Cyber ​​Security Predictions- What to Expect in 2018


It is well known that the fourth industrial revolution opens up a multitude of new business opportunities. In parallel, the danger for cyber-attacks is also increasing. It is important that companies prepare for it.

Not only should they think about security solutions directly when planning IT technology, but they should also develop a keen awareness of the corporate culture for security – which requires significant investment. According to estimates by Gartner, security spending for 2018 will continue to rise sharply globally, reaching $ 93 billion. For the coming year, this means that Cyber Security will capture some of the key trends.


IT security experts are still in demand


As technology evolves, security expertise needs to adapt to changing needs. The challenge is to train cybersecurity specialists to acquire and develop the skills they need as quickly as possible. According to the Cyber Security Ventures Report, it is predicted that there will be around 3.5 billion unfilled cybersecurity jobs by 2021. The responsibility lies in the hands of governments, universities, schools, and companies to meet this need.


Protection and resilience


In this day and age, it is difficult to completely avoid security gaps. Therefore, you shouldn’t just ignore them, but make appropriate arrangements. As a result of this development, the resilience of the IT infrastructure will become more of a focus, and not just prevention alone. For companies, it is important to talk openly about their own weak points, to raise awareness and to show responsibility. Funds currently used to prevent cyber-attacks may need to be redistributed to detect security threats in time and to remain operational in the event of an attack.


Next-generation security solutions are driven by digital ecosystems


In IOT hype era, the protection of customer data becomes more and more important. Vulnerabilities exposing sensitive data can have serious consequences as companies will be held accountable for personal data in the future. This ownership is a major challenge for companies, and the responsibility to ensure a degree of security for their users lays on technology manufacturers. As the need for cybersecurity solutions and regulations grows, companies need to develop appropriate strategies to minimize any risk. These strategies should not only meet today’s expectations but also incorporate new business models promoted by new technologies.


Cyber-attacks increasingly sophisticated


Of the e-mails received, around 70% are spam and the majority of them contain phishing messages. Other known threats include rogue Trojan horses, malware or distributed denial-of-service (DDoS) attacks. Over the past few months, they have led to massive data loss and continued to make company or customer data vulnerable to cybercriminals. With 93% of the attackers, the money is in the center. Hackers try to gain the highest possible profit through simple tricks and are often successful in smaller companies with inadequate security solutions.


New technologies: a blessing and a curse at the same time


Innovative technologies enable cybercriminals to use sophisticated methods for their attacks. But these innovations can also help build and reinforce defense and protection against hackers. A major threat, for example, comes from artificial intelligence (AI) applications. However, AI can also be used to detect potential risks faster. How important AI is for IT security is an outlook on the global market for artificial intelligence solutions: according to a recent study, it will grow to $ 18.2 billion by 2023. Likewise, the Internet of Things, with an estimated circulation of 22.5 billion networked items, is both a driver of innovation and a door opener for increased threat potential, according to a Business Insider platform report. On the one hand, security becomes a challenge, but on the other hand, the data generated by Internet-enabled devices can help detect breaches early.


The focus is on vertical industries


While cyber attacks affect all sectors of the economy, there are still some key sectors that are likely to be particularly vulnerable to cyber attacks:


  • The Financial Sector, BFSI: (Banking, Financial Services and Insurance): The BFSI sector is under increasing pressure. This is due to competitors with digital assistances and the constant pressure to modernize their existing systems. The value of customer data is increasing as customers demand more comfortable and personalized service. Nevertheless, trust remains crucial. According to a recent study, about 50% of customers in the UK would change banks as a result of a cyber-attack, while 47% would completely lose confidence. Large-scale cyber-attacks have already left a large number of banks victims of a hacker attack. This shows that the sector has to adapt to these risks. So, it’s important that banks invest more in security solutions to ensure 24/7 protection.


  • Healthcare: More and more patient is having digitized medical records. In addition, artificial intelligence and web-enabled devices will increase the speed of diagnosis and improve patient care. However, the integration of personal data and Internet-enabled devices also involves risks. Earlier this year, Experian predicted that the healthcare sector would be the most affected market by cyber-attacks, as some examples have already shown. This means that the health sector should similarly invest in risk analysis as the banking sector. In addition, the implementation of industry-wide standards is needed.


  • Retail: In the retail market, customized shopping experiences are becoming increasingly important, so data analysis tools help retailers implement them. However, there is also a great responsibility to protect this data, which can include more than just shopping habits and login data, but also account details and addresses. Thanks to Internet technologies, augmented reality and face recognition, the shopping experience is becoming increasingly networked, but here, too, stronger networking also entails a greater risk of data loss. Therefore, the creation of a resilient strategy approach is also crucial for the retail sector.


  • Telecommunications: Telecommunications companies as Internet service providers are among the industries that are at increased risk for cyber-security. They should include security measures in network infrastructure, software, applications and endpoints to minimize the risk of customer vulnerabilities and data loss. Nowadays, consumers are increasingly wondering who they entrust their data to. For service providers, this is a good opportunity to provide additional security services. In addition, a collaboration between competitors may increase cyberattack resilience.


What does this mean for the year 2018?


