12 Trends to Watch in Enterprise Security for 2014

Security is a long term trend that just continues to grow in importance as the number of potential entrances that can be exploited grows.  Today’s CIOs have security on their mind 24×7.

As new technologies like cloud, mobile and social take the IT landscape by storm, security risks grow exponentially.  The data center is more vulnerable than ever.  New threats are  emerging daily and even hourly.  For this reason, it is no longer enough for organizations, or even entire governments, to try to address security strictly within their own enterprises, they must understand and protect all the the potential external risks.

In my  report “Enterprise IT Security Trends To Watch In 2014” available on Slideshare, I provide the following list of twelve trends I am watching this year around the Enterprise Security Trend.

  1. “Target”ed Attacks: Expect more targeted and coordinated attacks (like we saw at Target) that are successful in disrupting service and fraudulently obtaining significant amounts of intellectual property.
  2. CISO Role:  As a result of attacks, more enterprises will institute the Chief Information Security Officer role and task them with developing a corporate wide security strategy.
  3. More Complexity: IT Security continues to become very complex, thanks to the ‘third platform” of mobile, social, big data, and cloud. Enterprises must guard against both theft of data, fraud, etc. and hacking into systems and infrastructures.. Security skills will be in high demand.
  4. Encryption:  Expect a huge interest in encryption technologies as enterprises realize that unencrypted data traffic behind the firewall is vulnerable to detection from outsiders.
  5. Biometrics:  The acceptance of biometrics has been very gradual. In 2014, we will see increased adoption of biometrics as a way to transition from the traditional user ID/password combination used most frequently to verify online identities.
  6. Internet of Things:  Need to secure enterprise systems against unwelcome access by Sensors, M2M Devices, Wearables and Embedded Systems.
  7. Security Automation:  Enterprises will invest in better security management facilities, the use of analytics and intelligence to identify trends and usage patterns, and the ability to monitor, report, and act on security intelligence.
  8. Smarter Malware:  Malicious code authors are very adept at camouflaging their work. They will get smarter in 2014. Expect mobile to be a target.
  9. Mobile Threats:  Mobile usage overtakes PCs. Mobile security platform weaknesses are giving rise to new threats. In 2014 hackers/criminals will increasingly target Mobile email, apps, platforms, wallets, and app stores.
  10. BYOWearables:  Employees will be bringing their Smart Glasses, Watches, and Health Monitors to work with them, causing more complexity for I.T. Security professionals.
  11. Device & Location Important:  Enterprises begin analyzing both device and location information to help them understand the potential context of the user’s attempt to access the network.
  12. BYOS:  Expect a rise in “bring your own security” scenarios, in which employees using their own mobile devices for work also employ their own personal security measures – often without the consent or awareness of enterprise security managers.

 

Enterprise Mobile Computing Trend and Prediction Articles for 2014

The rise of mobility in the enterprise has already had a huge impact, and it will only continue to grow. While there’s much focus from a consumer standpoint on the different mobile and wearable devices, over the next three to five years the most cutting edge advances in mobile will not be in device itself, but instead what is done with it. Mobile computing is at a turning point as we are entering the second wave of the mobile revolution: the business of mobile. Just as the Internet transformed industries like banking, travel and healthcare – so too will mobile.

I recently published my trend report Enterprise Mobile Computing: A HorizonWatching 2014 Trend Report.  The 32 page report provides an overview of Enterprise Mobile Computing Trends to Watch in 2014. Below I’ve provided you some articles on this trend that I thought you would want to read.

Source Title
CIO.com 10 Mobile Tech Predictions for 2014 (Slideshow)
Online Media Daily 2014 Trends In Mobile Marketing And Advertising
Information Age Mobile collaboration in 2014: 4 big predictions
Mobile Enterprise Mobility Outlook 2014
365Online Top 11 Mobile Trends Of 2013
Forbes 7 Ways Mobile Will Change Business In 2014
The Mobile Retail Blog 3 Mobile Marketing Trends to Emerge in 2014
Industrial Distribution Three Key Trends In Mobile Computing In 2014
Mobility TechZone 2014 Prediction: Consolidation Will Firm Its Grip
Mobile Enterprise Technology Predictions

 

Bring Your Own Device: A 2013 HorizonWatching Trend Report

The past year has been characterized by the consumerization of IT for most businesses, and the rising popularity of smartphones and tablets entering the workplace continues to intensify.  The BYOD trend refers to the enterprise policy of allowing employees to use their personally owned devices (laptops, smartphones, tablets) to access enterprise information and applications.  In 2013, companies will need to have policies and solutions in place to ensure cost-effective, productive and efficient bring your own device (BYOD) workplaces.

