|By Rajiv Gupta||
|January 13, 2014 08:45 AM EST||
Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partner to the business unit. It will be the year that the CIO carves out a new role of strategic importance, namely the enabler of cloud apps that drive agility, productivity and competitive advantage for their business units. In 2014, CIOs and IT departments will use rapidly emerging cloud security solutions to accelerate the adoption of SMAC (social, mobile, analytics and cloud) within the enterprise and will embark on security transformation.
1. Rush to adopt cloud services will drown out security fears
Cloud security risks will never be completely eliminated, obviously, but security won't be a cloud adoption obstacle in 2014. Cloud security is already on par, if not better than, traditional digital security, and 2014 will mark the cloud security tipping point, the beginning of real security transformation.
The major tech giants (Microsoft, Apple, Facebook, Google, Amazon, etc.) have all placed major bets on the cloud, and the rest of the economy, regardless of industry, will follow their lead. In fact, a recent study found that cloud adoption is already high in industries as varied as manufacturing, health care, media and financial services - and that's just reported adoption.Shadow IT would push those numbers higher.
2. IT stops blocking cloud services over outdated risks
There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky.
This approach is pointless at best, since it's so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.
In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them.
3. IT gains more organizational power due to the rise of SMAC
Not that long ago, the IT world fretted about whether or not IT was becoming irrelevant in this service-driven world. Now, with social, mobile, analytics, and cloud trends all converging in chaotic ways and the number of service providers increasing at dizzying rates, IT will start to get over their self-image as operators and providers of all IT infrastructure, applications, devices, and services and will start to see themselves more as the strategic enabler of services
According to Computerworld, the hottest IT job right now is IT business analyst. Not long ago, only the CIO worried about aligning technology with business goals. In 2014, it will be the entire IT department.
4. Revenge of the CIO - CIOs will transition from CI-No's to business enablers
As IT departments become more strategic, the CIO's role will change drastically too. CIOs are tired of being "CI-No's." It's not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages.
CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience.
5. CIOs who aren't comfortable with SMAC will be challenged
By the end of 2014, CIOs who don't understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who "just say no" and fail to adapt will face criticism from everyone from board members who can't live without access to corporate data on their personal tablets to developers who demand access to services like AWS.
Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-to-adapt organizations.
6. Unencrypted data will start to disappear
Ask any digital security professional for tips on how to better secure anything from the cloud to mobile end points to social media, and every single one will mention encryption at some point. In 2014, data will be encrypted everywhere - in motion, at rest, on corporate-owned smartphones, on employee-owned mobile device, etc.
As more applications and services reside in the cloud, the focus on how best to encrypt data will shift away from endpoints to cloud services and networks. The weak link in data encryption is the endpoint, but in 2014 that weak link will start to be eliminated, with important data never stored on end devices.
In 2014, enterprises will also demand encryption services that encrypt data no matter where it resides. Soon, there will be no such thing as unencrypted data.
7. Cloud adoption will force the enterprise to regain control of encryption keys
As unencrypted data disappears, so too will encryption keys that the enterprise does not own or control. New key escrow mechanisms will emerge allowing cloud service providers to have access to the customer data in the clear, but only for controlled, narrow windows of time. There will also be massive interest in encryption algorithms that allow enterprise ownership of encryption keys and do not break cloud service provider functionality.
8. VPNs and agents begin to disappear
Mobile devices access more enterprise services each and every day, and the way most enterprises protect data as it travels from applications to mobile devices is through a VPN. However, even simple to use VPN clients have their issues, such as reduced battery life and misconfigurations and connectivity issues.
As everything from tire pressure gauges to soil sensors to fitness monitors connects to the Internet, new ways to encrypt wireless data traffic will emerge. The agent-based approach will start to be phased out in 2014.
9. Data security re-emerges, this time to stay
Even as encryption becomes standard, it won't be enough. Encrypting data is indeed a best practice, but it's one tool in the tool chest. Just because your data is encrypted doesn't mean you know where it's been, where it's going, or whether or not it was accessed inappropriately. As a result, data access analytics and cloud-based data loss prevention (DLP) tools will start to become as common in the next few years as firewalls were in the past.
Data tracking tools will grow more powerful over time, meaning that even if you store data in a third-party cloud that you have no visibility into now, you'll need to start gaining visibility in 2014.
10. A virtual security perimeter begins to take shape
Traditional perimeter security is on life support. Traditional Firewalls, IPSes, and VPNs do a poor job of protecting against emerging cloud, mobile, and social threats. However, there is now a virtual cloud edge developing, one that enforces policies spanning authentication, identity management, access control, encryption, data movement, and more. This virtual cloud edge will enable organizations to securely stitch together their various clouds (private, public, hybrid), while even protecting traditional behind-the-firewall applications.
In 2014, the virtual security edge will begin to take shape in response to BYOD and cloud risks, but its benefits will be much further reaching.
11. The SMACS famous five (Social, Mobile, Analytics, Cloud, Security) will be the rage in 2014
Cloud is the main driver of social and mobile today. Cloud-delivered analytics will become more widely used. In 2014 cloud and analytics will form another alliance, namely, "Analytics for the Cloud." This will help the industry gain better, more actionable insights into cloud usage and behavior. The analogous alignment between Cloud and Security will emerge: cloud-delivered security will become more widely used and will be joined by security tools purpose-built for the cloud.
