Top five IT predictions for 2013

Staff writer
19 Dec 2012
00:00

CA Technologies’ top five IT predictions for 2013:

1. Big Data grows up

There will be an emergence of Big Data Administrators, who will play a critical role in using new technologies and processing power to take a cold, hard (and useful) look at data and its business application. In 2013, Big Data projects will begin to show demonstrable return on investment. As with cloud, our definitions will mature, enabling better focus on delivering business value. This infrastructure that integrates with data from social media and open data sources will dramatically increase the demand for management and security. The risk of Big Data decision is much lower and the insights it provides will increase IT's leadership on innovation.

2. Enterprises adopt public cloud

Enterprises will adopt public cloud services, spurred by the expansion of offerings from service providers (SP) like established telcos, who have already earned their trust. In addition, as SPs franchise their business models and technologies, cloud services will surge outside the US. Additionally, the buzz of “the cloud” will dim as people realize it's just the way business is done. Vertical industries such as healthcare will lead this trend, realizing its impact on security, the value of specialized community cloud services and the ability to address compliance while driving down costs. Mainframe will move more rapidly to the cloud as companies that already have a mainframe will adopt cloud technologies and processes to get the most out of them. Externally hosted private cloud adoption will also increase in the next couple of years.

3. Identity is the new perimeter

Enterprise users know no bounds of time and space. As they adopt cloud services and collaborate globally with external customers and partners from multiple devices, they erase the traditional IT perimeter. Security professionals today find themselves in a borderless war on multiple fronts and one common ally – identity. Strongly authenticated identity is the new perimeter. This places emphasis on reducing risk at the authentication point, signaling the end of the password as we know it today. As such, we expect to see advanced authentication models expand. We will see more risk-based authentication coming into play based on the device, transaction, location and more. We will see industry move towards more intelligent methods of authentication such as pattern creation, image recognition, mobile phone-based authentication, audio and biometrics. But this is not enough. We will see more content-driven security based on what the data is, or how it's classified, and that information, plus user identity and role, will be used to guide access rights.

4. The seventh sense

There will be increased exploitation of sensing technologies available in most modern mobile devices as the 'Internet of Things' takes hold. Everything will become intelligent as sensors are embedded into a wide array of devices from the home to those that drive applications that span disaster management, healthcare IT, transportation networks, Smart Grids, utility computing and more. These technologies will drive additional demand for IT to manage, store, analyze and secure the data traffic, privacy and end points.

Related content

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.