1
TALKING SMAC
You’ve probably heard of SMAC before – Social, Mobile, Analytics and Cloud.
Business success frequently depends on SMAC’s four components. That’s why it’s
so useful to think of them together – they’re always relevant and complementary,
and will grow more critical in the future. For example, a recent LinkedIn study found
that 81 percent of North American SMBs use social media to drive business growth,
while nine percent plan to use it in the future1
. As for mobile, Cisco predicts that
50 billion devices will be connected to the Internet by 2020. Analytics, for its part,
is changing the way businesses manage information and use it to generate fruitful
insights, though research suggests that today only 23 percent of organisations are
making full use of Big Data strategies2
. By contrast, 82 percent of businesses have a
hybrid cloud strategy - up from 74 percent in 20143
.
MOVING BEYOND SMAC
The benefits of approaching SMAC as an interlinked web of technologies are
clear. By pursuing opportunities to use them, you can move steadily towards
your business goals. However, SMAC has one big limitation. Modern organisations
must increasingly contend with two major forces that don’t fit within SMAC’s
narrowly defined categories: the Internet of Things and cybersecurity – ‘SMACIC’ is
something new. By neglecting to include them in assessments of IT effectiveness,
businesses compromise their security and risk being overtaken by the competition.
THE IC FACTOR
CONNECTING TO THE INTERNET OF THINGS
The Internet of Things is a network of physical objects containing embedded
technologies – such as sensors and transmitters – that allow them to communicate
with remote networks. For example, many new cars have the built-in ability to
record and transmit information about their location, travel patterns and efficiency.
This allows drivers to receive alerts when a service might be necessary or to reduce
fuel consumption.
WHAT DOES IT MEAN FOR YOUR BUSINESS?
There are opportunities for almost every business to take advantage of the
Internet of Things. Remote sensors are already used in devices ranging from heart
monitoring implants to biochip implants in farm animals, postal items and aviation
equipment.
Take a luxurious mansion owned by
a couple who depart for work each
day leaving the front door wide open.
A thief could enter at any time, and
the couple has failed to secure their
investment. In a different version of
this scenario, many businesses make
a similar mistake investing in SMAC
technologies without adequately
protecting them. This is SMAC without
cybersecurity.
Then there is the luxurious mansion
without technology and connectivity
embedded in the devices in house
– the value that could be harnessed
interoperating these devices and the
data they create isn’t realised. To an
organisation, this is like deploying
SMAC technologies but ignoring the
Internet of Things.
Assad Jees
Next Gen Solution Manager, CSC
LOCKING THE CONNECTED FRONT DOOR
SMACIC
POINT OF VIEW
2
Fortunately, consumers appear to welcome the idea of products that can
independently provide valuable real-time feedback. Last year a Telefonica study
found that 70 percent of car users are driving, or would happily drive, a connected
car4
. More generally, this openness to the Internet of Things has the potential to
generate enormous value for businesses and their customers alike. A recent IT
Services Study conducted by CSC and IDG, confirmed IT spend has increased
by 20% over the previous year and 49% of CIOs surveyed indicated they would
be investing in the Internet of Things, in addition to current SMAC investments5
.
Another report revealed that just between 2014 and 2017, an estimated 19.42 billion
new connected devices will enter the global market6
.
SOMETHING WICKED THIS WAY COMES
Taking advantage of the Internet of Things means searching for opportunities to
automate routine processes or collect previously unavailable data. Implemented
strategically, it can provide your business with greater transparency and control.
You might, for example, use remote sensors to gather data on how efficiently
packages are being dispatched from a warehouse, and use it to model more cost-
effective supply chain processes.
Even before the emergence of the Internet of Things, it was essential for companies
to protect themselves against aggressive online incursions. However, more
connections between devices mean more opportunities for malicious third parties
to infiltrate your network. And that’s why you’ll need to take care of security too.
