IT Security is Cloud Centric

For IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the enterprise to achieve appropriate security for it.

According to Gartner, by 2015, 10% of overall IT security enterprise capabilities will be delivered in the cloud.

Is BYOD part of the problem or part of the Plan? What forces will shape and drive embedded cloud security managed services?

IT managers are balancing security and support concerns with the very real potential to reap significant cost and productivity benefits from trends such as BYOD. Research has shown that BYOD is just the gateway to greater business benefits.

Over three-fourths (76%) of IT leaders surveyed categorized BYOD as somewhat or extremely positive for their companies, while seeing significant challenges for IT. These findings reinforce that BYOD is no passing fad and is here to stay. Many it managers are acknowledging the need for a more holistic approach to managing BYOD.

This includes one that is scalable and addresses mobility, security, virtualization and network policy management, in order to keep management costs in line while simultaneously providing optimal experiences where savings can be realized. CIOs have concluded that mobility needs to extend well beyond BYOD to include the integration of service provider mobility, enterprise mobility, security, collaboration and desktop virtualization solutions.

“Increased adoption of cloud-based computing is expected to impact the way security is consumed as well as how key government agencies will prioritize security of public cloud infrastructure,” according to Gartner analysts Ruggero Contu, Lawrence Pingree, and Eric Ahlm in their recent predictions forecast.

Gartner predicts by 2015, 10% of overall IT security enterprise capabilities will be delivered in the cloud, with the focus today on messaging, Web security and remote vulnerability assessment. There is also the expectation there will be more on the way, such as data-loss prevention, encryption, authentication available too as technologies aimed to support cloud computing mature.

OK so what about Rogue IT? How will organizations respond?

For example, tt is permeating the organization through desktops, laptops, and tablets. Rogue IT is viral, unyeilding, and for the most part unstoppable. So as the CIO what do you do – embrace it, prepare for it, or try to control and ban it from your organization? It seems the answer may just lie in the evolution of cloud services.

Consumer oriented cloud-based software such as Evernote or Dropbox in the office are examples of Rogue IT.

It is widespread in the organization as about 43% of businesses report that their employees are using cloud services independently of the IT department. This is according to a recent survey of 500 IT decision makers. How will these service offerings integrate into the organization in the future.

Gartner anticipates the acceleration of change in cloud-based security will likely “threaten” some traditional business relationships that IT security providers have with their value-added resellers. But the overall trend will lead to more managed security services providers through cloud delivery. Not surprisingly, a high level of merger and acquisition activity related to cloud-security start-ups and established players is predicted to be seen throughout 2013.

The U.S. federal government continues with its so-called FedRamp Program to accommodate external federal cloud services adoption, and this will also create conditions for growing use by federal agencies, Gartner notes. New compliance regimes are expected to take shape with standards defined by the National Institute of Standards and Technology, among others. Gartner expects that by 2016, all of this will even lead to public-cloud infrastructure becoming subject to “critical national infrastructure regulations” by the U.S.

The downside to growing cloud use by many companies is that failures in service availability, as has already been seen to happen in the past few years, could bring a “cascade” effect that would impact many thousands of organizations.

As a matter of fact Gartner noted in their recent “State of Cloud Security” report that cloud outages are bigger risks to organizations than data breaches.

Gartner’s predictions on IT security extended beyond cloud computing and IT security. Virtualization of networks is a continuing transformation and Gartner predicts by 2015, 20% of the VPN/firewall market will be deployed as a virtual switch on a hypervisor rather than as a physical security appliance.

“VMware’s edge firewall could expand virtual switch firewall adoption to beyond just the data center,” Gartner’s 2013 predictions report sugests. “To date, the virtual firewall market has been limited to data-center-class firewalls, which make up the minority of the total firewall market. A push from the virtual providers to bring their technology to the edge could be a key accelerator to the virtual switch market growth.”

The trend as we look into 2013 and beyond shows that the IT security industry, confronting the fact that networks have become virtualized, have to adapt — and that means “partnering with hypervisor providers has become critical to offering network security on the virtual switch.”

 

Published by myITview.com

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Dropbox Corporate Usage Grows As Does Security Concerns
  2. Cloud Computing Security: An Ongoing Issue
  3. The Top 5 Misconceptions of Cloud Storage Security

Comments

  1. Nishadha says:

    BYOD has great benefits and definitely way to increase productivity as well. There are security risks but they can be managed using different methods like application management software, virtual phones etc. But kind of hard to manage problem is how employees use these devices. Will they use this new found freedom to access application they can’t access via office. I think that is a much more tricky issue to address.
    Nishadha recently posted..Programming Quotes Based on MoviesMy Profile

  2. christina says:

    I like using WordPress and its plug-ins. It really makes our work much easy.

Speak Your Mind

*

CommentLuv badge
This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)