Overall, it can be seen that companies in all industries, as well as individuals, need to improve their cybersecurity awareness, identify the risks, and take appropriate countermeasures. Key competitive advantages are companies investing in security solutions. At the same time, cyber-security must also become an issue for state governments and at the international level where laws and regulations must be adapted accordingly. In addition, governments must invest in training and education or disclosure of cyber-threat threats.

Enterprise Endpoint Security – Rules to Protect from Advanced Malware and Security Breaches

Enterprise Endpoint Security

Businesses struggle to protect themselves from security breaches. They implement various security tools and solutions to protect their networks, applications, clouds, and endpoints. They strive to comply with regulations. Their security teams are combing seemingly endless security alerts. Nevertheless, there is a steady increase in successful cyber attacks. Palo Alto Networks, Gartner Magic Quadrant Firewall Leader for Sixth Year, takes a close look at the enterprise security for endpoints, which are still in the hands of antivirus solutions in many places.

Palo Alto Networks notes that threats and attackers have evolved, but many security solutions have not. The current threats are more sophisticated, more automated, cheaper to run and can take various forms. The attackers act in a larger style and at a faster pace. Many companies are not prepared for this. All this has escalated in recent years, according to Palo Alto Networks, while many security tools, solutions, and platforms have maintained the same practices as decades ago. Antivirus is a perfect example of how an approach is increasingly unsuitable for protecting systems from security breaches.

The following are the four key requirements that Antivirus cannot address, but which should cover an effective endpoint security solution:


  1. Cybersecurity incidents are on the rise, without any end!

To control security breaches and data loss, companies implement a range of different security solutions on the endpoints. Unfortunately, these solutions, and in particular traditional antivirus products, are struggling with the protection of enterprise systems – and often fail. This has led to an increase in the frequency, variety, and complexity of security breaches.

The security industry focuses primarily on improving detection and response time, which means that only the window is narrowed down from the time of an attack to the time an attack is detected. This does not add much to the need to protect valuable data before a company suffers a security incident. In order to reduce the frequency and impact of security incidents, there must be a shift away from post-incident detection and response, after critical resources have already been compromised, and towards prevention. It is important to prevent the attackers and threats from ever entering the company.


  1. Antivirus solutions aren’t effective in case of preventing successful cyber attacks

Cyber attackers often use free and cheap tools to generate new and unique, encrypted or polymorphic malware that can bypass detection by traditional signature-based antivirus programs. Attacks using unknown exploits and zero-day exploits are able to dodge antivirus protection. To protect against such techniques, an effective endpoint security solution must be able to protect the endpoints from known and unknown malware and exploits in the core phase of the attack.


  1. Mobile users increasing demand from businesses to secure endpoints outside the traditional networking edge

Organizations are opting for cloud-based software-as-a-service (SaaS) and storage solutions to connect to internal resources from anywhere in the world, both within and outside the company’s network. These services and solutions synchronize and distribute files across the enterprise, streamlining enterprise data processing and sharing. But they may also burden the entire company with malware and exploits. Threats such as malware distribution, accidental data disclosure, and exfiltration contribute to this threat in SaaS applications.

Cyber-attacks target end users and endpoints where the network is not fully observable, so employees outside the corporate network are more likely to encounter malware. To address these threats, endpoint security must also protect the systems beyond the traditional network perimeter.


  1. Enterprises have problems with patch management and the protection of end-of-life software and systems

Weaknesses in applications and systems can always be expected. The problem is that vulnerabilities exist long before the release of patches and the implementation of patches, critical or not, is not guaranteed. In addition, companies that use legacy systems and software that have reached the end of their useful life are particularly vulnerable as security patches are no longer available. As a result, these companies can be exposed to risks that are unknown and difficult to control.

Situations such as these pose an opportunity for attackers to exploit these vulnerabilities and compromise unpatched applications and systems. With the growing number of software vulnerabilities discovered each day and exploit kits available in the underground market, even “hobbyists” have the ability to launch sophisticated attacks. Protecting un-patched or legacy systems and software requires an effective security solution that defends against both known and unknown threats.


Three ways to measure endpoint safety


Companies should choose security products that deliver both total costs of ownership and security effectiveness. This effectiveness is measured by the ability of the technology to perform at least these three core functions:


  1. Performance of the intended function

Does the technology provide the security function it should perform? Two primary attack vectors are used to compromise endpoints: malicious executables (malware) and vulnerability exploits. Effective endpoint security products must ensure that endpoints and servers are not compromised by malware and exploits. They also need to prevent both known and unknown variants of malware and exploits.


  1. Essential resolution

Does the solution prevent attackers and users from bypassing its security features? No security tool or security technology is designed to be easily bypassed. If attackers or end users are still able to bypass the intended function of the technology, they will not fulfill their original purpose. An effective endpoint security platform should not allow attackers to bypass security or cause performance problems that could cause users to disable them.


  1. Flexibility

Is technology evolving to cover and protect new applications, systems, and platforms? A few decades ago, the frequency and complexity of cyberattacks were rather low. Endpoint security tools are designed to prevent viruses from infecting the systems. However, today’s threat landscape is radically different, reducing endpoint security tools such as antivirus programs to reactive detection and response tools.