LOCKING THE DOOR WITH CYBERSECURITY
ONLINE CRIME WITH OFFLINE CONSEQUENCES
The news abounds with stories of large organisations falling prey to hackers,
viruses and other malicious activity. In 2013, for example, hackers infiltrated a
global retailers’ network, accessed the personal information of more than 70 million
consumers and used it to commit widespread credit card fraud. Controlling the
leak and managing its consequences cost more than $200 million, and the retailer
recently settled a class action suit in which affected customers will be reimbursed
with company funds. More recently, hackers attacked the US government’s Internal
Revenue Service (IRS) and tampered with more than 100,000 tax records.
Of course, any network breach can have unpleasant results, ranging from
intellectual property theft to unmanageable website downtime. McAfee reports
that cybercrime costs more than US$445 billion annually, and affected more than
800 million people worldwide in 2013 alone7
.
PROTECTING YOUR DATA
Modern businesses that rely on the Internet to conduct commerce or communicate
with customers must have strong defences against cybercrime. So whether you
run a multibillion dollar company or a niche enterprise, network security is vitally
important. This is a complicated challenge that requires a resilient and adaptable
response. As a result, many organisations now find that the best approach to
cybersecurity is a managed security service that covers their entire network
from data centres to mobile devices. An expertly designed end-to-end solution
can protect your business and customers in a world where online threats are
multiplying with alarming rapidity.
SMACIC: LOCKING THE CONNECTED FRONT DOOR
3
SMACIC: LOCKING THE CONNECTED FRONT DOOR
KEEPING THINGS IN CHECK WITH SMACIC
Together, the six elements of SMACIC – Social, Mobile, Analytics, Cloud, the Internet
of Things and Cybersecurity should be considered as functioning in symbiosis - as
to fully harness these technologies and to bring business value, they each should
have an interdependent relationship
Of course, many organisations will find that they’re early adopters of some SMACIC
technologies and lagging behind with others. Thankfully, you can evaluate your
IT system using SMACIC components for your diagnostic criteria. In reviewing
cybersecurity protocols, for example, you might ask questions like:
•	Are we encrypting archived data to prevent it from being misappropriated?
•	Should we consider using a virtual private cloud to control who accesses
sensitive information?
•	What do we know about our organisation’s security posture?
•	When was the last time we conducted a security audit?
By ensuring that your business is using SMACIC effectively, you’ll be placing it at
the forefront of a global shift in how companies control internal processes, gather
data and create strong customer relationships.
1.	 http://marketing.linkedin.com/blog/social-media-a-hotbed-for-smb-growth-and-fertile-ground-for-
financial-services-prospects/
2.	 www.ibmbigdatahub.com/gallery/quick-facts-and-stats-big-data
3.	 www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2015-state-cloud-survey
4.	 www.telegraph.co.uk/technology/news/10973374/Drivers-warm-to-connected-cars.html
5.	 2014 CSC & IDG IT CIO Services Study.
6.	 press.ihs.com/press-release/design-supply-chain/more-connected-ever-6-billion-new-internet-
enabled-devices-be-prod
7.	 www.telegraph.co.uk/technology/internet-security/10886640/Cyber-crime-costs-global-economy-
445-bn-annually.html
About CSC
The mission of CSC is to be a global leader in providing technology-enabled business solutions and services.
With the broadest range of capabilities, CSC offers clients the solutions they need to manage complexity, focus
on core businesses, collaborate with partners and clients and improve operations.
CSC makes a special point of understanding its clients and provides experts with real-world experience to work
with them. CSC leads with an informed point of view while still offering client choice.
For more than 50 years, clients in industries and governments worldwide have trusted CSC with their business
process and information systems outsourcing, systems integration and consulting needs.
The company trades on the New York Stock Exchange under the symbol “CSC.”
© 2015 Computer Sciences Corporation. All rights reserved.
