2015 is quickly coming to a close, and at Pulse Secure, we are always looking at “What’s Next.” As we look to the future, specifically at what 2016 holds, four themes come to mind: the evolution of the cloud, increased connectivity, changing demands from IT related to BYOD, and identity management. In speaking with customers, partners and our own internal experts, here are some emerging issues we anticipate being top of mind in the evolving security landscape as we embark on a new year:
1) Cloud Access Security Brokers (CASBs) are Not a Silver Bullet
2016 will shine a light on the fundamental CASB issues, previously overlooked as organizations allowed uncontrolled access to ad-hoc applications such as Box, Dropbox and Google Drive. These issues, including the addition of another disparate layer to the security management stack, and many of the functions offered by CASBs are already built into solutions being deployed and adopted by enterprises. CASBs are not a silver bullet for security, as they do not address what is happening in the data center. In the year ahead, IT will be more focused on and concerned about the ability of CASBs to scale and how to ensure only compliant devices are accessing data in the cloud.
2) The Rise of Bring Your Own Everything (BYOx)
We are on the precipice of organizations finally starting to fully appreciate both the benefits and perils the BYOx movement entails. What started with employees wanting to use laptops with corporate apps has quickly spread to needing to utilize these apps on tablets, phones and, in the future, possibly even cars. Organizations need to be ready for this new wave of demands and must consider building platforms that can cope with the X-factor.
3) Time for the Security of Things
As more devices become exposed to open networks connected to the Internet, security needs to be at the forefront of everyone’s minds. A ‘Security of Things’ policy will be essential in order to create basic building blocks to mitigate risks and pave the way for wider adoption of the Internet of Things (IoT).
4) Organizations Will Make the Switch to an Identity- and Device-Based Model
Mobile access to IT is on the rise, ranging from the use of remote systems during customer visits to collaboration with partners. In the year ahead, access to IT needs to be more flexible. 2016 will see a number of very large organizations starting to mandate Enterprise Mobility Management (EMM) across not just one device, but every device a user interacts with that can impact the IT environment.
These 2016 headliners and trends build upon the new developments and changing technology that came out of the past year. 2015 was quite a year for security breaches and innovation, along with the continued focus on the IoT. In 2016, security will remain a major concern as technology continues to progress and the world becomes more interconnected. IT will be called on for help in new ways with increased flexibility, and the evolution of security across devices will continue to advance. What are some of your predictions for the year ahead in the security space?