With Generation Z advancing on the corporate environment, the matter of network security has never been as topical as it is right now. Not because members of this generation pose a greater risk than others, but because their view of technology is integrated yet different – at the same time.
Members of Generation Z grew up with technology and view it as part of their lives – demanding instant access to information, communication and interaction with the world – in the same way that other generations demand electricity or access to 24-hour fuel stations. Their oneness with technology poses interesting challenges to organisations that are obsessed with the control and ring-fencing of information and its users’ online activities.
“For a start, Generation Z expects companies to provide seamless technological integration between the corporate and non-corporate worlds,” Stephen Osler, Nclose New Business Director points out. This means a range of things – from wanting companies to provide smart phones and mobile devices that team members are able to use for work and play, to being able to bring their own mobile devices to the office and work on corporate business on them – without being restricted in any way whatsoever.
“With the pervasiveness of social media there is also less of an expectation of privacy, and this relaxed approach filters through to the work place where the corporate security and privacy demands fly in the face of users’ wishes,” notes Andrew Meyer, Principle Consultant at Nclose.
Solving this issue is not easy, but solutions exist that make it possible to appease users on both sides of the corporate security net.
Martin Potgieter, Nclose Technical Director, says that the key to achieving a workable solution lies in the application of simplistic security that is transparent and makes the user part of that solution. With the ever changing technology landscape there is only one constant; the user’s Identity. The paradigm shift from the draconian security principle of “No, we won’t allow that, everything must be locked down!” to the more progressive approach of “Let’s work together on how this can be done, securely” is the future of a successful security practice.
“CA Technologies offers a range of mobility products that have been successfully applied in several South African corporate environments,” Potgieter explains. By offering innovative takes on solutions that range from content management through to identity and mobility, they have struck a balance that satisfies the growing global thirst for technological freedom – as well as the corporate craving for protection of IP and personal information.
“One of the great aspects of CA Technologies solutions is that they work well with software and technologies from other providers – and across the hardware and networking spectrum,” Osler says. This makes it a highly valued commodity in the Nclose range of products, offering customers an effective add-on to existing platforms that quickly addresses the issue of security on mobile technology.
“Generation Z and those to follow bring a fresh new wave of talent that is crucial for the survival of corporates and the economy. Losing that talent because your organisation is unable to provide an environment that allows its members to be creative and productive – on their terms – is a high price to pay,” Potgieter concludes.
Security specialist NClose is a partner of CA Southern Africa.