Security: Maximize Business Benefits

Tibco's Jean-Francois Roy on Security's Chance to Evolve
Security: Maximize Business Benefits

When it comes to the evolution of machine data, security organizations now can improve protection and the top line. How can they maximize the business benefits? Jean-Francois Roy of TIBCO shares tips.

See Also: Sandboxing Case Study: Old vs. New Technologies

One fundamental challenge for security organizations is how they perceive and present themselves to the rest of the enterprise, says Roy, CTO for TIBCO LogLogic.

"We encounter security organizations that really have a hard time breaking out of their shell - it's a real isolationist behavior," Roy says. "That causes issues when you're talking about business value."

Because the business needs more transparency from IT security, Roy advises organizations to adopt a more open approach. "You don't have to own everything, manage everything and recreate those silos that really create that isolationist behavior that's really counter-productive from a business perspective," he says.

In an interview about how security organizations can contribute to the bottom line, Roy discusses:

  • The new view of technology deployment;
  • Security impacts on the top and bottom lines;
  • The stages of transition and where to begin.

Roy is a member of TIBCO's Office of the CTO and acting Chief Technology Officer for the TIBCO LogLogic business unit. He has over 16 years of experience in information technology with a focus on security and enterprise software. He joined TIBCO through the LogLogic acquisition in 2012, and before that held senior technical positions at Verizon Networks and Nokia.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.