Welcome!

SDN Journal Authors: John Basso, Steven Lamb, Elizabeth White, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, @BigDataExpo, SDN Journal

@CloudExpo: Article

2014 Cloud Predictions: Enterprise IT Makes a Comeback

Enterprise IT organizations move to role of strategic partner

Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partner to the business unit. It will be the year that the CIO carves out a new role of strategic importance, namely the enabler of cloud apps that drive agility, productivity and competitive advantage for their business units.  In 2014, CIOs and IT departments will use rapidly emerging cloud security solutions to accelerate the adoption of SMAC (social, mobile, analytics and cloud) within the enterprise and will embark on security transformation.

1. Rush to adopt cloud services will drown out security fears
Cloud security risks will never be completely eliminated, obviously, but security won't be a cloud adoption obstacle in 2014. Cloud security is already on par, if not better than, traditional digital security, and 2014 will mark the cloud security tipping point, the beginning of real security transformation.

The major tech giants (Microsoft, Apple, Facebook, Google, Amazon, etc.) have all placed major bets on the cloud, and the rest of the economy, regardless of industry, will follow their lead. In fact, a recent study found that cloud adoption is already high in industries as varied as manufacturing, health care, media and financial services - and that's just reported adoption.Shadow IT would push those numbers higher.

2. IT stops blocking cloud services over outdated risks
There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky.

This approach is pointless at best, since it's so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.

In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them.

3. IT gains more organizational power due to the rise of SMAC
Not that long ago, the IT world fretted about whether or not IT was becoming irrelevant in this service-driven world. Now, with social, mobile, analytics, and cloud trends all converging in chaotic ways and the number of service providers increasing at dizzying rates, IT will start to get over their self-image as operators and providers of all IT infrastructure, applications, devices, and services and will start to see themselves more as the strategic enabler of services

According to Computerworld, the hottest IT job right now is IT business analyst. Not long ago, only the CIO worried about aligning technology with business goals. In 2014, it will be the entire IT department.

4. Revenge of the CIO - CIOs will transition from CI-No's to business enablers
As IT departments become more strategic, the CIO's role will change drastically too. CIOs are tired of being "CI-No's." It's not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages.

CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience.

5. CIOs who aren't comfortable with SMAC will be challenged
By the end of 2014, CIOs who don't understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who "just say no" and fail to adapt will face criticism from everyone from board members who can't live without access to corporate data on their personal tablets to developers who demand access to services like AWS.

Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-to-adapt organizations.

6. Unencrypted data will start to disappear
Ask any digital security professional for tips on how to better secure anything from the cloud to mobile end points to social media, and every single one will mention encryption at some point. In 2014, data will be encrypted everywhere - in motion, at rest, on corporate-owned smartphones, on employee-owned mobile device, etc.

As more applications and services reside in the cloud, the focus on how best to encrypt data will shift away from endpoints to cloud services and networks. The weak link in data encryption is the endpoint, but in 2014 that weak link will start to be eliminated, with important data never stored on end devices.

In 2014, enterprises will also demand encryption services that encrypt data no matter where it resides. Soon, there will be no such thing as unencrypted data.

7. Cloud adoption will force the enterprise to regain control of encryption keys
As unencrypted data disappears, so too will encryption keys that the enterprise does not own or control. New key escrow mechanisms will emerge allowing cloud service providers to have access to the customer data in the clear, but only for controlled, narrow windows of time. There will also be massive interest in encryption algorithms that allow enterprise ownership of encryption keys and do not break cloud service provider functionality.

8. VPNs and agents begin to disappear
Mobile devices access more enterprise services each and every day, and the way most enterprises protect data as it travels from applications to mobile devices is through a VPN. However, even simple to use VPN clients have their issues, such as reduced battery life and misconfigurations and connectivity issues.

As everything from tire pressure gauges to soil sensors to fitness monitors connects to the Internet, new ways to encrypt wireless data traffic will emerge. The agent-based approach will start to be phased out in 2014.

9. Data security re-emerges, this time to stay
Even as encryption becomes standard, it won't be enough. Encrypting data is indeed a best practice, but it's one tool in the tool chest. Just because your data is encrypted doesn't mean you know where it's been, where it's going, or whether or not it was accessed inappropriately. As a result, data access analytics and cloud-based data loss prevention (DLP) tools will start to become as common in the next few years as firewalls were in the past.

Data tracking tools will grow more powerful over time, meaning that even if you store data in a third-party cloud that you have no visibility into now, you'll need to start gaining visibility in 2014.

10. A virtual security perimeter begins to take shape
Traditional perimeter security is on life support. Traditional Firewalls, IPSes, and VPNs do a poor job of protecting against emerging cloud, mobile, and social threats. However, there is now a virtual cloud edge developing, one that enforces policies spanning authentication, identity management, access control, encryption, data movement, and more. This virtual cloud edge will enable organizations to securely stitch together their various clouds (private, public, hybrid), while even protecting traditional behind-the-firewall applications.

In 2014, the virtual security edge will begin to take shape in response to BYOD and cloud risks, but its benefits will be much further reaching.

11. The SMACS famous five (Social, Mobile, Analytics, Cloud, Security) will be the rage in 2014
Cloud is the main driver of social and mobile today. Cloud-delivered analytics will become more widely used. In 2014 cloud and analytics will form another alliance, namely, "Analytics for the Cloud." This will help the industry gain better, more actionable insights into cloud usage and behavior. The analogous alignment between Cloud and Security will emerge: cloud-delivered security will become more widely used and will be joined by security tools purpose-built for the cloud.

Meanwhile, those organizations blocking services will be at a major disadvantage in 2014, since their ability to compete will be seriously hindered.

More Stories By Rajiv Gupta

Rajiv Gupta is Founder and CEO of Skyhigh Networks. He has more than 20 years of successful enterprise software and security experience, and is widely recognized as a pioneer of Web Services and Client-Utility Computing, which was the precursor to cloud services as we know it today. With over 45 patents to his name, Rajiv has led two other companies to successful acquisitions by Cisco (Securent, Inc) and Oracle (Confluent Software). Previously, Rajiv spent 11 years at HP as GM of the E-speak Division – a division he started in 1998 to bring the Client-Utility Computing technology to market. Under his leadership, E-speak delivered some of the earliest Web Services technologies and standards and has been inducted into the Smithsonian National Archives. @TrustedMind

@CloudExpo Stories
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...