|By Rajiv Gupta||
|January 13, 2014 08:45 AM EST||
Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partner to the business unit. It will be the year that the CIO carves out a new role of strategic importance, namely the enabler of cloud apps that drive agility, productivity and competitive advantage for their business units. In 2014, CIOs and IT departments will use rapidly emerging cloud security solutions to accelerate the adoption of SMAC (social, mobile, analytics and cloud) within the enterprise and will embark on security transformation.
1. Rush to adopt cloud services will drown out security fears
Cloud security risks will never be completely eliminated, obviously, but security won't be a cloud adoption obstacle in 2014. Cloud security is already on par, if not better than, traditional digital security, and 2014 will mark the cloud security tipping point, the beginning of real security transformation.
The major tech giants (Microsoft, Apple, Facebook, Google, Amazon, etc.) have all placed major bets on the cloud, and the rest of the economy, regardless of industry, will follow their lead. In fact, a recent study found that cloud adoption is already high in industries as varied as manufacturing, health care, media and financial services - and that's just reported adoption.Shadow IT would push those numbers higher.
2. IT stops blocking cloud services over outdated risks
There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky.
This approach is pointless at best, since it's so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.
In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them.
3. IT gains more organizational power due to the rise of SMAC
Not that long ago, the IT world fretted about whether or not IT was becoming irrelevant in this service-driven world. Now, with social, mobile, analytics, and cloud trends all converging in chaotic ways and the number of service providers increasing at dizzying rates, IT will start to get over their self-image as operators and providers of all IT infrastructure, applications, devices, and services and will start to see themselves more as the strategic enabler of services
According to Computerworld, the hottest IT job right now is IT business analyst. Not long ago, only the CIO worried about aligning technology with business goals. In 2014, it will be the entire IT department.
4. Revenge of the CIO - CIOs will transition from CI-No's to business enablers
As IT departments become more strategic, the CIO's role will change drastically too. CIOs are tired of being "CI-No's." It's not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages.
CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience.
5. CIOs who aren't comfortable with SMAC will be challenged
By the end of 2014, CIOs who don't understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who "just say no" and fail to adapt will face criticism from everyone from board members who can't live without access to corporate data on their personal tablets to developers who demand access to services like AWS.
Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-to-adapt organizations.
6. Unencrypted data will start to disappear
Ask any digital security professional for tips on how to better secure anything from the cloud to mobile end points to social media, and every single one will mention encryption at some point. In 2014, data will be encrypted everywhere - in motion, at rest, on corporate-owned smartphones, on employee-owned mobile device, etc.
As more applications and services reside in the cloud, the focus on how best to encrypt data will shift away from endpoints to cloud services and networks. The weak link in data encryption is the endpoint, but in 2014 that weak link will start to be eliminated, with important data never stored on end devices.
In 2014, enterprises will also demand encryption services that encrypt data no matter where it resides. Soon, there will be no such thing as unencrypted data.
7. Cloud adoption will force the enterprise to regain control of encryption keys
As unencrypted data disappears, so too will encryption keys that the enterprise does not own or control. New key escrow mechanisms will emerge allowing cloud service providers to have access to the customer data in the clear, but only for controlled, narrow windows of time. There will also be massive interest in encryption algorithms that allow enterprise ownership of encryption keys and do not break cloud service provider functionality.
8. VPNs and agents begin to disappear
Mobile devices access more enterprise services each and every day, and the way most enterprises protect data as it travels from applications to mobile devices is through a VPN. However, even simple to use VPN clients have their issues, such as reduced battery life and misconfigurations and connectivity issues.
As everything from tire pressure gauges to soil sensors to fitness monitors connects to the Internet, new ways to encrypt wireless data traffic will emerge. The agent-based approach will start to be phased out in 2014.
9. Data security re-emerges, this time to stay
Even as encryption becomes standard, it won't be enough. Encrypting data is indeed a best practice, but it's one tool in the tool chest. Just because your data is encrypted doesn't mean you know where it's been, where it's going, or whether or not it was accessed inappropriately. As a result, data access analytics and cloud-based data loss prevention (DLP) tools will start to become as common in the next few years as firewalls were in the past.
Data tracking tools will grow more powerful over time, meaning that even if you store data in a third-party cloud that you have no visibility into now, you'll need to start gaining visibility in 2014.