Security products must take a proactive approach to adequately protect endpoints. In order to reduce the frequency and impact of cybersecurity violations, Palo Alto Networks believes that accent must be placed on prevention.

Businesses should choose security products that offer the highest level of security. The effectiveness of a security solution can be measured by its ability to meet the three requirements above. A state-of-the-art endpoint protection solution is capable of doing so and can easily handle the above-mentioned four security challenges in enterprises.

Everything You Should Know About #Chatbots

Innovation is everyone’s business … The growth of any organization is based on the innovations that they are able to bring to the industry. For now Bot’s revolution is on the march: Gartner predicts that by 2019, ¼ of households in developed countries will use a bot as a privileged interface for access to services at home (personal service, Food delivery …).

Everyone talks about chatbots … but what is a bot? Before explaining a bot, let’s begin by emphasizing the difference between bots and Artificial Intelligence which are two separate subjects. If they work well together, they are nevertheless two distinct things.


A bot is a program that automatically interacts with a user: the coffee machine is one, for example. When a button is pressed, it produces coffee mechanically. During a conversation, chat, messaging, in a community, anywhere … you can have bots that respond to a human in the place of a human. This concept that generates all the current buzz is now an essential force of the Customer Experience.  A multitude of learning and research technologies have been in existence for decades, enabling the bot to continue to learn and develop through the huge number of databases.

The idea of ​​today is that a bot can be inserted in a conversation in such way that one can no longer distinguish the bot from a human, by responding in the same way, for example, or by allowing the bot find relevant content in the sense that it will have drawn from the user’s sentences.


Artificial Intelligence affects everything that comes close to human behavior. Understanding language, being able to formulate sentences, to disseminate meaning and emotions through written and oral language are at the heart of Artificial Intelligence.

It also deals with the recognition of images and their interpretation: knowing how to recognize shapes, colors … In all fields of Artificial Intelligence’s application, the most useful for the bots are those that revolve around the Language: NLP (Natural Language Processing), which allows the bot to understand the user’s language and the NLG (Natural Language Generation), allowing the bot to express itself.

Very important for the bot too, machine learning ensures its learning from a knowledge base, upgraded from various sources, and allows it to optimize itself. In short, Artificial Intelligence is a tool in the service of a bot so that it becomes more and more efficient.


The integration of chatbots today is one of the key to the success of the digital client relationship

At present, 55% of Internet users use instant messaging on a daily basis. For the thirties generation, webchat and social media are the first channels of contacts. Within five years, it is expected that up to 80% of our uses will be via conversational services.

Today, among the 5 applications most downloaded 4 are applications of instant messaging … The messaging is thus about to anticipate all the other channels of communication and the Chatbots open immense opportunities to enrich or reinvent the Customer experience: they are the natural extension of virtual assistants. In a context where developments are only accelerating, Chatbots are a new and more modern form of assistance to consumers.

The Virtual Assistant or Dynamic Frequently Asked Questions has appeared many years ago on websites. Some virtual assistants are very popular and part of the natural landscape: before Siri, Cortana and Google Now, there was already Lea at the SNCF, Laura at EDF, Lucie at SFR … and the Chatbot is none other than the deployment of this same assistance on every new platforms in which one should no longer hesitate to invest. Flexibility and experimentation are the only means to stay at the forefront of the digital market and to move ahead in a market that is constantly changing.



The chatbots: the next step in the evolution of our habits


It is necessary to design the bots not as a function in vogue to test but as a next step in the evolution of our habits of research and relationship. To do this, we must first understand our habits in order to develop bots adapted to them.

The robot must above all be relevant by all the high-performing tasks it can perform. Companies must think of the bot always according to the client’s journey: to identify when to involve the bot and to define its objective. The introduction of a bot involves first a study of the client’s problem: an examination of the context and the typology of the contact. Then, there are several essential steps when designing the bot itself: studying the point of contact, identifying what is inducing flux and analyzing the origin of the audience, and then working on the “design” of the bot. The development of bots opens up real opportunities to better serve the customer.

Conducted tests showed that 80% of users accepted a first level of automated responses. What matters is that the relay is established “without friction”. The bot simplifies the first level of contact for the agent by precisely qualifying and routing the request. The agent who will follow the conversation will be able to devote his expertise and his time to deal with more complex situations, to trigger specialized interfaces that will enrich the client’s journey, and to live a relationship around interest or passion client. Thanks to Artificial Intelligence and bots, which will be able to group the clients into thematic clusters, the agent will be able to offer advice tailored to several people at the same time, optimizing his time while organizing communities of customers. Our navigation habits and our uses are continually evolving. The bot and the messaging create a considerable added value in the quality of our future conversations .

10 Gartner forecasts that will mark the IT in 2020

On the occasion of its Symposium / ITxpo (CIOs and senior IT leaders annual gathering) from 16 to 20 October in Orlando, the research firm Gartner announced 10 tech predictions for 2020. Gartner analyst reveled tech insights to help next gen IT teams and help to develop business.

