Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Agents of Change: SingTel

Jack Loo | Jan. 30, 2013
Singapore’s IDA unveiled its Infocomm Technology Roadmap outlining nine technology trends that will shape the future. We asked various enterprise IT heavyweights for their perspectives on the Roadmap, and next up, we have SingTel.

Beyond mobilising the enterprise Intranet, companies also need to focus on mobilising customer related applications for sales or field technical support in response to the demand for faster, sharper and smarter apps on the go.

One good example of this is in the area of healthcare. Hospitals and other points of care such as your neighbourhood general practitioners can utilise mobile applications to share pertinent health information with their patients and caregivers.

Patients empowered with such mobile Personal Health Records (mPHR) can then play an active role in the management of their own health by providing feedback to the doctors on their condition via third party telemonitoring devices.

This encourages collaborative care and will be an important tool in the management of chronic disease patients. SingTel has embarked on two proof-of-concept trials on this. The initial outcomes are successful and SingTel will continue to evolve the services to meet the needs in this area.

The prevalence of BYOD blurs the lines between consumer and enterprise mobility. CIOs are challenged to understand and manage an array of mobile OS/platform, to put in place new policies for secured mobile access to corporate data from an increasingly mobile workforce.

Cyber Security

Business and economic conditions are driving enterprises to outsource their non-core functions like security operations to service providers like SingTel. The key push factors for enterprises to outsource their security operations include:

1. Changing threat landscape (stealthiest malicious intent) - The typical hacker who used to act alone in the past has evolved into cyber criminal groups for highly sophisticated, low and slow attacks for financial gains or political reasons

2. Operational cost optimisation (limited IT budget) - Enterprises are operating with lower capital expenditures and keeping operating expenditures consistent while upgrading their technology infrastructure over a three-to-five-year frame

3. Fill important security gaps (availability of talented resources) - many mid-sized businesses cannot justify additional headcount to support specialised security in areas such as 24x7 customer support and monitoring services.

4. Operational & service optimisation (one stop convenience) - Enterprises receive a great number of services, professional support and 24x7 monitoring capabilities from service providers, which they are not able to sustain as an in-house capability.

5. Keep up with changing regulations and laws (compliance) - It is a challenge to keep up with the ever-changing legal and regulatory environment especially if the organisation is a global one.

6. Addressing consumerisation of IT (BYOD) - Keeping the balance between mobile flexibility and secure working access.

Internet of Things

In 2010, there were almost two connected devices per person. This ratio is expected to double every five years - to 3.5 in 2015 and 6.6 in 2020. This explosion of connected devices is due in no small part to the migration from IPv4 to IPv6. With this, we see greater potential for machine-to-machine (M2M) communication.


Previous Page  1  2  3  4  Next Page 

Sign up for CIO Asia eNewsletters.