Meanwhile, those organizations blocking services will be at a major disadvantage in 2014, since their ability to compete will be seriously hindered.
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
Nov. 20, 2014 01:00 PM EST Reads: 1,278
As cloud gives an opportunity to businesses to buy services externally – how is cloud impacting your customers? In his General Session at 15th Cloud Expo, Fabio Gori, Director of Worldwide Cloud Marketing at Cisco, provided answers to big questions: Do you see hybrid cloud as where the world is going? What benefits does it bring? And how does Cisco connect all of these clouds? He also discussed Intercloud and Cisco’s investment on it.
Nov. 18, 2014 09:00 PM EST Reads: 1,383
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, p...
Nov. 18, 2014 08:15 PM EST Reads: 1,396
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
Nov. 17, 2014 11:00 AM EST Reads: 1,566
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Nov. 17, 2014 10:00 AM EST Reads: 1,563
Vichara Technologies in Hoboken, New Jersey is expanding its capabilities in big data from origins on Wall Street into other areas, and thereby demonstrating the growing marketplace for advanced big-data analytics services. The next BriefingsDirect deep-dive big data benefits case study interview explores how Vichara Technologies in Hoboken, New Jersey is expanding its capabilities in big data from origins on Wall Street into other areas, and thereby demonstrating the growing marketplace for ad...
Nov. 16, 2014 01:00 PM EST Reads: 1,198
Moscow-based OpenBank, one of the largest private financial services groups in Russia, has built out a business intelligence capability for wholly new business activity monitoring benefits. The next BriefingsDirect deep-dive big data benefits case study interview explores how Moscow-based Otkritie Bank, one of the largest private financial services groups in Russia, has built out a business intelligence (BI) capability for wholly new business activity monitoring (BAM) benefits. The use of HP V...
Nov. 12, 2014 06:45 AM EST Reads: 1,278
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Nov. 10, 2014 12:00 PM EST Reads: 5,894
Scene scenario: 10 am in a boardroom somewhere, second round of coffees served, Danish and donuts untouched, a quiet hush settles. “Well you know what guys? (and, by the use of the term guys I mean to include both sexes here assembled) – the trouble that we have as a company is that we are, to put it bluntly, just a little analytics poor,” said the newly appointed Chief Analytics Officer. That we should consider a firm to be analytically deficient or poor is a profound comment on our modern ag...
Nov. 10, 2014 07:18 AM EST Reads: 2,395
Quantum is a leading expert in scale-out storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecyle. They help customers maximize the value of these assets to achieve their goals, whether it’s top movie studios looking to create the next blockbuster, researchers working to accelerate scientific discovery, or small businesses trying to streamline their operations. With a comprehensive portfolio of best-i...
Nov. 3, 2014 07:00 PM EST Reads: 3,515
Roger: Could you explain for our audience the significance of containerization, and how it differs from virtualization? Ben: Traditional virtualization was created over a decade ago, when applications were long-lived, monolithic, and deployed to a single server. In this world, when the problem to be solved was proliferation of single purpose physical servers – e.g. one server for Microsoft exchange, one server for Mac Print, one server for a custom Unix inventory -- it made sense to turn all of ...
Nov. 2, 2014 08:00 PM EST Reads: 7,020
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, will discuss how a user-centric Application Performance Management solution can help inspire your users with every appli...
Nov. 2, 2014 07:00 PM EST Reads: 3,992
SYS-CON Events announced today that Verizon has been named "Gold Sponsor" of SYS-CON's 15th International Cloud Expo®, which will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that generate growth, drive business innovation and move society forward. With industry-specific solutions and a full range of global wholesale offerings provided over the company's secure mobility, cloud, strategic network...
Nov. 2, 2014 06:00 PM EST Reads: 2,286
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With “smart” appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user’s habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Nov. 2, 2014 05:00 PM EST Reads: 3,822
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
Nov. 2, 2014 03:00 PM EST Reads: 2,887
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic...
Nov. 2, 2014 12:00 PM EST Reads: 2,538
The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-on lessons with IoT devices and reveal privacy options and a new risk balance you might not expect.
Nov. 2, 2014 12:00 PM EST Reads: 2,875
As Platform as a Service (PaaS) matures as a category, developers should have the ability to use the programming language of their choice to build applications and have access to a wide array of services. Bluemix is IBM's open cloud development platform that enables users to easily build cloud-based, creative mobile and web applications without having to spend large amounts of time and resources on configuring infrastructure and multiple software licenses. In this track, you will learn about the...
Nov. 2, 2014 11:00 AM EST Reads: 3,099
This year like last year, XebiaLabs polled Fortune 1000 companies in banking, manufacturing, healthcare, government and IT, interviewing DevOps teams and everyone from QA to C-level suites. More than 1,000 people were asked to share their perspectives on software delivery trends. Last year the survey found that application deployments fail up to 30% of the time and that 75% of managers believe their deployment process deserves a failing grade. This year, the survey revealed little change in at...
Nov. 2, 2014 07:00 AM EST Reads: 5,494