Asia Pacific firms should protect sensitive customer data like it's their own, according to a new Forrester report.
Senior analyst Manatosh Das details the five security priorities most critical for success in the AP market, and advises these firms to comply with local laws to earn and retain customer trust.
Global firms operating in this market tend to use only guidelines that comply with the EU Data Protection Directive. They should remember that local laws are not aligned with the EU model and they may have to pay fine for noncompliance.
Organizations should use more adaptive and behavior-based authentication methods to improve the user experience and maintain security.
Asia Pacific firms that want to authenticate customers have to consider several factors before they select a solution such as interaction channels used, the data and services they access, and the organization's business goals and risk tolerance.
Other factors to consider are devices and their IP addresses; geolocation and sensor data from the device; and the task customers want to perform.
Mobile security ecosystem
Asia Pacific firms should build a mobile security ecosystem to empower their employees. These firms must shift the focus of security from devices to apps, data, and the network and understand that mobile security will not come from a single security solution.
Big data concepts should be applied to security to better understand threats, identify existing vulnerabilities, and discover fraud, breaches, and data leaks in progress.
This is very relevant to security and risk professionals as enterprises are searching insight from unstructured data originating from both internal (IM, email) and external (social networks, sensors) sources to enhance the business value of data.
Finally, Asia Pacific firms should apply their risk management expertise to help business colleagues identify opportunities, understand the relevant risks, and treat the risks appropriately to maximize and protect business value.
In a nut shell, S&R professionals must adapt and evolve to keep up. They should focus on mitigating security concerns and help develop solutions that address risks without compromising business functionality, ease of use, or the pace of adoption.
Sign up for CIO Asia eNewsletters.