Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[Yesterday at 11:48:22 AM]

[Yesterday at 11:48:22 AM]

[Yesterday at 11:48:22 AM]

[Yesterday at 11:48:22 AM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Top Seven IT Industry Trends In 2014
Pages: [1]   Go Down
  Print  
Author Topic: Top Seven IT Industry Trends In 2014  (Read 960 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email
Top Seven IT Industry Trends In 2014
« Posted: January 02, 2014, 06:57:17 PM »


Top Seven IT Industry Trends In 2014

Ian Kilpatrick, chairman of VAD Wick Hill Group, looks forward to the coming year.

Current indications are that 2014 will build on 2013 and show continued overall growth for the IT Industry

Security
Thanks to the NSA and GCHQ, (coupled with ongoing allegations against the Chinese), security, corporate privacy and encryption have moved swiftly up the corporate agenda. Identity management, which has often been seen as a ‘nice to have’, will become even more of a ‘must have.’

For many years, wireless security was an afterthought to wireless deployment. However, in 2014, with the ratification of multi GBPS 802.11ac, wireless security will become ever more important as organisations move from wired networks to wireless ones. 

As one example, the majority of wireless access point deployments in SMEs are connected to the trusted network, effectively bypassing the gateway security controls and policies. This isn’t sustainable, as wireless becomes the core of the network. There will be a rise in the deployment of both 802.11ac wireless and associated access point security.

With the exponential growth of smartphones, and their expanding use as essential business and personal tools, organisations are facing up to the necessity to protect them. Smartphone security has at last reached the radar, and sales will grow strongly in 2014.

Identity management solutions include those from Gartner Magic Quadrant market leaders VASCO and SafeNet. Wireless security solutions are available from vendors such as WatchGuard, Check Point and Xirrus. Kaspersky Lab is one of the vendors providing smartphone security.

Mobility and convergence
The rapid growth of mobility and the increase in numbers of mobile devices will carry on during 2014. This increase will go hand in hand with further growth in convergence, with all the associated threats and benefits.

As the number of mobile devices multiplies, managing them will be ever more crucial. MDM solutions will see further growth. Relevant MDM features will include - ensuring that usage complies with company security policies; allocating access rights; managing configuration; updating policies; dealing with data leakage issues; and dealing with lost or stolen devices.

MDM solutions are available from suppliers such as Kaspersky Lab.

Wireless
802.11ac, the new wireless standard, is scheduled for full IEEE certification in February 2014. It will deliver 1Gbps throughput initially, rising over time (and with enhancements) up to 7Gbps.

The shift from older 2.4Ghz mobile devices to faster (but shorter range) 5Ghz devices will directly lead to a significant proliferation of access points, with an associated rise in cabling, service and configuration activities.

WatchGuard and Xirrus are two suppliers with wireless access point solutions.

IPv6
IPV6 will make an increasing impact in enterprise organisations, as infrastructure upgrades create greater corporate IPV6 awareness and increased connectivity to IPV6 customers and suppliers.  IPV6 has a number of key mobility and roaming attributes, including the “home address” concept, which will raise some interesting challenges

Infrastructure, security and services around IPv6 will grow in 2014. IPV6 has greater security capabilities, however, during the extended migration period from IPv4 to IPv6, major security holes are created. 

Transition to IPv6 is facilitated by solutions such as those from A10 Networks.

Big data
The rise in data volumes has changed the computing environment for many organisations, with challenges created in managing and reporting on the increasing amount of data, as well as dealing with the growing risk of data loss. 2014 will see data volumes continuing to grow, with a rise in sales of solutions which protect and manage these large amounts of data.

There are many such solutions in this area such as those from Imation and Barracuda Networks.

Visibility reporting and remediation systems
With multiple threats, organisations have deployed multiple security solutions and lost sight of what’s actually happening on the threat front. Consolidation to single suppliers will continue, but alongside that, deployment of reporting across multiple vendors will grow strongly.

Solutions which offer easy and quick visibility into what is happening, and has happened on networks, will rise in popularity. However visibility has proved to be insufficient and there will be increased momentum in systems that can not only report, but also remediate.

Vendors offering relevant solutions include Becrypt and Guidance Software.

Cloud services
Growth in cloud systems and SaaS will continue, particularly for utility services and amongst early adopters. The two key challenges to growth include privacy concerns and security. Solutions that address these issues are beginning to increase at a faster rate than the market.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.078 seconds with 23 queries.