Skip to main content

Cloud and Mobile Security Management Gain Momentum

As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of concern for many IT managers and executives.

Keeping business systems safe and protecting the data that they hold has never been more difficult to achieve, according to the latest market study by Ovum. The typical corporate ICT environment continues to be threatened by security attacks -- ranging from opportunistic hackers using pre-built tools through to targeted, well-resourced, state-sponsored cyber activity.

Ovum believes that online attack volumes will continue to rise and no business should consider itself immune -- since any type of organization can be targeted by hackers. Even the best-protected government, military and business systems have already been breached, and in 2014 they will to be put under further pressure.

Business Technology Security Trends to Watch in 2014

  • More proactive protection is needed to address the cyber security time bomb.
  • Security-as-a-service will be the way forward for a growing number of organisations.
  • Cloud and mobility will change the way we approach IT security and user protection.

"In 2014, cyber espionage and state-sponsored threats will continue to make headlines, but the concerning underlying trend is that similar technology can and will be used against ordinary businesses," said Andrew Kellett, principal analyst at Ovum.

Security experts recognize the rise in use of sophisticated malware, and this is driving the need for better and more proactive security. However, organisations will be required to fundamentally shift their approach to security from a mainly static defensive posture to one of taking positive action before or as an attack takes place.

In 2014, enterprise organisations will need to gain positive advantages from security intelligence, Big Data analytics, and the ability to understand threat priorities and the actions needed to sustain the well-being of the organization and its users.

According to Ovum's assessment, not every organisation has the budget or skilled security resources to meet its current protection requirements, let alone the extended use of cloud-based services and the BYOD-driven use of smartphones and tablets by employees.

Therefore, during 2014, more organizations will be forced to consider the practicalities of out-sourcing the requirement to managed service providers, utilizing their readily available security-as-a-service options.

Ovum believes the need for better security will be driven by ongoing operational demands -- including the use of new technology that makes business information more readily available and consequently more vulnerable to cyber-attacks.

"Ovum recommends that organizations should look to gain positive advantages from Big Data, security intelligence and analytics-based approaches to security management," concludes Kellett. "Meanwhile, mainstream security vendors need to provide a range of products and services that genuinely meet the protection needs of both SMEs and large enterprise clients."

Popular posts from this blog

Why the Future of AI is Agentic but Precarious

We have now entered the AI Agentic era, according to the latest series of reports by Google's artificial intelligence (AI) researchers. The shift from passive generative AI models to autonomous AI agents that can plan, reason, and act on our behalf is the most profound digital transformation in decades. As  Applied-AI Initiatives replace deterministic code, a significant challenge has emerged. Building an AI agent is easy; however, trusting it is complex. The current AI market momentum reveals a stark last-mile gap. While a developer can spin up an AI prototype in minutes, roughly 80 percent of the effort required to reach production is consumed by the work of safety, validation, and infrastructure. The reason is simple: AI agents are non-deterministic. They can pass 100 unit tests but fail catastrophically in the field because of a flaw in their judgment, not a bug in the code. Core Architecture and the Problem-Solving Loop An Applied-AI agent is defined by the synergy of four co...