Gartner: Innovative Technologies on Collision Course
The rise of new cloud computing, mobile solutions, social media and big data analytics has been rapid, although experts are still trying to figure out what the end result will be once the dust finally settles. According to a recent report by Gartner, the four technologies are on a path of convergence that will form the “nexus of forces.”
“Social, information, mobile and cloud shouldn’t be considered in isolation as market forces,” said Linda Cohen, vice president and analyst at Gartner. “The nexus of forces converge in several ways: cloud, mobile and social solutions enable the distribution of information, social media usage and behavior drive mobile and information solutions, and cloud can be a foundation for information, social and mobile solutions.”
Meanwhile, an earlier study by IDC made a similar prediction. The report found that worldwide IT spending will jump 5.7 percent from 2012 to 2013, and that these four technologies will drive 90 percent of growth in future high-tech investment. Fran Gens, senior vice president and chief analyst at IDC, suggested that companies that don’t put “80 percent or more of their competitive energy into this market” will be at a disadvantage.
Security sector undergoing changes
At the same time, the growth of the cloud, mobile solutions, social media and big data has spurred significant changes in the way companies have to respond to security threats. The Gartner study, for instance, predicted that as cloud and mobile application adoption increases, IT departments will have to completely rethink their governance strategies.
While traditional cybersecurity strategies should not be abandoned, mobile device management (MDM) software is becoming a must-have in today’s world of bring-your-own-device (BYOD) initiatives. To manage the growing number of devices and applications being used to access corporate networks, a recent eSecurity Planet article highlighted some key considerations that company and IT leaders should keep in mind, including:
- Application management: Controlling every single device is quickly becoming an impossible task for IT departments. Therefore, tech professionals should focus more on safeguarding company applications and data for BYOD. Adopting customized mobile solutions can also help too by reducing an employee’s need to download third-party apps.
- Full-scale integration: With or without permission, workers are using personal laptops, tablets and smartphones. Any security strategy should therefore be compatible with these devices.
- Scalability and flexibility: Within the next few years, every company will have to support multiple operating systems and a range of devices. As a result, organizations should implement flexible security software that can be scaled up in the future.