Friday, October 25, 2013
Information security landscape shifting toward 'Nexus of Forces'
Information security demands are ramping up, thanks to the growing popularity of what Gartner calls the Nexus of Forces, which includes technologies such as cloud computing, mobile, social and data-related solutions.
Secure File Transfer
Information security demands are ramping up, thanks to the growing popularity of what Gartner calls the Nexus of Forces, which includes technologies such as cloud computing, mobile, social and data-related solutions. By 2020, the research firm believes that 60 percent of security budgets will be for rapid detection and response tools, expanding from less than 10 percent in 2013.
Businesses today are struggling to safeguard all corporate endpoints, especially in the face of the bring-your-own-device (BYOD) phenomenon and shift toward cloud-based environments. Employees using their personal smartphones, tablets and laptops can access work-related content anywhere, regardless of their physical location because the cloud is available via the Internet. This development is making it even more difficult for firms to keep data from being lost, stolen or exposed.
"We are faced with a 'perfect storm' - the convergence of socialization, consumerization, virtualization and cloudification that will force radical changes in information security infrastructure over the next decade," said Tom Scholtz, vice president and Gartner fellow. "Organizations are changing radically - tearing down and redefining traditional boundaries via collaboration, outsourcing and the adoption of cloud-based services - and information security must change with them."
Firms that want to make sure data is not exposed at any point should consider adopting secure file sharing tools. These solutions are user-friendly options that provide the necessary safeguards for corporate environments whether information is being sent, received or stored.
Nexus of Forces among top IT innovations
The Nexus of Forces is not expected to go away anytime soon, making it crucial that organizations shore up weak points throughout their IT infrastructures. A survey of Fortune 500 CIOs and CTOs by Sierra Ventures found that nearly a third named mobile devices and big data as the most significant IT innovations influencing their companies. Another 24 percent cited cloud computing and 12 percent said the same regarding social media.
As more companies embrace the Nexus of Forces, it will not make the lives of key decision-makers any easier. Tim Guleri, managing director at Sierra Ventures, said business leaders have a lot of tasks on their hands.
"We found that today, CIOs and CTOs have to wear multiple hats such as being strategic while keeping up with ever-changing technology advances and maintaining legacy systems," Guleri said. "They have to evaluate risk, be innovative - all while keeping the lights on and the systems up and running."
Data can be exposed in a variety of ways, whether these incidents are malicious or inadvertent. Firms that have already experienced major breaches should be an example for others to do all they can to avoid such situations. Organizations adopting new technologies may not realize they are opening themselves up to even more threats if they are not careful. Secure file sharing tools can minimize the risks associated with such transitions so employees do not potentially contribute to any system vulnerabilities.