Also, everything is tested and retested in a predictable manner. It really is about changing both the mindset and the methodology of how you build a software, design it, and release it into production. It's about creating a much more iterative feedback loop throughout the entire process.
How is CA Technologies harnessing embedded analytics and machine learning into its existing solutions?
We've made huge strides over the past year or so. One of the things we announced at CA World is a new analytics engine called 'Project Jarvis'. The goal of this project was to create an analytics engine that we could use to build new analytics capabilities into existing products, and also build new products that were focused on analytics.
Now, 'Project Jarvis' is the first CA accelerator incubation to go through the incubation pipeline and exit into a product organisation.
Also, a dominant portion of the Jarvis development team is based here in Bangalore. So, it's a great example of innovation capabilities that exist at our development centers here.
In your book, 'Digitally Remastered', you touched upon the dire need to integrate security to fuel digital transformation. What can companies do to ensure that they have a robust security infrastructure in place?
The common approach has been to build security as the last step in the process of developing a new application or service.
What I advocate is that you need to integrate security deeply into the entire development pipeline - all the way from design up to deployment. Security is not something you add on after the development process, it's something that you absolutely need to build in.
I would expect developers to be thinking about security and applying security tools as an integral part of the development process, and not something that's applied right before release.
Security is a killer feature. It's a sword that swings both ways. It can absolutely kill your business if you have serious security flaws. It can also be a fantastic enabler of your business if you can give your customers the confidence in your security capabilities.
Also, another important factor to bear in mind: Implementing security is enabling user experience, not getting in the way of it.
What in your experience, are the pain points companies might encounter when they deploy security at the end of the digital deployment?
What happens when security is deployed at the end stages is a classic case of "Oops! We didn't think of that." So, you'll have to go back, all the way upstream - sometimes to the architectural level, and re-implement entire chunks of functionalities.
The security flaws that you discover at the end of a process are much more expensive to fix than flaws that you've identified earlier.
Sign up for CIO Asia eNewsletters.