Daren Glenister

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security

It has been a tumultuous year in data privacy to say the least – we’ve had a huge increase in data breaches, including some of the largest in history; an uncertain future when it comes to cybersecurity policies; new European regulations that have major implications for U.S. companies; and yet, business carries on. Despite all the challenges and risks, businesses will continue to move forward on digital transformation, cloud adoption and mobile adoption, all with an eye on cybersecurity.

These are the biggest trends that I see carrying us into 2017:

Cloud adoption is now mainstream and businesses are continuing to invest heavily in moving operations to the cloud. In fact, over 65 percent of organizations are currently focusing on cloud adoption. Although security is a priority, IT departments are being pressured by the business to move at a pace of change impossible to achieve by changing existing systems alone. This pressure will see an increase in cloud technologies that provide significant improvements in customer interaction and improvements in retaining and servicing customers. Cloud services that drive business efficiency while ensuring security will lead the way in cloud adoption.

Digital transformation: a major revenue driver. Every major vertical will invest in digital transformation in 2017, if they haven’t already started to do so. Highly regulated industries in particular will make investments, including finance, healthcare and the life sciences, and will be led from the top down by CEOs and CMOs. However, this will cause major conflicts with the IT departments as they try to retroactively fit the new solutions with the legacy systems currently in place.

Mobile, mobile, mobile: Everything must be built for mobile, but security is still a top concern. Once the line between personal and businesses devices blurs, where does the responsibility lie in protecting data, the “crown jewels” of your organization? Many organizations have taken the approach of securing the device and the data held on that device. The bigger issue businesses are facing is how to protect the data once it leaves the device. The growing need to protect the data in motion, while collaborating with partners or third-party vendors, will see a rise in secure ecosystems or portals where cloud technologies will allow secure movement of data inside and outside the traditional enterprise boundaries.

Collaboration is moving up the security pyramid: Enterprise file sync and share (EFSS) and secure workplace collaboration/chat apps are old hat, and fall at the bottom of the security pyramid. In 2017, collaboration initiatives will be driven by the need to protect the highest-value data and specialized digital processes (e.g. M&A due diligence, post-merger integration, clinical trial remote monitoring, and regulatory risk management). Consumer products struggle to fill this need, so expect more enterprise-grade services to appear.

Cybersecurity: not IF, but WHEN. Businesses are approaching cybersecurity with a whole new mentality in 2017, assuming that at some point they will experience a data breach, if they haven’t already. However, most companies can’t keep up with different threats from hackers, phishing, and cyberattacks, so cybersecurity collaboration initiatives will be driven by businesses resorting to protecting the most critical assets only. If 2016 was the year of the hack, then 2017 is when data breaches will go viral. With an inability to classify all data, IT departments will continue to classify and protect just the critical data.

Overall, 2016 has seen major changes in data privacy and the cloud, and a lot of 2017 will be dedicated to making sense of everything. Some of these trends are new, and some are well-known, but I look forward to exploring each one in more depth as they develop further in 2017.

By Daren Glenister

Daren Glenister

Daren is the Field Chief Technology Officer for Intralinks. Daren serves as a customer advocate, working with enterprise organizations to evangelize data collaboration solutions and translate customer business challenges into product requirements.

Glenister brings more than 20 years of industry experience and leadership in security, compliance, secure collaboration and enterprise software, having worked with many Fortune 1000 companies to turn business challenges into real-world solutions.

View Website

CONTRIBUTORS

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
Cloud Computing Certification Courses

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...

NEWS

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...
Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...