One of the strong massage Gartner highlighted during the Symposium / ITxpo was the rapid adoption of augmented reality, web browsing, increased digital capabilities. According to the consultant, many users expect that companies, universities and governments implement these changes in near future.



These are the 10 short-term forecasts announced by Gartner during its annual conference:


    • By 2020, 100 million consumers will shop in augmented reality environments
      Augmented Reality, known as the integration of digital information with user’s environment in real time, “will cover data”, told Daryl Plummer – analyst at Gartner. For example, when you enter a supermarket, “information on the various products will float in the air in front of each of them,” so consumers can check virtually before buying them. The AR will also be used in online shopping. Gartner predicts that by 2017 one in five global leading brand will be using augmented reality. Today, viewers can already see AR applications in football televised games, with new indicators displayed on the screen during games.


    • By 2020, “We will talk more with robots than with our spouses
      More concretely, for IT managers, this shift interactions to the voice exchange means that within four years, 30% of web browsing sessions will be done without screen. This is what is already being used by Alexa voice service of Amazon, and Google Home with the Echo device. But Gartner predicts that by 202 room-based screenless devices such as Amazon Echo and Google Home will be in more than 10M homes “This growing need for voice communications to interact with the Internet raises many questions” statement given by Aren Cambre, who heads a research group on Internet technologies at Southern Methodist University. “So far, all data representations have been designed for visual display,” he added, but it is not known yet how this will work non-visual interaction to use the services. “For example, how will a student ” see “his notes with Alexa? Or, how will he be authenticated? These are some important questions that we need answers before any shifting.


    • By 2019, 20% of brands will abandon their mobile applications
      “The applications shall be no more first class marketing support for major brands,” said Daryl Plummer. For many Gartner clients, already, apps were not up to the expectations of companies,” he added. “In addition, the app stores are full of apps, and it is very difficult to find a truly exceptional or indispensable app.” Plus in many cases, the maintaining cost of app is still higher than the profit. “Companies will turn more towards the mobile Web or will call on” Progressive Web Apps” just like Google. “When the user connects to a website from a mobile device, a framework will be downloaded in their mobile, and the next time they sign in, the app will work instantly,” said Daryl Plummer. Updates will be automatic. Don’t panic, the Apps are not going away, but “we get kind of in a post-app era,” he added.


    • The companies will use algorithms that will aim to “provide constructive help to the billions of worldwide workers”
      This system will work as a virtual assistant and by the end of 2017 the algorithms will allow commercial organizations to increases in profit margins by alerting employee’s behavior positively.


    • By 2022 the value of blockchain-based organizations will exceed $ 10 billion
      Blockchain, a public register of financial transactions, will enhance and promote the development of “major EU trading operations.” Because it helps to increase transparency and trust in transactions, blockchain technology will promote the development of large “ecosystems”.


    • By 2021, 20% of all individual activities will involve at least one of the top seven digital giants
      According Gartner, these 7 companies are Google, Apple, Facebook, Amazon, for the United States, and Baidu, Alibaba and Tencent, for China. These companies will be leading in IoT adoption and implications. This means that consumers will depend more than ever, on the large IT services companies via sensor based devices from these digital giants. Not only business but by 2020, 20% of homes will dispose more than 25 IoT and connected home solutions as well.


    • Investments in innovation won’t be cheap at all
      Gartner estimates that for every 1 dollar spent on innovation, it will take 7 dollars for its implementation. Especially because data centers have not been modernized, and it may have to resort to new and unknown technologies such as machine learning. “This also means that IT service providers will have to develop and modernize their skills to use these new technologies,” said Daryl Plummer.


    • IoT data will cause a slight increase in demand for storage
      The Internet of Things will produce a lot of data, but by 2020, the additional storage demand will increase by less than 3%. Indeed, most IoT data will not be stored, and algorithms will know what data should be saved.


    • By 2022, the IoT will save $ 1 trillion per year for consumers and businesses
      As a business, saving maintenance, services and consumables coasts is one of the biggest goal. For example by using sensors (IoT devices) it is possible to predict when it’ll be easier to predict material maintenance etc.


    • The use of fitness trackers will expand
      By 2020, Gartner estimates that 40% of employees will be able to reduce or cut off their health care expenses by wearing a fitness tracker.



IoT: Biggest Revolution in Retail

If the IoT represents a huge opportunity for almost every facet of the business, this is particularly true for supply chain specialists, operations and analysis. The leaders of e-commerce and traditional commerce see an opportunity of competitive advantage in IoT.


Even though I’ve already wrote about IoT in my previous posts, let me give you again a quick definition of it. In 1999, Kevin Ashton (MIT Auto-ID Center) describes the Internet of Things as a network of interconnected objects that generates data without any human intervention. Today, Gartner describes the IoT as “the network of physical objects containing embedded technology to communicate, detect or interact with their internal states or the external environment.”


estimates for IoT revenue by region in 2020

For some IoT is only a new name of an old concept, the only thing which has recently changed in this existing concept, is the evolution of Cloud technology. According to a recent survey by Gartner, IoT is one of the fastest-growing technological trend. Estimation says that by 2020, the number of connected objects will be multiplied by 26 to $ 30 billion. Main reason behind IoT success is the development of solutions based in clouds; which allows to actually have access to the data generated by the connected objects.


