IT Security Trends 2013
-
Upload
imc-institute -
Category
Technology
-
view
3.154 -
download
1
description
Transcript of IT Security Trends 2013
IT SecurityTrends 2013
Assoc. Prof. Dr. Thanachart NumnondaExecutive DirectorIMC Institute21 January 2013
ISO & SECURITY MASHUP Seminar: Organized byAsian Intelligent Information Technology Co., Ltd. & E-Cqurity (Thailand) Co., Ltd.
2
Gartner Top 10 Strategic Technology Trends
Media tablets and beyond
Mobile-centric applications and interfaces
Social &contextual user experience
Application stores and marketplace
The Internet of everything
Next-generation analytics
Big data
In-memory computing
Extreme low-energy servers
Cloud computing
Mobile Device Battles
Mobile Applications and HTML5
Personal Cloud
Enterprise App Stores
The Internet of Things
Hybrid IT and Cloud Computing
Strategic Big Data
Actionable Analytics
In Memory Computing
Integrated Ecosystems
2012 2013
3
Mobile ComputingCloud Computing
Social Technologies Information
4
Bring Your Own Devices (BYOD)
5
Public Personal Cloud
6
“Social computing is moving from being just on the outside of the organization to being at the core of business operations.”
Peter Sondergaard, senior vice president at Gartner, 2012
7
“Big data currently has the most significant impact in social network analysis and content analytics
with 45% of new spending each year.”
Gartner, 2012
8
Sign of the Times
1995: Employee Car
2005: Employee Cell Phone
2015: Employee Computer / Devices
9
Mobile in Enterprise
Gartner forecasts that in 2016, half of all non-PC devices will be purchased by employees. By the end of the decade, half of all devices in business will be purchased by employees.
By 2016, 60% of large enterprises will implement limited access network zones to limit the connectivity of personally owned mobile devices.
Gartner predicts that through 2017, 90% of enterprises will have two or more mobile operating systems to support.
10
Security Trends
Security investments are going to dramatically increase. An already large security market is about to get much bigger, growing by 56% from current levels in five years time, while cloud security will almost triple.
More than 50% of firms currently providing identity access management as a service (IAMaaS) and cloud-based IAM solutions will be acquired by larger service providers by year-end 2015.
Source :http://www.networkworld.com/
11
Security Trends
Through 2013, 80% of cloud security incidents will be due to administrative error by cloud service providers or user management of cloud services.
For low-security environments, or for workloads that have simple security requirements, relying on the security built into structure or into the public cloud service will be good enough
At the high end, security will be kept separate from private or public cloud infrastructure -- just as we did when internal networks were virtualized
Source :http://www.networkworld.com/
12
Security Trends
The vast middle will compromise and run security workloads in the private cloud and public cloud environments.
There is an urgent need for companies to separate personal and business operations on consumer smartphones and tablets (both company- and user-owned)
Source http://www.networkworld.com/
13
Seven Top Security Trends
For 2013
14
Mainstream Cloud and Mobile Adoption Seeks Security
Source http://www.informationweek.com/
15
Businesses Begin Sandboxing Smartphone Apps
Source http://www.informationweek.com/
16
Cloud Offers Unprecedented Attack Strength
Source http://www.informationweek.com/
17
Post-Flashback, Cross-Platform Attacks Increase
Source http://www.informationweek.com/
18
Destructive Malware Targets Critical Infrastructure
Source http://www.informationweek.com/
19
Hackers Target QR Codes, TecTiles
Source http://www.informationweek.com/
20
Digital Wallets Become Cybercrime Targets
Source http://www.informationweek.com/
21
Summary
Mega IT Trends : Cloud Computing, Mobile Technology, Social Technology and Information.
Enterprise IT Impact: BYOD, Personal Cloud, Social Enterprise.
7 Top IT Security Trends: Mostly based on CSMI:
– Cloud Security, Mobile Security, Cross Platform, Mobile Wallet, QR Code, Critical Infrastructure