Western Europe Government Sector IT Security Trends, 2012–2013
|Document Type||Business Strategy|
|Number of Pages||20|
|Number of Figures||8|
The consumerization of mobile devices, the increased usage of cloud services, and the ability of government employees to use nongovernment-controlled sources of information for citizen service such as social media not only opens opportunities for service improvement, but they also create new threats and complexities due to the need to integrate and secure systems that are not natively interfaced.
"Governments should consider federated IAM policies and solutions to enable effective access to information and services. They should review their IT security capabilities to focus more on risk management rather than trying to ban usage of consumer devices and applications," said Silvia Piai, research manager, IDC EMEA Government Insights.
Advanced authentication, Endpoint security, Federated single sign-on, Identity and access management, Information protection and control, Messaging security, Mobile identity and access management, Mobile secure content and threat management, Network security, Secure content and threat management, Security and vulnerability management software, Security management, User provisioning, Web security, Web single sign-on