Security is a long term trend that just continues to grow in importance as the number of potential entrances that can be exploited grows. Today’s CIOs have security on their mind 24×7.
As new technologies like cloud, mobile and social take the IT landscape by storm, security risks grow exponentially. The data center is more vulnerable than ever. New threats are emerging daily and even hourly. For this reason, it is no longer enough for organizations, or even entire governments, to try to address security strictly within their own enterprises, they must understand and protect all the the potential external risks.
In my report “Enterprise IT Security Trends To Watch In 2014” available on Slideshare, I provide the following list of twelve trends I am watching this year around the Enterprise Security Trend.
“Target”ed Attacks: Expect more targeted and coordinated attacks (like we saw at Target) that are successful in disrupting service and fraudulently obtaining significant amounts of intellectual property.
CISO Role: As a result of attacks, more enterprises will institute the Chief Information Security Officer role and task them with developing a corporate wide security strategy.
More Complexity: IT Security continues to become very complex, thanks to the ‘third platform” of mobile, social, big data, and cloud. Enterprises must guard against both theft of data, fraud, etc. and hacking into systems and infrastructures.. Security skills will be in high demand.
Encryption: Expect a huge interest in encryption technologies as enterprises realize that unencrypted data traffic behind the firewall is vulnerable to detection from outsiders.
Biometrics: The acceptance of biometrics has been very gradual. In 2014, we will see increased adoption of biometrics as a way to transition from the traditional user ID/password combination used most frequently to verify online identities.
Internet of Things: Need to secure enterprise systems against unwelcome access by Sensors, M2M Devices, Wearables and Embedded Systems.
Security Automation: Enterprises will invest in better security management facilities, the use of analytics and intelligence to identify trends and usage patterns, and the ability to monitor, report, and act on security intelligence.
Smarter Malware: Malicious code authors are very adept at camouflaging their work. They will get smarter in 2014. Expect mobile to be a target.
Mobile Threats: Mobile usage overtakes PCs. Mobile security platform weaknesses are giving rise to new threats. In 2014 hackers/criminals will increasingly target Mobile email, apps, platforms, wallets, and app stores.
BYOWearables: Employees will be bringing their Smart Glasses, Watches, and Health Monitors to work with them, causing more complexity for I.T. Security professionals.
Device & Location Important: Enterprises begin analyzing both device and location information to help them understand the potential context of the user’s attempt to access the network.
BYOS: Expect a rise in “bring your own security” scenarios, in which employees using their own mobile devices for work also employ their own personal security measures – often without the consent or awareness of enterprise security managers.
The rise of mobility in the enterprise has already had a huge impact, and it will only continue to grow. While there’s much focus from a consumer standpoint on the different mobile and wearable devices, over the next three to five years the most cutting edge advances in mobile will not be in device itself, but instead what is done with it. Mobile computing is at a turning point as we are entering the second wave of the mobile revolution: the business of mobile. Just as the Internet transformed industries like banking, travel and healthcare – so too will mobile.
I recently published my trend report Enterprise Mobile Computing: A HorizonWatching 2014 Trend Report. The 32 page report provides an overview of Enterprise Mobile Computing Trends to Watch in 2014. Below I’ve provided you some articles on this trend that I thought you would want to read.
The past year has been characterized by the consumerization of IT for most businesses, and the rising popularity of smartphones and tablets entering the workplace continues to intensify. The BYOD trend refers to the enterprise policy of allowing employees to use their personally owned devices (laptops, smartphones, tablets) to access enterprise information and applications. In 2013, companies will need to have policies and solutions in place to ensure cost-effective, productive and efficient bring your own device (BYOD) workplaces.
2013 Trends in BYOD
Number of Devices: Many workers today are carrying three devices: Laptop, Tablet and Smartphone.
Diversity of Devices: Different manufacturers and different operating systems.
Increased IT Responsibilities: IT departments ramp up to handle Mobile Device Management and Security requirements
Best Practices / Case Studies: As BYOD programs increase, demand will increase for industry-wide best practice and case study documentation.
Geographic Differences: BYOD programs need to be customized by geographic region.
Moble Device Policies: Enterprises develop guidelines/standards for employees to follow
Mobile Workforce Training: Leading edge organizations develop and provide mobile device and mobile app trainings as part of their BYOD program
What’s the ROI of BYOD?: With the increased Mobile Device Management requirements, look for CFOs to evaluate whether BYOD really saves any real money
BYOD Trend Report
Head on over to Slideshare where you can download my report
Today I am sharing with you a list of articles and blog posts I’ve found and inventoried that discuss trends and predictions for the coming year related to the Consumerization of IT and “Bring Your Own Device” (BYOD) trends.
Consumerization of IT refers to the trend of innovative technologies (hardware, software, solutions, services) that were designed for consumers making their way into the corporate world. BYOD is the trend that is specific to the explosion of mobile devices that consumers are buying and how those consumers want to use those personal devices to access corporate networks, applications and data.
It’s important to note that the BYOD trend is not just about companys letting employes use their own devices. It’s also about supporting employees with resources and technical expertise in order to leverage those mobile devices into something that works for the employee and also works for the company.
Here then is a list of 23 blog posts and articles that discuss these trends.
Business Professionals are in fact consumers. And consumers today have more choice, more flexibily, and more options in the devices that they use to access the Internet every day, including smartphones, tablets, and personal laptops. Consumers are using these devices to access the new applications and social networks that they use to connect with each other for both personal and business reasons. As that technology spills over into their professional lives, the line between the personal and the professional is blurring.
It’s no surprise that Business Professionals want to use the same technology at work as they use at home. However, while consumer technology offers some great potential benefits for the business, it also represents added risk in terms of security, privacy, and compliance. So IT leaders need to strike a balance between the desires of users and the requirements of the enterprise.
IBM has a bunch of content available to for you to learn more about this trend. Below you will find links to the most current IBM reports, websites, and social accounts related to the social business trend. The reports and sites listed below are all hotlinked. If you see something that is missing, let me know and I will revise this post.
BYOD-Related Websites by IBM
IBM Services: Mobile Enterprise Services – IBM Mobile Enterprise Services provides an integrated suite of capabilities for smartphones, tablets and rugged wireless devices
IBM Endpoint Manager for Mobile Devices – a completely integrated approach for managing, securing, and reporting on laptops, desktops, servers, smartphones, tablets, and even specialty devices such as point-of-sale terminals