Disruptive IT trends that business continuity managers need to be aware of In this article, Ian Kilpatrick describes five trends that may impact data protection strategies during 2013: 1. BYOD BYOD was arguably the biggest buzz word of 2012 and is now an unstoppable, user-driven wave which will continue to make a major impact on the IT world in 2013 and beyond. Smartphones, tablets and laptops all come under this category, as well as desktop PCs used remotely from home. BYOD is a transformative technology and 2013 will see companies trying to integrate it into their networks. While tactical needs will drive integration, strategic requirements will become increasingly important. Alongside this, and dependent on the penetration of Windows 8, we can expect to see the growth of Windows to Go secure USB sticks, which provide remote users with the supported version of the corporate desktop. These are available from a limited number of suppliers authorised by Microsoft. 2. Mobile device management The very rapid growth of mobile devices such as smartphones, tablets and laptops, but particularly smartphones, led to concerns about their management and security in 2012. With employees using their smartphones for both business and personal use, the security and management issues became blurred. Mobile device management solutions were a strong growth area in 2012, which will accelerate in 2013. Growth will be strongest for MDM solutions that offer features such as ensuring mobile device usage complies with company security policies, allocating access rights, managing configuration, updating policies, dealing with data leakage issues, and dealing with lost or stolen devices. Additionally, MDM solutions need to address the problem of managing both employer-owned and employee owned devices, and differentiating between business use and personal use. A crucial component for continued growth will be the clear separation between the management of business and personal data on devices. There are over 100 suppliers in mobile device management many of them are good but niche solutions. 3. High density wireless Wireless requirements have been significantly incrementing over the last year and this trend will continue in 2013. BYOD has changed both the data transfer and performance expectations of users. However, these expectations have not been met, with many networks still inadequate in their coverage and performance. The new 802.11ac standard, with 1 gigabit per second throughput rates, will be a key driver in organizations moving to high density wireless in 2013. High density wireless will provide companies with high coverage and high performance, supporting business critical applications and delivering complete site coverage. As legacy wireless implementations buckle under the strain of demand organizations are moving from tactical deployment of wireless to strategic implementations. There will continue to be a shift from niche solutions towards more strategic solutions. 4. Data back-up and recovery While large organizations have always been at the forefront of backup and recovery, data centres / centers and big data have put significant demands on them during 2012. Alongside that, smaller organizations have been under immense pressures from ever increasing data volumes, archiving and compliance requirements. At the top end, new data replication technologies will have a major impact for data centres in 2013. For smaller organizations, the shift from tape will continue apace. For conservative organisations, the move to disk (and, in particular, RDX technologies which combine the best of tape and disk) will accelerate. Hybrid backup to RDX and then the cloud will increase. In volume terms, the lowest move (but in market-hype the biggest) will be significant growth in direct backup to the cloud. 5. Data leakage protection With growing volumes of data and with regulatory bodies increasingly prepared to levy fines for various non-compliance issues, data leakage protection will continue to be a major cause for concern during 2013. Companies will be looking closely at how to secure and manage their data as their network boundaries spread even wider, with increased use of social networking and BYOD, increased remote access, the rapid growth of wireless, increased virtualisation and the move towards convergence. Increasingly, organizations will couple DLP products with SIEM (security information and event management) solutions. DLP concerns will also continue the growth curve for authentication (much of it hosted in the cloud) and encryption, to protect data, both in motion and at rest. Some companies will look to hosted security services and the cloud to cope with an increasingly complex security situation. The author •Date: 7th Dec 2012 • UK/World •Type: Article • Topic: ICT continuity
|
To submit news stories to Continuity Central, e-mail the editor. Want an RSS newsfeed for your website? Click here |
||||||||