Page 14 - CDM-Cyber-Warnings-January-2014
P. 14
Users also will seek services that provide stronger security and integrity. They recognize that virtualization and a growing number of entry points through the so-called Internet of Everything can trigger security problems. Everyday business systems will integrate faster with social and collaboration capabilities via the cloud. These systems will involve management transactions such as HR and enterprise resource management. As a result, bridging technologies, which usually are cloud- based, will need to be secure. Enhanced compliance rules and regulations globally will offer opportunities to cloud- hosting providers. They can promote their services to help businesses meet the compliance requirements, which relate to e-commerce as well as such specialty areas as health care and financial-services. Indeed:  Expect providers to furnish professional services’ capabilities around IT compliance and audits.  Anticipate providers offering services to help companies remediate any problems that emerge.  Look for security bundles from service providers that provide key compliance related services.  Envisage cloud providers and advisory services to offer counsel on global privacy and compliance laws and regulations. More companies will promote their capabilities about privacy, data storage, backup and security internationally. More also will seek to handle U.S. companies’ work abroad. Movement should occur toward the private cloud and away from the public cloud. Users are expected to decide that their security concerns dictate using their own private cloud more extensively. This reflects the growing multitude and proliferation of devices, which raise the specter of greater vulnerability to cyber attacks. Managed mobility will catch on. Especially management and security of employee-owned mobile devices. This will reflect growing concerns over endpoint security when accessing corporate data. It also will involve software agents advising and helping to manage and monitor information that goes on devices and from a remote-management perspective. + % %! ! & , ! . !( %+ ' "! "#+% ' - + % !& , ! % '& % & %) *"% *
   9   10   11   12   13   14   15   16   17   18   19