Gartner's Top 10 security trends for 2014

Security

by Jimmy Nicholls| 25 June 2014

Research firm tells CTOs what to watch out for this year.

Gartner has announced its top ten security technologies for the rest of this year, emphasising the need for better protection around big data, cloud networks and the internet of things.

Speaking at the analyst firm's security conference in Maryland, US, Neil MacDonald vice president and Gartner Fellow, stressed that companies keep up to date with the latest technology in order to ensure they remain as secure as possible.

He said: "Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the Nexus of Forces, which brings mobile, cloud, social and big data together to deliver new business opportunities."

He added that organisations are increasing security resources, but that attacks were become more sophisticated over time.

Building on this Gartner outlined the following ten security technologies:

- Software is set to increasingly lead digital security as time goes on, taking away the emphasis from hardware within data centres.

- In line with this operational technology, used to manage manufacturing and utility assets, is set to become more software based, in what Gartner sees as the industrial subset of the Internet of Things.

- Big data security analytics will be an increasing trend over the next few years, with 40% of organisations predicted to have security data warehouses by 2020.

- Pervasive sandboxing will increasingly allow software to be run in isolation on a virtual machine to determine whether it is dangerous to the main system.

- Cloud access security brokers existing between consumers and providers will enable IT managers to have greater visibility and control of the service.

- Adaptive access controls will provide a more dynamic way of allowing trusted individuals access to company assets based on the context of their device and location, among other things.

- As certificates lose their currency in the security world containment will also become a foundational strategy for security.

- Endpoint detection and response will see central databases monitoring activity on company devices, with the data being analysed to improve the security of the system as a whole.

- Machine-readable threat intelligence, including services analysing the reputation of users, will enable firms to combine intelligence feeds more fluently.

- Interactive application security testing will combine elements from static and dynamic testing, allowing users to assess to what extent a bug can be exploited, and where it originates from.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.