Identity, Security and Cloud Predictions

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions.

According to the Identity Theft Resource Center, there was a 30% increase in the number of breaches tracked in 2013 compared to 2012. With such a large amount of information being compromised last year, privacy and IT security are destined to be topics of interest in 2014, including the consumerization of IT and how organizations will respond.

Click to read the full set of identity, cloud and security predictions from our thought leaders Click above to read the full set of identity, cloud and security predictions from our thought leaders


Privacy, will become a major concern in the mainstream this year, and consumers will respond proactively, according to NetIQ’s Ian Yip. He predicts that consumers will increasingly adopt authentication alternatives, acknowledging that standalone passwords are insecure. He also believes that data security, resilience, availability and recovery are the next step in the consumerization of IT, as individuals strive to backup their critical data.

Another topic of interest in 2014 is how organizations will respond to the heightened security risks. Trust in public cloud providers decreased significantly with the revelation of the NSA spying allegations in 2013. This year, Ian Yip predicts that organizations will shift their focus to on-premise cloud solutions that inherently offer more control over critical and sensitive data.

It is also predicted that organizations will steadily focus on the role of privileged users and utilize Managed Security Services for increased security management internally.

While BYOD was also a big trend in 2013, Bring-Your-Own-Identity (BYOI) will come into play in 2014, but it does not come without risks. NetIQ’s Michael Angelo reinforces that CIOs need to be prepared to monitor this trend, deciding if BYOI would reduce or increase their overhead, workload and liability/risk profile.

Labels:

Identity & Access Mgmt
Anonymous