Unisys has released its tecnology predictions for the newly begun year of 2012. The report is based on information gathered from their global client roster over the past year.
Although its not a comprehensive report, more of a one page press release, its worth a quick read to get a feel for what IT and IT Security leaders are facing this year. For a closer look at their predictions, click here to read the full article.
The first three sections cover predictions for Cloud, Mobile, and Social Computing. No big surprise to find that most IT execs are looking these three exploding areas to both improve services offered and reduce costs.
What did surprise us was the revelation, that inspite of the explosion in popularity and adoption of cloud and managed services, many of IT execs are looking to increase their use of IT Appliances-especially for specialized functions. While we are big fans of the cloud movement, we know that there is still a very strong place for specialized hardware that will run onsite for a customer.
In our experience, customized software that is glove fitted to a standardized hardware platform tends to increase performance and minimize support issues. Many of the vendors we work with for DLP, Intrusion Prevention, Secure Web Gateway, etc. have software or virtual versions of their products. In most every case the virtual machines under perform the appliance versions and the software versions almost always are harder to support.
Finally, the Unisys predictions covered Cyber Security in their report. In our opinion, this was the most telling statement from that section:
“Organizations will also work to create greater integration of their security technologies, such as intrusion detection, malware / antivirus detection, and data loss prevention to improve their overall security operational models, and better react and respond to the growing volume and sophistication of security threats.”
While we completely agree that greater integration of DLP, intrusion prevention, and malware detection is beneficial, we still see that most organizations don’t even have all three in place, or don’t have the right combination in place to truly meet their needs and protect their infrastructure and information assets. Getting the right combination in place needs to be job one before working towards greater integration.