Worldwide CSC Headquarters
The Americas
3170 Fairview Park Drive
Falls Church, Virginia 22042
United States
+1.703.876.1000
Europe, Middle East, Africa
Royal Pavilion
Wellesley Road
Aldershot, Hampshire
GU11 1PZ
United Kingdom
+44(0)1252.534000
Australia
Level 6/Tower B
26 Talavera Road
Macquarie Park,
NSW 2113
Sydney, Australia
+61(0)2.9034.3000
New Zealand
Level 26, Plimmer Towers
2-6 Gilmer Terrace
Wellington 6011
New Zealand
+64 (0) 4 901 4333
Asia
20 Anson Road #11-01
Twenty Anson
Singapore 079912
Republic of Singapore
+65.6221.9095

More Related Content

PDF
Top 10 Strategic Predictions for 2016 and Beyond
PDF
Global technology 2016 outlook
PPTX
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
PPTX
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
PDF
Gartner: Top 10 Technology Trends 2015
PDF
As telcos go digital, cybersecurity risks intensify by pwc
PDF
IT Security Trends 2013
PDF
Cybersource 2013 Online Fraud Report
Top 10 Strategic Predictions for 2016 and Beyond
Global technology 2016 outlook
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
Gartner: Top 10 Technology Trends 2015
As telcos go digital, cybersecurity risks intensify by pwc
IT Security Trends 2013
Cybersource 2013 Online Fraud Report

What's hot (20)

PDF
Insights success the 10 most trusted networking solution provider companies 2...
PDF
Top Strategic Tech Trend Predictions For 2020
PDF
The 2015 Tech Roundup
PDF
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
PDF
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
PDF
2011 120211 Gartner Predictions 253709
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PPTX
10 technology trends to watch in the COVID- 19 pandemic
PDF
state-of-the-internet-of-things-market-report-2016
PPTX
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
PPTX
The Six Biggest Blockchain Trends Everyone Should Know About In 2021
PPTX
Digital Shift in Insurance: How is the Industry Responding with the Influx of...
PDF
E magazine march issue 2021
PDF
symc_annual2000
PDF
2022 Insight Intelligent Technology™ Report
PDF
Idc predictions 2016
PDF
6 Biggest Business Technology Trends in 2020
PDF
50 Things You Absolutely Need To Know About The Cloud
DOC
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
PDF
The Future of Finance is Tech
Insights success the 10 most trusted networking solution provider companies 2...
Top Strategic Tech Trend Predictions For 2020
The 2015 Tech Roundup
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
2011 120211 Gartner Predictions 253709
The 10 Fastest Growing Cyber Security Companies of 2017
10 technology trends to watch in the COVID- 19 pandemic
state-of-the-internet-of-things-market-report-2016
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
The Six Biggest Blockchain Trends Everyone Should Know About In 2021
Digital Shift in Insurance: How is the Industry Responding with the Influx of...
E magazine march issue 2021
symc_annual2000
2022 Insight Intelligent Technology™ Report
Idc predictions 2016
6 Biggest Business Technology Trends in 2020
50 Things You Absolutely Need To Know About The Cloud
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
The Future of Finance is Tech
Ad

Similar to SMACIC_Clean (20)

PDF
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
PPTX
Common sense security by Fortium Partners
PPTX
supply chain management.pptx
PDF
PDF
Fall2015SecurityShow
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PPTX
SMAC
PDF
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
PDF
Cloud content security vs innovation 2012_0821
PDF
Cisco 2014 Midyear Security Report
PPTX
Securing the Cloud
PPTX
SMAC
PPTX
Security Threat Presentation
PDF
Outlook Briefing 2016: Cyber Security
PPTX
Smac by Uday
PPTX
SMAC
PPTX
Social, mobile, Analytics & Cloud
PPTX
Social Mobile Analytics Cloud
PPTX
Smac 12
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Common sense security by Fortium Partners
supply chain management.pptx
Fall2015SecurityShow
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
SMAC
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Cloud content security vs innovation 2012_0821
Cisco 2014 Midyear Security Report
Securing the Cloud
SMAC
Security Threat Presentation
Outlook Briefing 2016: Cyber Security
Smac by Uday
SMAC
Social, mobile, Analytics & Cloud
Social Mobile Analytics Cloud
Smac 12
Ad

SMACIC_Clean