2013 Trends in BYOD

  1. Number of Devices: Many workers today are carrying three devices: Laptop, Tablet and Smartphone.
  2. Diversity of Devices: Different manufacturers and different operating systems.
  3. Increased IT Responsibilities: IT departments ramp up to handle Mobile Device Management and Security requirements
  4. Best Practices / Case Studies: As BYOD programs increase, demand will increase for industry-wide best practice and case study documentation.
  5. Geographic Differences: BYOD programs need to be customized by geographic region.
  6. Moble Device Policies: Enterprises develop guidelines/standards for employees to follow
  7. Mobile Workforce Training: Leading edge organizations develop and provide mobile device and mobile app trainings as part of their BYOD program
  8. What’s the ROI of BYOD?: With the increased Mobile Device Management requirements, look for CFOs to evaluate whether BYOD really saves any real money

BYOD Trend Report

Head on over to Slideshare where you can download my report

23 BYOD Trends and Prediction Lists for 2013

BYOD2 Today I am sharing with you a list of articles and blog posts I’ve found and inventoried that discuss trends and predictions for the coming year related to the Consumerization of IT and “Bring Your Own Device” (BYOD) trends.  

Consumerization of IT refers to the trend of innovative technologies (hardware, software, solutions, services) that were designed for consumers making their way into the corporate world.  BYOD is the trend that is specific to the explosion of mobile devices that consumers are buying and how those consumers want to use those personal devices to access corporate networks, applications and data.

It’s important to note that the BYOD trend is not just about companys letting employes use their own devices. It’s also about supporting employees with resources and technical expertise in order to leverage those mobile devices into something that works for the employee and also works for the company.

Here then is a list of 23 blog posts and articles that discuss these trends.

Source Title of Article / Blog Post
CIO.com 2013 Prediction: BYOD on the Decline?
CITEWorld Consumerization in 2013: the big stories to watch
ComputerWorld Forecast 2013: Setting a mobile risk management strategy
ComputerWorld One reliable prediction for 2013: BYOD still a bear for IT
ComputerWorld Where are mobility and consumerization of IT heading in 2013?
DataCOM 13 Mobility and BYOD Tips for 2013
Enterprise Systems Top 3 Emerging BYOD Trends for 2013
Field Aware Implementing BYOD in 2013
Gartner Gartner Identifies Three Security Hurdles to Overcome When Shifting From Enterprise-Owned Devices to BYOD
Ian Tibble What’s Next for BYOD – 2013 and Beyond
InformationWeek 5 Ways To Stay Ahead Of Consumerization Of IT
InfoSec Island What’s Next For BYOD – 2013 And Beyond
ITBusinessEdge BYOD in 2013: Yes, It Is Going to Get Worse
Petri Bring Your Own Device: Will 2013 be the Year of BYOD?
Point 2 Security BYOD Concerns Loom Large in 2013
Redmondmag.com BYOD and Cloud Will Fuel IDMaaS Landscape in 2013
SC Magazine Prediction: BYOD may go away in 2013
Silicon Angle BYOD + Build Your Own App Taking Over Mobility in 2013
Simply Security Cloud to Drive IT Consumerization in 2013
TabTimes 2013 To Do For IT Departments
TeoTech BYOD in 2013
The A Team BYOD (Bring Your Own Device) – 2013 the Year of the Tablet

Consumerization of IT / BYOD: IBM Websites, White Papers and Reports

byod Business Professionals are in fact consumers.  And consumers today have more choice, more flexibily, and more options in the devices that they use to access the Internet every day, including smartphones, tablets, and personal laptops.   Consumers are using these devices to access the new applications and social networks that they use to connect with each other for both personal and business reasons.  As that technology spills over into their professional lives, the line between the personal and the professional is blurring.

It’s no surprise that Business Professionals want to use the same technology at work as they use at home.    However, while consumer technology offers some great potential benefits for the business, it also represents added risk in terms of security, privacy, and compliance.  So IT leaders need to strike a balance between the desires of users and the requirements of the enterprise.

IBM has a bunch of content available to for you to learn more about this trend.  Below you will find links to the most current IBM reports, websites, and social accounts related to the social business trend.  The reports and sites listed below are all hotlinked.  If you see something that is missing, let me know and I will revise this post.

BYOD-Related Websites by IBM

BYOD-Related Social Media Sites

BYOD-Related IBM White Papers and Reports

BYOD-Related IBM Presentations