search engine preferences to another provider. One of the many reasons I like Chrome. Its pro-choice!

 

Should fair trade regulation replace letting the best man (service) win? I choose no!

Tuesday 9 April 2013

Don’t forget the network in this Big Data rush

Don’t forget the network in this Big Data rush | F5 DevCentral

 

Big Data is one of those buzzwords that comes along every so often and which those in the technology industry like to grab hold of. Think social enterprise. Think cloud computing.

Essentially Big Data is the collection of vast data sets – data sets that are so large common data processing tools simply cannot cope with the capture, storage, analysis and so much more required to take advantage of it.

But like many subjects that get hyped up to a huge extent, Big Data seems to be suffering from an identity crisis. For example, a report released in April 2012 by The Centre for Economics and Business Research (Cebr) claimed that Big Data could add £216bn to the UK economy by 2017, as well as create 58,000 new jobs.

 

However, on the flip side is the fact that another survey revealed 38% of IT managers said they did not have a clear understanding of what Big Data actually is. That did not stop 49% of them saying they were very concerned about managing Big Data.

 

The explosion in the use of smartphones, cloud computing and social networking means more data than ever before is being created and stored. But one aspect of this seems to be often overlooked: the network. To get the best out of Big Data, businesses must enable all that traffic from applications and so on to move freely across the network.

 

Here at F5 we are helping enterprises get the best out Big Data by ensuring that traffic and therefore all the data it is carrying gets where it needs to go in the most effective and cost-efficient way.

 

The recent announcement about updates to our Application Delivery Controller (ADC) included the new VIPRION 4800 chassis. It offers rates exceeding 20 million layer 7 requests per second and 160Gbps of SSL bulk throughput.

 

This throughput is vital to the health of your applications and networks. The network is vital to Big Data; you cannot get the right insights out of your data if it is not allowed the flow across the network and applications are not allowed to do what they need to.

 

The benefits of Big Data are clear – better customer insights mean increased sales. If you know more about your business and your customers you know them better and can offer them exactly what they want, even if they don’t know they want it. But to fully embrace it and its benefits you must ensure that your network is up to the challenge and can cope with the vast amounts of data that it will be travelling across it.

Creating IT Heroes

As an IT professional, technology evolution can be a blessing and a curse.

The constant conveyor belt of new products mean you have potentially a huge arsenal of tools at your disposal. But the demands of the business and the difficulties of where to place your technology bets means you’re constantly facing difficult decisions.

At the moment, we’re experiencing the most accelerated pace of IT change we’ve ever known. Cloud computing, big data / analytics, mobile and social are transforming the way we work and the way our businesses operate.

Yet, there remains a sentiment in some quarters that the IT department has lost influence in the business in recent years, is unreliable or is a barrier to progress, lacking the necessary knowledge to tackle and implement new solutions and infrastructures efficiently.

We think these trends and the technologies that support them, however, represent a massive opportunity. In fact, we don’t think there’s been a better time for an IT manager to shine, delivering real value to the wider business and transforming the perception from cost centre to business enabler.

The secret is in the enabler bit. The rise of trends such as BYOD and even Bring Your Own Cloud have led – quite rightly – to employees feeling increasingly empowered. They’re bringing their own devices into the workplace, using consumer apps for business purposes and sharing data externally using tools such as Dropbox.

Your challenge is to ensure that employees can continue to innovate and drive change in the way they work, but in a secure environment. As applications move around the data centre and out to the cloud, it’s easy for security and access policies can become disconnected, particularly when supporting an increasing number of personal devices requires additional policies. By consolidating security and access control at the application delivery tier,  you can consistently enforce policies while also improving scalability—to ensure vital services are available to users—across applications and environments.

IT has to be in control, but that doesn’t mean restricting the innovation within your organisation. By ensuring a secure but flexible IT infrastructure is in place with a defined set of processes, business units can incorporate technology which works well for their needs, and allows them to make their own IT choices.

In fact, although the transformation of IT can be a daunting prospect, it also offers a fantastic opportunity to build closer ties with other business units and develop a more collaborative approach. It’s not a time to wait for them to come to you – make the point of reaching out beyond the IT department to find out how you can better work with the wider team to support new digital initiatives in the company. Discuss your cloud, BYOD or security strategy with business unit heads and encourage them to put you in front of their team to better understand their needs and explain the central processes which they should follow.

The good news is that IT spend is continuing to increase. According to a recent global study from Gartner, global IT spending in 2013 will increase 4.2% compared with last year, reaching £2.28tn.

The IT heroes will be the ones who spend it wisely, enabling the business to carry on what it does best.