Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Network Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Five IT Myths To Be Debunked in 2013
Five IT Myths To Be Debunked in 2013

By Jennifer LeClaire
December 14, 2012 11:07AM

    Bookmark and Share
"It is cloud vendors -- not IT departments -- who are responsible for making the path to the cloud simple, safe and secure," said analyst Andrew Jaquith. "2013 is the year to start demanding more from your potential cloud providers, especially when it comes to convincing your executive team and board that it's time to make the move."
 


With 2012 coming to a close, security analysts are beginning to offer predictions for the New Year. From cloud computing to BYOD, analysts are betting on what 2013 holds in store for IT departments.

Former Forrester analyst Andrew Jaquith, who is now CTO at Perimeter E-Security, talked to us about five myths he believes will be debunked in 2013. Four out of those five myths revolve around the cloud.

Myth One: Cloud Security

First of all, Jaquith points to the myth that security issues will remain the biggest obstacle to cloud adoption. It seems this drum has been beaten to death since the first mention of cloud computing. Jaquith is betting this myth will show itself to be false in 2013. In fact, he says it's simply not true.

"What remains the biggest obstacle to cloud adoption is the 'idea' that the cloud is not as secure as on-premise systems. In reality, the cloud has proven equally to more secure," he said. "It's analogous to keeping your money safely in a bank versus keeping it home under your mattress. Everyone knows a bank is a better, safer option. But when it comes to data, we haven't quite gotten there yet. It's all about perception versus reality."

Myth Two: Cloud Reliability

The second myth Jaquith points out also relates to the cloud. That myth suggests that the cloud is less reliable than on-premise solutions. Jaquith said despite the "fear, uncertainty and doubt" headlines that make their way into technology media, downtime of on-premise solutions continues to outpace the cloud.

"Cloud vendors commit to and generally meet a 99.9 percent uptime threshold as part of their SLA. But this level of service is not easily replicated by on-premise solutions," Jaquith said. "But outages do happen -- things do go wrong. And when they do, what's most important is transparency from the vendor -- in ongoing, truthful communication and in action when downtime occurs. This transparency is absolutely critical in building trust between customer and provider."

Myth Three: The BYOD Drain

"Bring your own device," otherwise known as BYOD, is a trend that consistently made headlines in 2012. One of the running themes is that BYOD is a major drain on IT resources. Jaquith disagrees.

"There's no doubt that BYOD is the hottest thing in IT -- and the revolution's got countless IT departments scrambling to establish corporate policies to keep pace," he said. "But contrary to popular belief -- and many panicky stories in the press -- BYOD management plans are much simpler and less resource-intensive than they're made out to be, if done right. This means applying holistic, yet sensible management and security policies that are grounded in the law and enforced through technology." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Network Security
1.   Fund Seeks To Head Off Heartbleeds
2.   Lessons from Verizon's Threat Report
3.   Verizon Report Exposes Cyberthreats
4.   How Are Web Sites Post-Heartbleed?
5.   White House Updating Privacy Policy


advertisement
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.