With 2012 coming to a close, security
analysts are beginning to offer predictions for the New Year. From cloud
computing to BYOD, analysts are betting on what 2013 holds in store for IT departments.
Former Forrester analyst Andrew Jaquith, who is now CTO at Perimeter E-Security, talked to us about five myths he believes will be debunked in 2013. Four out of those five myths revolve around the cloud.
Myth One: Cloud Security
First of all, Jaquith points to the myth that security issues will remain the biggest obstacle to cloud adoption. It seems this drum has been beaten to death since the first mention of cloud computing. Jaquith is betting this myth will show itself to be false in 2013. In fact, he says it's simply not true.
"What remains the biggest obstacle to cloud adoption is the 'idea' that the cloud is not as secure as on-premise systems. In reality, the cloud has proven equally to more secure," he said. "It's analogous to keeping your money safely in a bank versus keeping it home under your mattress. Everyone knows a bank is a better, safer option. But when it comes to data, we haven't quite gotten there yet. It's all about perception versus reality."
Myth Two: Cloud Reliability
The second myth Jaquith points out also relates to the cloud. That myth suggests that the cloud is less reliable than on-premise solutions. Jaquith said despite the "fear, uncertainty and doubt" headlines that make their way into technology media, downtime of on-premise solutions continues to outpace the cloud.
"Cloud vendors commit to and generally meet a 99.9 percent uptime threshold as part of their SLA. But this level of service is not easily replicated by on-premise solutions," Jaquith said. "But outages do happen -- things do go wrong. And when they do, what's most important is transparency from the vendor -- in ongoing, truthful communication and in action when downtime occurs. This transparency is absolutely critical in building trust between customer and provider."
Myth Three: The BYOD Drain
"Bring your own device," otherwise known as BYOD, is a trend that consistently made headlines in 2012. One of the running themes is that BYOD is a major drain on IT resources. Jaquith disagrees.
"There's no doubt that BYOD is the hottest thing in IT -- and the revolution's got countless IT departments scrambling to establish corporate policies to keep pace," he said. "But contrary to popular belief -- and many panicky stories in the press -- BYOD management plans are much simpler and less resource-intensive than they're made out to be, if done right. This means applying holistic, yet sensible management and security policies that are grounded in the law and enforced through technology." (continued...)