The growth of IoT relies on three levers: reduction in integrated chips costs, technologies supported by a cloud platform and powered by analyzing Big Data and finally the Machine Learning. A case study of IBM named “The smarter supply chain of the future” revels that in near future the entire supply chain will be connected – not just customers, suppliers and IT systems in general, but also parts, products and other smart objects used to monitor the supply chain. Extensive connectivity will enable worldwide networks of supply chains to plan and make decisions together.


The main objective of such connective supply chain is to gain better visibility and to reduce the impact of volatility in all stages of the chain and get better returns by being more agile product flow. Several developments are already underway in the IoT and are revolutionizing the retail supply chain at various levels:


At the client side: integration of end consumer in the IoT. The main objective of this step is to collect customer data to create customized product, personalized offers while simplifying the purchasing process. Devices such as health trackers, connected watches etc. continuously collect the data from consumers, prescribers. The collected data represents a great opportunity of positioning product/services. For example, from a person’s browsing history, its culinary tastes and influences on social networks, information on a nutrition bar can be offered to him. Recommendations may also be appropriate if the person enrolled in a sports club or acquired a fitness tracker and so on.


As for retailers: Beyond the preparation of the assortment by merchants, there are smart shelves and organization of sales outlet. Moreover, we are witnessing a rapidly changing purchasing behavior so with smart shelves a retailer’s system can analyze inventory, capacity and shipment information sent by suppliers. Via the predicted system retailers and suppliers can avoid costly out-of-stocks or missed sales.

To take the example of nutrition bar, time spent in front of a specific category of products (yogurt lightened for example) can be an early indicator to change suggestions or promotions. In addition, the integration of the retail IoT can allow the line to automatically trigger orders. The whole environment can be configured to access a library of planograms, to store inventory data and related warehouses to automatically run restocking. As the elements of this environment are already used independently, we can predict that we are at the dawn of IoT in retail.


If the store are at a less advanced stage in the application of IoT, transportation and warehousing are well connected. The integration of RFID shows a first generation data-oriented machine. Integrated tracking systems have long been used in transport and warehouse systems. RFID tagging of pallets has to have better visibility on the status of stocks and the location. The convergence of demand signals and increased visibility on the state of stocks and their location results in scenarios such as the anticipated shipment for which Amazon has filed a patent. Increasing integration of IoT can lead to efficient use of robots for material handling and delivery by drones. These innovations are challenging the effectiveness of existing systems by optimizing the machine learning an effective alternative.


Even with all the benefits it promises to offer companies, IoT is still a gamble, with big risks and unsolved problems. For any organization that decided to embark on the IoT, a number of questions remain open whether in technology, integration with file distribution systems to traditional ERP API to communicate with sensors and application languages ​​(Python, ShinyR, et AL.)


There are several interfaces that work well in specific areas, but it needs more standardized platforms. Industry experts have launched PaaS (Platform as a Service) to integrate this growing IoT technology. Despite these challenges, the technology seems a surmountable obstacle. Only the legislation on collected data is a real problem so far. Even the customer acceptance remains a challenge. In 2013, Nordstorm had to backtrack on his program which was to track customer movements by the Wi-Fi use on smartphones and via video analysis due to customers demand.


Finally, the important thing to remember is that the IoT is a revolutionary technology. A lot of expert retailers, e-commerce players and technology solutions providers will rethink and adapt the model and evolve in processes designed for organizations wishing to adopt the IoT. Retailers that take the lead in this space stand to gain an important advantage in an already competitive environment. Early adopters will be positioned to more quickly deliver IoT-enabled capabilities that can increase revenue, reduce costs and drive a differentiated brand experience. The IoT will be a disruptive force in retail operations.




The Smarter Supply Chain Of The Future

The CEO Perspective: IOT for Retail Top Priorities to build a Successful Strategy

Hybrid Cloud Myths Busted

Often presented as a third path between the private cloud and public cloud, companies, consulting firms, suppliers and hosts have started to take their interest hybrid cloud. What is the hybrid cloud? There is no strict and standardized definition of what the hybrid cloud is, each player on the market (consulting firms, hosting companies…) have their own definition.




For Forrester, the hybrid cloud presents itself as “an IT infrastructure model in which at least one external cloud service is integrated with an application, data source, or internalized infrastructure element”. For Gartner, “Hybrid cloud refers to policy-based and coordinated service provisioning, use and management across a mixture of internal and external cloud services”. Basically, it’s a mix use of public and private cloud which are used together to create value.

benefits of Hybrid cloud

Combining the benefits of public clouds such as agility and low cost, with the strengths of private clouds (control, performance and safety) the hybrid cloud brings the best of both technologies. These assets play an essential role in the success of companies, even if few of them still wonders what really a „hybrid cloud“ is. Two options are offered to businesses: get on the board or remain docked. To see more clearly, I propose to demystify the five major myths that usually surround the hybrid cloud.


