TOP SEVEN IT INDUSTRY TRENDS IN 2014

Read Time:4 Minute, 33 Second

Ian Kilpatrick, chairman of VAD Wick Hill Group, looks forward to the coming year in the IT industry

Current indications are that 2014 will build on 2013 and show continued overall growth for the IT Industry

Security 
Thanks to the NSA and GCHQ, (coupled with ongoing allegations against the Chinese), security, corporate privacy and encryption have moved swiftly up the corporate agenda. Identity management, which has often been seen as a ‘nice to have’, will become even more of a ‘must have.’

For many years, wireless security was an afterthought to wireless deployment. However, in 2014, with the ratification of multi GBPS 802.11ac, wireless security will become ever more important as organisations move from wired networks to wireless ones.

As one example, the majority of wireless access point deployments in SMEs are connected to the trusted network, effectively bypassing the gateway security controls and policies. This isn’t sustainable, as wireless becomes the core of the network. There will be a rise in the deployment of both 802.11ac wireless and associated access point security.

With the exponential growth of smartphones, and their expanding use as essential business and personal tools, organisations are facing up to the necessity to protect them. Smartphone security has at last reached the radar, and sales will grow strongly in 2014.

Identity management solutions include those from Gartner Magic Quadrant market leaders VASCO and SafeNet. Wireless security solutions are available from vendors such as WatchGuard, Check Point and Xirrus. Kaspersky Labis one of the vendors providing smartphone security.

Mobility and convergence
The rapid growth of mobility and the increase in numbers of mobile devices will carry on during 2014. This increase will go hand in hand with further growth in convergence, with all the associated threats and benefits.

As the number of mobile devices multiplies, managing them will be ever more crucial. MDM solutions will see further growth. Relevant MDM features will include – ensuring that usage complies with company security policies; allocating access rights; managing configuration; updating policies; dealing with data leakage issues; and dealing with lost or stolen devices.

MDM solutions are available from suppliers such as Kaspersky Lab.

Wireless 
802.11ac, the new wireless standard, is scheduled for full IEEE certification in February 2014. It will deliver 1Gbps throughput initially, rising over time (and with enhancements) up to 7Gbps.

The shift from older 2.4Ghz mobile devices to faster (but shorter range) 5Ghz devices will directly lead to a significant proliferation of access points, with an associated rise in cabling, service and configuration activities.

WatchGuard and Xirrus are two suppliers with wireless access point solutions.

IPv6 
IPV6 will make an increasing impact in enterprise organisations, as infrastructure upgrades create greater corporate IPV6 awareness and increased connectivity to IPV6 customers and suppliers. IPV6 has a number of key mobility and roaming attributes, including the “home address” concept, which will raise some interesting challenges

Infrastructure, security and services around IPv6 will grow in 2014. IPV6 has greater security capabilities, however, during the extended migration period from IPv4 to IPv6, major security holes are created.
Transition to IPv6 is facilitated by solutions such as those from A10 Networks.

Big data
The rise in data volumes has changed the computing environment for many organisations, with challenges created in managing and reporting on the increasing amount of data, as well as dealing with the growing risk of data loss. 2014 will see data volumes continuing to grow, with a rise in sales of solutions which protect and manage these large amounts of data.
There are many such solutions in this area such as those from Imation and Barracuda Networks.

Visibility reporting and remediation systems
With multiple threats, organisations have deployed multiple security solutions and lost sight of what’s actually happening on the threat front. Consolidation to single suppliers will continue, but alongside that, deployment of reporting across multiple vendors will grow strongly.

Solutions which offer easy and quick visibility into what is happening, and has happened on networks, will rise in popularity. However visibility has proved to be insufficient and there will be increased momentum in systems that can not only report, but also remediate.

Vendors offering relevant solutions include Becrypt and Guidance Software.

Cloud services 
Growth in cloud systems and SaaS will continue, particularly for utility services and amongst early adopters. The two key challenges to growth include privacy concerns and security. Solutions that address these issues are beginning to increase at a faster rate than the market.

 

Bio of author 


Ian Kilpatrick is chairman of international value added distributor Wick Hill Group plc, specialists in market development for secure IP infrastructure solutions. Kilpatrick has been involved with the Group for more than 35 years. Wick Hill supplies organisations from enterprises to SMEs, through an extensive value-added network of accredited VARs. 

Kilpatrick has an in-depth experience of IT and unified communications (UC) with a strong vision of the future. He looks at these areas from a business point-of-view and his approach reflects his philosophy that business benefits, ease-of-use and cost of ownership are key factors, rather than just technology. He has authored numerous articles and publications, as well as being a regular speaker at conferences, exhibitions and seminars.

 

www.Bizworldonline.com is a B2B online publication for the UK business community.
Please send business & company news stories to:

Business World
First Floor Offices
Unit 2 Alliance Trading Estate
Torrington Avenue
Coventry
CV4 9BH

Email: petermarshall@bizworldonline.com

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post LANGUAGE COMPANY ‘GEARED UP’ FOR ROMANIAN AND BULGARIAN INTERPRETING AND TRANSLATION
Next post Five steps businesses need to take to become cyber robust in 2014