10. A virtual security perimeter begins to take shape
Traditional perimeter security is on life support. Traditional Firewalls, IPSes, and VPNs do a poor job of protecting against emerging cloud, mobile, and social threats. However, there is now a virtual cloud edge developing, one that enforces policies spanning authentication, identity management, access control, encryption, data movement, and more. This virtual cloud edge will enable organizations to securely stitch together their various clouds (private, public, hybrid), while even protecting traditional behind-the-firewall applications.
In 2014, the virtual security edge will begin to take shape in response to BYOD and cloud risks, but its benefits will be much further reaching.
11. The SMACS famous five (Social, Mobile, Analytics, Cloud, Security) will be the rage in 2014
Cloud is the main driver of social and mobile today. Cloud-delivered analytics will become more widely used. In 2014 cloud and analytics will form another alliance, namely, "Analytics for the Cloud." This will help the industry gain better, more actionable insights into cloud usage and behavior. The analogous alignment between Cloud and Security will emerge: cloud-delivered security will become more widely used and will be joined by security tools purpose-built for the cloud.
Meanwhile, those organizations blocking services will be at a major disadvantage in 2014, since their ability to compete will be seriously hindered.
Gartner predicts that the bulk of new IT spending by 2016 will be for cloud platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017. The benefits of the cloud may be clear for applications that can tolerate brief periods of downtime, but for critical applications like SQL Server, Oracle and SAP, companies need a strategy for HA and DR protection. While traditional SAN-based clusters are not possible in these environments, SANless cluste...
May. 22, 2015 10:15 AM EDT Reads: 1,440
SYS-CON Events announced today that the "First Containers & Microservices Conference" will take place June 9-11, 2015, at the Javits Center in New York City. The “Second Containers & Microservices Conference” will take place November 3-5, 2015, at Santa Clara Convention Center, Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
May. 22, 2015 10:00 AM EDT Reads: 1,984
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
May. 22, 2015 10:00 AM EDT Reads: 5,795
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
May. 22, 2015 10:00 AM EDT Reads: 3,840
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
May. 22, 2015 10:00 AM EDT Reads: 1,028
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
May. 22, 2015 10:00 AM EDT Reads: 5,507
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
May. 22, 2015 09:45 AM EDT Reads: 1,245
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
May. 22, 2015 09:30 AM EDT Reads: 2,655
Enterprises are turning to the hybrid cloud to drive greater scalability and cost-effectiveness. But enterprises should beware as the definition of “policy” varies wildly. Some say it’s the ability to control the resources apps’ use or where the apps run. Others view policy as governing the permissions and delivering security. Policy is all of that and more. In his session at 16th Cloud Expo, Derek Collison, founder and CEO of Apcera, will: Explain what policy is; Show how policy should be arc...
May. 22, 2015 09:00 AM EDT Reads: 1,549
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
May. 22, 2015 08:45 AM EDT Reads: 1,454
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
May. 22, 2015 08:30 AM EDT Reads: 4,139
Cloud services are the newest tool in the arsenal of IT products in the market today. These cloud services integrate process and tools. In order to use these products effectively, organizations must have a good understanding of themselves and their business requirements. In his session at 15th Cloud Expo, Brian Lewis, Principal Architect at Verizon Cloud, outlined key areas of organizational focus, and how to formalize an actionable plan when migrating applications and internal services to the ...
May. 22, 2015 08:00 AM EDT Reads: 3,507
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
May. 22, 2015 08:00 AM EDT Reads: 4,651
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
May. 22, 2015 08:00 AM EDT Reads: 4,172
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
May. 22, 2015 06:00 AM EDT Reads: 4,834
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
May. 22, 2015 06:00 AM EDT Reads: 4,676
Big Data is amazing, it's life changing and yes it is changing how we see our world. Big Data, however, can sometimes be too big. Organizations that are not amassing massive amounts of information and feeding into their decision buckets, smaller data that feeds in from customer buying patterns, buying decisions and buying influences can be more useful when used in the right way. In their session at Big Data Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positi...
May. 22, 2015 05:30 AM EDT Reads: 2,298
More organizations are embracing DevOps to realize compelling business benefits such as more frequent feature releases, increased application stability, and more productive resource utilization. However, security and compliance monitoring tools have not kept up and often represent the single largest remaining hurdle to continuous delivery. In their session at DevOps Summit, Justin Criswell, Senior Sales Engineer at Alert Logic, Ricardo Lupo, a Solution Architect with Chef, will discuss how to ...
May. 22, 2015 05:15 AM EDT Reads: 2,967
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises a...
May. 22, 2015 05:00 AM EDT Reads: 2,322
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects - scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
May. 22, 2015 05:00 AM EDT Reads: 3,984