  • 1. 1 TALKING SMAC You’ve probably heard of SMAC before – Social, Mobile, Analytics and Cloud. Business success frequently depends on SMAC’s four components. That’s why it’s so useful to think of them together – they’re always relevant and complementary, and will grow more critical in the future. For example, a recent LinkedIn study found that 81 percent of North American SMBs use social media to drive business growth, while nine percent plan to use it in the future1 . As for mobile, Cisco predicts that 50 billion devices will be connected to the Internet by 2020. Analytics, for its part, is changing the way businesses manage information and use it to generate fruitful insights, though research suggests that today only 23 percent of organisations are making full use of Big Data strategies2 . By contrast, 82 percent of businesses have a hybrid cloud strategy - up from 74 percent in 20143 . MOVING BEYOND SMAC The benefits of approaching SMAC as an interlinked web of technologies are clear. By pursuing opportunities to use them, you can move steadily towards your business goals. However, SMAC has one big limitation. Modern organisations must increasingly contend with two major forces that don’t fit within SMAC’s narrowly defined categories: the Internet of Things and cybersecurity – ‘SMACIC’ is something new. By neglecting to include them in assessments of IT effectiveness, businesses compromise their security and risk being overtaken by the competition. THE IC FACTOR CONNECTING TO THE INTERNET OF THINGS The Internet of Things is a network of physical objects containing embedded technologies – such as sensors and transmitters – that allow them to communicate with remote networks. For example, many new cars have the built-in ability to record and transmit information about their location, travel patterns and efficiency. This allows drivers to receive alerts when a service might be necessary or to reduce fuel consumption. WHAT DOES IT MEAN FOR YOUR BUSINESS? There are opportunities for almost every business to take advantage of the Internet of Things. Remote sensors are already used in devices ranging from heart monitoring implants to biochip implants in farm animals, postal items and aviation equipment. Take a luxurious mansion owned by a couple who depart for work each day leaving the front door wide open. A thief could enter at any time, and the couple has failed to secure their investment. In a different version of this scenario, many businesses make a similar mistake investing in SMAC technologies without adequately protecting them. This is SMAC without cybersecurity. Then there is the luxurious mansion without technology and connectivity embedded in the devices in house – the value that could be harnessed interoperating these devices and the data they create isn’t realised. To an organisation, this is like deploying SMAC technologies but ignoring the Internet of Things. Assad Jees Next Gen Solution Manager, CSC LOCKING THE CONNECTED FRONT DOOR SMACIC POINT OF VIEW
  • 2. 2 Fortunately, consumers appear to welcome the idea of products that can independently provide valuable real-time feedback. Last year a Telefonica study found that 70 percent of car users are driving, or would happily drive, a connected car4 . More generally, this openness to the Internet of Things has the potential to generate enormous value for businesses and their customers alike. A recent IT Services Study conducted by CSC and IDG, confirmed IT spend has increased by 20% over the previous year and 49% of CIOs surveyed indicated they would be investing in the Internet of Things, in addition to current SMAC investments5 . Another report revealed that just between 2014 and 2017, an estimated 19.42 billion new connected devices will enter the global market6 . SOMETHING WICKED THIS WAY COMES Taking advantage of the Internet of Things means searching for opportunities to automate routine processes or collect previously unavailable data. Implemented strategically, it can provide your business with greater transparency and control. You might, for example, use remote sensors to gather data on how efficiently packages are being dispatched from a warehouse, and use it to model more cost- effective supply chain processes. Even before the emergence of the Internet of Things, it was essential for companies to protect themselves against aggressive online incursions. However, more connections between devices mean more opportunities for malicious third parties to infiltrate your network. And that’s why you’ll need to take care of security too. LOCKING THE DOOR WITH CYBERSECURITY ONLINE CRIME WITH OFFLINE CONSEQUENCES The news abounds with stories of large organisations falling prey to hackers, viruses and other malicious activity. In 2013, for example, hackers infiltrated a global retailers’ network, accessed the personal information of more