Private + Public = Hybrid:


It is not enough to place together these two infrastructures to create a hybrid cloud. In fact, you may not gain any of the respective advantages of both types of clouds but end up multiplying the risk by both of them! First, by moving secure data to the public cloud, security breach can result in brand damage and loss of customers’ trust, and requires significant time and effort to remediate; secondly, migration of apps from a public cloud to a private cloud can lead to unexpected costs. By having a hybrid cloud, you control your workload, your network and storage resources while minimizing risk and increasing productivity.


A Hybrid Cloud is Complex and difficult to implement:


The use of complete IT solutions allows you to reduce complexity and to choose standard technology – (Microsoft, OpenStack, Vmware) on which your hybrid cloud is standardized, but also the type of public cloud with which the private cloud deployed on site by customer can interact. A complete solution accelerates three essential elements of development: – Integration of end-to-end testing to verify that all components work together; – Use of a converged infrastructure that simplifies the implementation and deployment; – Predefined plans for services, with workflows that must automate provisioning through a self-service portal.


The public cloud is more cost-efficient:

Cost savings via Hybrid cloud

A New study by IDG Research Services shows that if we take into account the governance issues, risk and compliance, the hybrid cloud displays in fact a lower total cost of ownership. When data or workloads migrate to the public cloud, it is easy to override local or international regulations on data protection. The local laws and requirements vary from market to market, and some are so complex that companies simply prefer to avoid public clouds. May be that’s why you may want to choose private cloud for sensitive workloads. In Germany for example, the rules on how data is stored and processed are especially strict. The solution lies in how to mix public cloud and private cloud offering each workload the advantages of one or the other, depending on their requirements.


On the cloud, the data control escapes you:


While extraction or data migration can be difficult via some particularly cloud service providers, a well-orchestrated hybrid cloud environment enable you to keep hand on your work. A well-managed hybrid cloud can provide quickly required public and private resources, provide IT departments a high level of visibility and control, as well as self-service and on demand access for developers and applications users.


It is difficult to know which applications are suitable for cloud:                


Companies are often hampered by the critical interdependencies of IT infrastructure, ignorance of their IT assets and their relationships to business applications. With a simple spreadsheet and without rigorous methodology, it’s impossible to know precisely if an application is suitable or not for cloud – and even less to know the position in a cloud architecture. Experts who use automated platforms for collecting and analyzing data can provide a complete comprehensive view of the application portfolio and tell whether you need to migrate, consolidate, modernize or simply stop the use of an application.          


hybrid Cloud as digital transformation


Even if the definition of hybrid cloud is still unclear, its undeniable benefits in terms of agility and cost reduction are now the essential model of tomorrow. Companies that are preparing or starting their digital transformation have every reason to anticipate a future adoption and now choose technologies that will integrate public and private worlds, i.e. converged infrastructure and proven software solutions.



Cybersecurity and Digital Businesses Transformation

In a special report on digital business transformation and cybersecurity, Gartner affirms that as organizations migrate their business to digital, a lack of directly-held infrastructure and services outside of IT’s management can ought to be self-addressed by cybersecurity. “Gartner predicts by 2020, 60% of Digital Businesses will suffer major service failures due to the inability of IT Security Teams to Manage DigitalRisk




As Digital Transformation initiatives gain pace across the world, the threat of cyber-attack grows in tandem. Further risks stem from the evolving business and regulatory requirements and technology trends that are posing new cybersecurity challenges and endangering the success of digital programs.


We all know today’s business depends on technology and digital systems are now lifeblood of an organization. With that being said, Paul Proctor, vice president and distinguished analyst at Gartner, affirms that “Cybersecurity is an important part of digital-business with its new challenges in an open digital-world“.

Organizations leaders must realize that it’s time for a fundamental rethink of how cybersecurity is positioned and understood within their organizations and which innovation they must do to survive digital risks.


Let’s have a look on 5 key areas of focus, identified by Gartner, to address successfully cybersecurity in digital business:


Hard to admit, but the perfect protection is not feasible. Gartner states that 60% of cyber security budgets in the companies will be dedicated to the early detection of threats in 2020. This is less than 30% in 2016. “Organizations need to detect and respond to malicious behavior and incidents, because even the best preventive controls may not prevent all incidents, “says Gartner.


