IT’s Role Will Change

Yesterday’s article in Forbes magazine raised some interesting questions about how IT’s role will change in the next decade. The article which was an interview with Gartner’s Peter Sondergaard, global head of research at Gartner, explains major trends in IT that will drive that change.

  1. “The evolution toward cloud–not just from a technology architecture perspective, but more from the standpoint of a way of doing business”
  2. “Context-aware computing. It is separate to cloud, but there is some overlap.”
  3. “Pattern-based strategy. It’s the next step after predictive analytics.”
  4. “The business use of social networks. These different networks will reach close to 1 billion people by 2012.”

Each of these trends raises interesting security issues which are critical to the enterprise reaching and managing that change effectively and securely.  Organizations will need tools that can bridge the gap between the traditional enterprise and the cloud like Federated Virtual DirectoriesMark Wilcox and in the latest article from Security Inside Out talk about how virtual directories can bridge efficiently give businesses access to legacy stores of identity data without changing code.  Sophia Maler talks about how Oracle Identity Federation can use out of the box industry standard security protocols to communicate securely with cloud providers.  Iron clad cloud computing.

Context aware computing will require context aware security.  Context aware security is critical especially in the new world of mobile workforces using mobile devices.  An employee who starts his day in San Francisco and then travels to Moscow must be able to access resources securely but enterprise resources must be able to discern the appropriate security to apply to his request.  A context aware access management solution like Oracle Adaptive Access Manager can determine that the request is coming from Moscow and because the user is access the financial systems a secondary authentication is required for access.  This simple rule based on context can have important impacts on preventing unauthorized access.

Pattern based strategy is critical to compliance offerings.  If organizations have visibility into their security solutions and the management data they collect they can make important decisions.  Vendors are putting ways for organizations to monitor, manage and make good decisions about data into their products.  This is a critical first step in recognizing patterns and this evolving strategy.

Social networks and the value they provide organizations is critical to future success.  Organizations will need access management and federation solutions that go beyond single-sign-on and use OAuth to federate with social networks.  The organizations need to build the ability to monitor compliance, secure data at it’s source, etc. to ensure the right data is shared but secure data stays within the organization.  This balance of security and sharing is critical to the future innovations that social media will help organizations create.

This entry was posted in Access Management, Directory Services, Identity Management, Security News. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s