than 70 million consumers and used it to commit widespread credit card fraud. Controlling the leak and managing its consequences cost more than $200 million, and the retailer recently settled a class action suit in which affected customers will be reimbursed with company funds. More recently, hackers attacked the US government’s Internal Revenue Service (IRS) and tampered with more than 100,000 tax records. Of course, any network breach can have unpleasant results, ranging from intellectual property theft to unmanageable website downtime. McAfee reports that cybercrime costs more than US$445 billion annually, and affected more than 800 million people worldwide in 2013 alone7 . PROTECTING YOUR DATA Modern businesses that rely on the Internet to conduct commerce or communicate with customers must have strong defences against cybercrime. So whether you run a multibillion dollar company or a niche enterprise, network security is vitally important. This is a complicated challenge that requires a resilient and adaptable response. As a result, many organisations now find that the best approach to cybersecurity is a managed security service that covers their entire network from data centres to mobile devices. An expertly designed end-to-end solution can protect your business and customers in a world where online threats are multiplying with alarming rapidity. SMACIC: LOCKING THE CONNECTED FRONT DOOR
  • 3. 3 SMACIC: LOCKING THE CONNECTED FRONT DOOR KEEPING THINGS IN CHECK WITH SMACIC Together, the six elements of SMACIC – Social, Mobile, Analytics, Cloud, the Internet of Things and Cybersecurity should be considered as functioning in symbiosis - as to fully harness these technologies and to bring business value, they each should have an interdependent relationship Of course, many organisations will find that they’re early adopters of some SMACIC technologies and lagging behind with others. Thankfully, you can evaluate your IT system using SMACIC components for your diagnostic criteria. In reviewing cybersecurity protocols, for example, you might ask questions like: • Are we encrypting archived data to prevent it from being misappropriated? • Should we consider using a virtual private cloud to control who accesses sensitive information? • What do we know about our organisation’s security posture? • When was the last time we conducted a security audit? By ensuring that your business is using SMACIC effectively, you’ll be placing it at the forefront of a global shift in how companies control internal processes, gather data and create strong customer relationships. 1. http://marketing.linkedin.com/blog/social-media-a-hotbed-for-smb-growth-and-fertile-ground-for- financial-services-prospects/ 2. www.ibmbigdatahub.com/gallery/quick-facts-and-stats-big-data 3. www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2015-state-cloud-survey 4. www.telegraph.co.uk/technology/news/10973374/Drivers-warm-to-connected-cars.html 5. 2014 CSC & IDG IT CIO Services Study. 6. press.ihs.com/press-release/design-supply-chain/more-connected-ever-6-billion-new-internet- enabled-devices-be-prod 7. www.telegraph.co.uk/technology/internet-security/10886640/Cyber-crime-costs-global-economy- 445-bn-annually.html
  • 4. About CSC The mission of CSC is to be a global leader in providing technology-enabled business solutions and services. With the broadest range of capabilities, CSC offers clients the solutions they need to manage complexity, focus on core businesses, collaborate with partners and clients and improve operations. CSC makes a special point of understanding its clients and provides experts with real-world experience to work with them. CSC leads with an informed point of view while still offering client choice. For more than 50 years, clients in industries and governments worldwide have trusted CSC with their business process and information systems outsourcing, systems integration and consulting needs. The company trades on the New York Stock Exchange under the symbol “CSC.” © 2015 Computer Sciences Corporation. All rights reserved. Worldwide CSC Headquarters The Americas 3170 Fairview Park Drive Falls Church, Virginia 22042 United States +1.703.876.1000 Europe, Middle East, Africa Royal Pavilion Wellesley Road Aldershot, Hampshire GU11 1PZ United Kingdom +44(0)1252.534000 Australia Level 6/Tower B 26 Talavera Road Macquarie Park, NSW 2113 Sydney, Australia +61(0)2.9034.3000 New Zealand Level 26, Plimmer Towers 2-6 Gilmer Terrace Wellington 6011 New Zealand +64 (0) 4 901 4333 Asia 20 Anson Road #11-01 Twenty Anson Singapore 079912 Republic of Singapore +65.6221.9095