HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED ABOUT A MINUTE AGO.
You are here: Home / Network Security / 5 IT Myths To Be Debunked in 2013
GET RECOGNIZED
Let an ISACA® certification elevate your career.
Register today and save
Five IT Myths To Be Debunked in 2013
Five IT Myths To Be Debunked in 2013
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
DECEMBER
14
2012


With 2012 coming to a close, security analysts are beginning to offer predictions for the New Year. From cloud computing to BYOD, analysts are betting on what 2013 holds in store for IT departments.

Former Forrester analyst Andrew Jaquith, who is now CTO at Perimeter E-Security, talked to us about five myths he believes will be debunked in 2013. Four out of those five myths revolve around the cloud.

Myth One: Cloud Security

First of all, Jaquith points to the myth that security issues will remain the biggest obstacle to cloud adoption. It seems this drum has been beaten to death since the first mention of cloud computing. Jaquith is betting this myth will show itself to be false in 2013. In fact, he says it's simply not true.

"What remains the biggest obstacle to cloud adoption is the 'idea' that the cloud is not as secure as on-premise systems. In reality, the cloud has proven equally to more secure," he said. "It's analogous to keeping your money safely in a bank versus keeping it home under your mattress. Everyone knows a bank is a better, safer option. But when it comes to data, we haven't quite gotten there yet. It's all about perception versus reality."

Myth Two: Cloud Reliability

The second myth Jaquith points out also relates to the cloud. That myth suggests that the cloud is less reliable than on-premise solutions. Jaquith said despite the "fear, uncertainty and doubt" headlines that make their way into technology media, downtime of on-premise solutions continues to outpace the cloud.

"Cloud vendors commit to and generally meet a 99.9 percent uptime threshold as part of their SLA. But this level of service is not easily replicated by on-premise solutions," Jaquith said. "But outages do happen -- things do go wrong. And when they do, what's most important is transparency from the vendor -- in ongoing, truthful communication and in action when downtime occurs. This transparency is absolutely critical in building trust between customer and provider."

Myth Three: The BYOD Drain

"Bring your own device," otherwise known as BYOD, is a trend that consistently made headlines in 2012. One of the running themes is that BYOD is a major drain on IT resources. Jaquith disagrees.

"There's no doubt that BYOD is the hottest thing in IT -- and the revolution's got countless IT departments scrambling to establish corporate policies to keep pace," he said. "But contrary to popular belief -- and many panicky stories in the press -- BYOD management plans are much simpler and less resource-intensive than they're made out to be, if done right. This means applying holistic, yet sensible management and security policies that are grounded in the law and enforced through technology." (continued...)

1  2  Next Page >

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
DDoS PROTECTION POWERED BY VERISIGN: The increasing frequency, size and sophistication of DDoS attacks are rapidly changing the face of network security. DDoS Protection Services powered by Verisign provides a comprehensive cloud-based solution from the operator of some of the Internet's largest and most reliable infrastructure. Click here to take a closer look Verisign's DDoS solution.
MORE IN NETWORK SECURITY

Product Information and Resources for Technology You Can Use To Boost Your Business

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.