Scoop has an Ethical Paywall
Work smarter with a Pro licence Learn More

Video | Agriculture | Confidence | Economy | Energy | Employment | Finance | Media | Property | RBNZ | Science | SOEs | Tax | Technology | Telecoms | Tourism | Transport | Search

 

Symantec Reveals Top Security and Storage Predictions

News Release

Symantec Reveals Top Security and Storage Predictions for 2011

Cloud, Virtualisation, Mobile Security and Social Media Predicted To Take Centre Stage in the New Year

Symantec Corp. (Nasdaq: SYMC) today announced its security and storage predictions for 2011 based on what its security and storage experts are observing in the information protection landscape. Today’s organisations are overloaded with information as data grows exponentially. Almost daily, a new technology is either announced or brought to market with the promise of making the cost of doing business lower, more convenient and more timely.

“Given today’s stagnant and declining IT budgets, it’s imperative that organisations achieve more value from their IT spending,” said Steve Morton, vice president, enterprise product marketing, Symantec. “By understanding challenges, risks and threats, organisations can plan and implement strategic technology initiatives such as virtualisation, mobile security, encryption, backup and recovery, archiving and cloud computing to protect and manage their information more efficiently.”

New Technologies, New Challenges
As technologies become smarter and faster, the threats to these technological assets follow suit. For example, the exponential consumer adoption of smart mobile devices will increasingly result in these devices making their way into enterprises through the back door, blurring the lines between business and personal use, and driving new IT security models to market in 2011.

Advertisement - scroll to continue reading

Are you getting our free newsletter?

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.

Analyst firm IDC estimates that by year’s end new mobile device shipments will have increased by 55 percent, and Gartner projects that in the same timeframe, 1.2 billion people will be using mobile phones capable of rich web connectivity. Although cyber criminals have shown little interest in mobile devices in the past, as devices grow more sophisticated and as a handful of mobile platforms corner the market, it is inevitable that attackers will target mobile devices in 2011 and that mobile devices will continue to grow as a source of confidential data loss.

Gap in Virtual Machine Protection
A similar challenge exists with the widespread adoption of virtualisation. Although many companies believe the information and applications within their virtual infrastructure are protected, many IT administrators will face the harsh reality that they are not in 2011. The rapid adoption, fragmented implementation and lack of standardisation of virtual infrastructures will continue to expose gaps in the security, backup and high availability of virtual environments. Although virtualisation decreases server costs, organisations are realising that virtualisation is simultaneously increasing management and storage costs, and without a plan to protect these environments, they may not realise the full return on investment.

Taking Control of Information
The exponential level of data growth is impeding organisations’ ability to effectively manage and recover data. In 2011, storage administrators must regain control of information, lose their “pack-rat” mentality and categorise what information is most important for retention purposes. Otherwise, storage costs will continue to skyrocket, and organisations will face extensive recovery times and be unable to comply with regulatory compliance standards, including privacy laws and e-Discovery.

Adding to the complexity is the use of social media to improve communication and productivity throughout an organisation. Although social media will continue to change the way we collaborate in 2011, IT organisations will also need to understand how to protect and manage these non-standard applications for recovery and discovery of business information that is communicated in these channels. Social media archiving will grow in importance as companies unleash the power of social business but maintain archiving as a form of control to reduce information risk.

Additionally, as data goes “mobile” and becomes less centralised, regulators will start cracking down in 2011, which will drive organisations to increasingly implement encryption technologies, particularly for mobile devices.

The Next Generation Data Centre of 2011
As organisations continue to manage with limited resources in 2011 while facing more intelligent and specific threats, IT will take a more strategic and innovative approach to solving problems. While software will continue to drive innovation, 2011 will bring new delivery models in response to customers’ need to ease IT operations. Cloud computing, hosted services and appliances are examples of increasingly attractive delivery models that will change the landscape of today’s data centre by providing organisations with flexibility and ease of deployment.

Organisations will leverage public and private clouds as they become highly available in the coming year. Tools will also emerge to manage this new, complex storage environment and to help IT administrators better understand and capture information about unstructured data that resides within it. This will allow IT to fully utilise the benefits of the cloud and intelligently report to management. While customers opt to take advantage of cloud messaging services, they are still finding that they can drive greater cost out of the discovery process by keeping their archives in-house. This hybrid cloud archiving model allows organisations to use hosted messaging services while keeping their archives on-premise. This way they can combine email with other on-premise content sources like PSTs, IM and SharePoint that are relevant to the discovery process.

Multimedia
Video: 2011 Trend Predictions from Symantec
Podcast: Internet Security Predictions

Resources
Blog Post: Internet Security Predictions for 2011: The Shape of Things to Come
SlideShare Presentation: Internet Security Predictions for 2011
Survey: Symantec Internet Security Predictions for 2011
2010 Critical Infrastructure Protection Study
2010 Disaster Recovery Study
2010 Information Management Survey
2010 Ponemon Encryption Trends
2010 State of Enterprise Security Report
2010 State of the Data Center Report
Internet Security Threat Report (ISTR), Volume XV
Trojan.Hydraq Overview
Mocana’s Mobile & Smart Device Security Survey 2010: Concern Grows as Vulnerable Devices Proliferate, Smartphones are the Tip of the Iceberg (PDF)
Stuxnet Dossier (PDF)

Related
Symantec Data Protection Solutions
Symantec Disaster Recovery Solutions
Symantec High Availability Solutions
Symantec Secure Information
Symantec Security Management
Symantec Storage Management
Symantec Virtualisation Management Solutions
Symantec Web Security

Connect with Symantec
Follow Symantec on Twitter
Join Symantec on Facebook
Read Industry Trend Resources on Delicious
Visit Symantec Connect Business Community

Click to Tweet: Symantec predictions for 2011: Cloud, virtualisation, mobile security and social media to take center stage http://bit.ly/ibGkcr

About Symantec
Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organisations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

ENDS

© Scoop Media

Advertisement - scroll to continue reading
 
 
 
Business Headlines | Sci-Tech Headlines

 
 
 
 
 
 
 
 
 
 
 
 
 

Join Our Free Newsletter

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.