  1. Improve the leadership and governance : Improving leadership, getting governance right, making security a board-level priority, measuring leading indicators to catch problems while they are still small, is more important than the development of tools and skills when it comes to cybersecurity and technology risk in digital business. Governance, data infrastructure, decision making, prioritization, budget allocation, awareness, budget allocation, reporting, transparency and accountability are key features to protect and run any business.
  2. Adapt to evolving threats: In today’s connected, information-heavy world, organizations across all sectors are facing not simply escalating risk, but the near-certainty that they will suffer an information security breach. IT department must overcome the challenge to prevent all threats and risk management. Gartner predicts that companies will spent 60% of cyber security budgets to early detect threats in 2020 instead of waiting for the last minute. Only a sharp focus on business structure, culture and risks will let you better safeguard the data essential to your organization’s survival and success and prevent all nightmares.
  3. Alignment of cybersecurity at the speed of digital business: Organizations that adopt digital go at a faster pace than traditional companies. So the same logic must go for security systems, with that being said, the traditional security system will stop working in the new era of digital innovation. Organizations must invest in their security system in order to innovate them to avoid all obstacles. Companies are increasingly reliant on digital data to drive their growth. The “bad guys” have recognized this, have fortified their techniques and are enjoying significant success; while the “good guys” are still trying to fight a modern war! Having a well-defined security program can help management make an informed choice about how to invest in security. All organizations able to successfully establish an ecosystem that protect and grow business will remain competitive.
  4. Explore the new era of cybersecurity: Before it was perhaps easier to protect data because they resided exclusively in the data center. New technologies are now overflowing data outside via the cloud and mobile etc. For example, in 2018, 25% of company’s data will come directly from IOT (=from mobile to the cloud), and by circumventing enterprise security controls. Organizations must now respond to the issues of cybersecurity and risks of technologies and assets that they no longer own or control.
  5. People and Process – Cultural Change: As companies support productivity through the rapid integration of bring your own device (BYOD), cloud computing and other aspects of total mobility, there is a corresponding increase in the risk to which the information located on or accessed via these channels is exposed. With the acceleration of digital business and the power technology gives individuals, it is now critical to address behavior change and engagement from employees to customers. Internal threats to information security run from the inadvertent (simple user error, loss of mobile devices) to the malicious (internal fraud, data theft). Cybersecurity must meet the needs of people through the process of change. People-centric security gives each person in an organization increasing autonomy in how he or she uses information and devices — and what level of security adopted when he or she uses it. The individual then has a certain set of rights in using technology and is linked to the group in the entire enterprise. The individual must also recognize that if things go wrong, it will have an impact on the team, group and business.


Sources: Special report – Cybersecurity at the Speed of Digital Business

Artificial intelligence and connected objects, trends of the upcoming years?

Artificial intelligence

Artificial intelligence, great topic of the moment? Yet the term dates back to the 1950s! AI is the term used most commonly for Artificial Intelligence. The concept is to develop computer programs that perform tasks that are normally performed by human. The goal is to give machines (robots) ability to seem like they have human intelligence. I’m pretty sure that at this point we all have seen robots doing the grunt work in factories, intelligence driverless cars, and companies are using AL to improve their product and increase sales.


Since 2007, Gartner has been predicting key strategic technology trends for the coming years – not an easy task considering the rapid change in the IT market. According to a classification made by Gartner, Artificial Intelligence, Big Data, Cloud Computing, sensors, connected objects, smart machines and modern 3D printing are the key trends of the years 2016-2020. Automation and artificial intelligence figure prominently in the top 10 technology trends of the future presented by Gartner at its conference Symposium / ITxpo 2015.


Multiple devices, mobile to electronic devices via the connected devices and sensors are the first big trend mentioned by the research company. More and more devices are becoming connected and “resulting in smarter homes, smarter cars, smarter everything. IoT is leading to a point where “no object will just be an object—it will all be wirelessly connected to something else.


 Gartner expects more interaction between these connected devices via different networks in the coming years and beyond (via 4G + 5G technologies). The user experience and virtual environments comes in second position. According to Gartner, this presents a big opportunity and competitive advantage to IT developers and enterprises. 3D printing are third in this ranking, which isn’t yet a mature market, but getting stronger. Thus, global shipments of 3D printers for businesses should show 64% of an average annual growth rate until 2019.


Information on the massive data processing era (Big Data), followed by advanced machine learning and deep learning are also on the top 10.


“The explosion of data sources and complexity of data classification makes traditional (manual) analysis almost impossible and unprofitable for organizations. With artificial intelligence, the chances of error are almost zero in addition to that greater precision and accuracy is achieved. Plus according to Gartner, in 2018, 20% of all business content and documents will be produced by machines.


Gartner have published results of a survey on the topic Big Data, artificial intelligence and the relationship between the two domains. Without further ado, here are the main results:

  • 69% of respondents says that artificial intelligence will improve with the massive use of data
  • 68% think that Big Data will be used very long term by public authorities and businesses
  • 67% believe that the Big Data presents long-term benefits for the health and well-being
  • Finally, 65% approves that they use avatars that are digital assistants who interact with the users in order to save the need of human resources.


Artificial intelligence can provide unexpected business intelligence for organizations, enhance knowledge on their customers and improve customer interaction with the company, and in some case even replace entire departments as intelligent, learning machines perform tasks until now strictly reserved for humans. Not surprisingly, demand for solutions made possible by artificial intelligence is increasing in the private sector as well as in the public sector. “In every organization, IT experts should explore how to use intelligent agents and these autonomous connected objects to improve the activity” said David Cearley, vice -President and associated Gartner.


Source: Webbmedia Group – 2016 Tech Trends

How you can benefit from using Big Data in your business operations

Big Data, it is above all a great opportunity for companies to innovate, grow their sales, profits and markets so they can grow their portfolio and also to create new jobs. For customers and consumers of these businesses, it is a guarantee of a better customer experience in all interactions with brands either in sales, marketing or at the customer service.


