- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
Page 3 of 4
• More than 50% of firms currently providing identity access management as a service (IAMaaS) and cloud-based IAM solutions will be acquired by larger service providers by year-end 2015.
• Through 2013, 80% of cloud security incidents will be due to administrative error by cloud service providers or user management of cloud services.
• For low-security environments, or for workloads that have simple security requirements, relying on the security built into structure or into the public cloud service will be good enough -- just as it was in private cloud infrastructure-traditional insourcing and outsourcing. This will represent roughly 20% of the overall market.
• At the high end, security will be kept separate from private or public cloud infrastructure -- just as we did when internal networks were virtualized. The VMsafe API is an example of a mechanism that requires all security-relevant flows to be externalized so that existing and separate security processes can examine them and enforce security policies. This will represent approximately 20% of the market.
• The vast middle will compromise and run security workloads in the private cloud and public cloud environments, as long as sufficient separation of duties and audit/visibility can be provided.
• There is an urgent need for companies to separate personal and business operations on consumer smartphones and tablets (both company- and user-owned) in ways that will be inexpensive to implement, easy to use, and robust in defense of company policies and data. Several technologies will provide partial solutions to support efforts to manage diverse consumer devices with various advantages to the user and IT manager, but no solution will simultaneously please both. It is too easy for a user to purchase a smartphone with a personal credit card, then use it to access sensitive data via a corporate network.
The only way IT staff can maintain control is by separating mobile computing devices (notebook PCs, PDAs, phones, pagers and others) into three distinct device classes: (1) trusted standard devices provided by the company; (2) tolerated devices, a portfolio of user-purchased devices; (3) unsupported devices that are used in small numbers or have a consumer orientation, for which the PC group cannot provide support. By 2016, 60% of large enterprises will implement limited access network zones to limit the connectivity of personally owned mobile devices.
• Overall, there are very real trends toward cloud platforms, and also toward massively scalable processing. Virtualization, service orientation and the Internet have converged to sponsor a phenomenon that enables individuals and businesses to choose how they'll acquire or deliver IT services, with reduced emphasis on the constraints of traditional software and hardware licensing models. Services delivered through the cloud will foster an economy based on delivery and consumption of everything from storage to computation to video to finance deduction management.