The idea of data creating business value is not new, however, to explain briefly why, today, only a “small portion” of the data – often digital marketing or customers data but also data collected from connected objects, various maintenance processes, product usage statistics – are actually exploited by companies. The main reason is that the collection, storage and operating correctly the gathered data cost very expensive for some companies. In fact more expensive than the apparent or immediate value generated by the exploitation of these data. Another reason is the fact that most organizations still aren’t enough competent to technically manage the huge flow of data that is generated by the above examples.


The big data approach is used to collect, store, and analyze all the data at much more reasonable cost than the traditional process thanks to new storage technologies. Big data technologies release organizations from the traditional accuracy vs. cost challenge by enabling them to store data at the lowest level of detail, keeping all data history under reasonable costs and with less effort if managed correctly.



The benefit is that we can now consider to analyze and turn into actionable information, all the data that was once out of reach for both technical and financial reasons but the density of information contained in this new data is still less compared, for example, to conventional transactional data. But this problem is somehow compensated by the huge volume of data first, and especially the ability to cross-check them through statistical algorithms. So now, with a little help of experts in domain, companies have now the ability to exploit big data and to transform it into actionable knowledge then in make profit out of it. “The ability to exploit data correctly will define the difference between the losers and winners going forward,” says Tim McGuire, a McKinsey director.


In today’s hypercompetitive business environment, one of the biggest business challenges for companies is the importance of being able to find and analyze the relevant data they need, they must find it quickly.


Here a video that explains what’s Big Data in detail.

Now that you’ve saw the video and read the above part, let’s check example of a company that has successfully used THE Big Data. ACCOR, one of the French leaders in the hotel industry, has significantly increased its hotel booking rates through the use of these techniques. The business challenge is based on real time offers and recommendations for online users company’s website.


Accor has always wanted to derive insights from information in order to make better, smarter, real time, factbased decisions and now thanks to the RTD solution of Oracle (Real Time Solution), ACCOR group achieved more benefits than before. The project is recent (2013) and is still rising and making benefits for the group.


In today’s highly interconnected global business environment, marketing departments are front of the most exciting challenges of Big Data in which customer insight is a top priority for organizations in all industries. The main challenge here is to develop, maintain and control a 360 ° view across all channels and points of interaction with the customers.


As Customer satisfaction is at the heart of the selling process for all companies, they must organize the marketing and operational processes around the data. This data must be transformed into knowledge by the analytical part of big data, especially must be operational and available for customer interaction usage.


What’s the future of Big Data?


futur of bigdata

The pursuit of information has been a human preoccupation since knowledge was first recorded. Talking about the future of big data is really vague and deep topic, because it’s very much a “here and now” phenomenon. Big Data is a major trend and is set to offer companies tremendous insight. Gartner describes big data as a situation where the volume, velocity and variety of data exceed an organization’s ability to use that data for accurate and timely decision-making”.
Organizations are increasingly realising the utility of data that is bringing the value through continuous improvements in their existing operations.


Many uses of Big Data are only in their infancy and we can expect to see a surge of uses that we have not even thought of yet today.


The Big Data is as important for business as the Internet in its time. Companies that won’t act now will may be overtaken in few years by the competition. It is best to start even a modest project quickly rather than waiting for the technologies and methods to stabilize because then it will be too late.


Things you need to know about ‘The Internet of Things’


Everyone has their definition of IoT: for me, for example, IoT is a system of interconnected computing devices via public or private IP. These devices have the ability to exchange, collect, analyze and transfer data according to instructions given to them, over specific network without human interaction.


We are living in a world where Internet of Things has caused a massive transformation in our way of living. Our phones, computers, fridge, machines, cars are the existing proof of IoT. Not only in our everyday life but we’ve seen a strong expansion of IoT in all industrial sectors. Furthermore Gartner predicts that more and more industry players advances step by step towards IoT adoption.


According to Forbes, more and more appliances are connected to the internet. Even though, in 2008, there were already more devices connected to the Internet than people on Earth, 87% of people ignores exact meaning and advantages of IoT but if we have a moment to look back in time, we can see that the automatic banknote dispensers were considered as the very first IoT devices. They are actually connected to the Internet since 1974 already!


Companies are beginning to understand the value of the IoT (return on investment, efficiency, productivity, etc.), so that sales of IoT solutions for professionals will accelerate to the point that companies will become the number 1 market adoption of the IoT. According to Mr Tully Gartner predictions, this year, 4 billion connected things will be use in the consumer sector and will reach 13.5 billion by 2020.


Internet of Things Units Installed Base by Category - Gartner

  • Furthermore, some 10 million ‘smart clothes’ would be connected to the internet. Thinking here of clothes able to control your heart beat or know the amount of liquid (sweat) you lose per day / hour.
  • In 2012, only 10 percent of the cars were connected. For 2020, it is expected that 90 percent of cars are connected to the net.
  • A connected kitchen – which maintains the products therein – allows you to save up to 15 percent annually by telling you, for example, the expiry date of products matured stored init.


The IoT will certainly have a positive impact on economy and it will certainly create new business models. Data gathered in IoT represent a competitive advantage for companies and with the right tools, organizations can maximize their potential.


Sources :