Virtualization Technology News and Information
Article
RSS
Adallom 2015 Predictions: If you love end users, let them go


 

Virtualization and Cloud executives share their predictions for 2015.  Read them in this VMblog.com series exclusive.

Contributed article by Tal Klein, vice president of strategy at Adallom

It's 2015: If you love end users, let them go

One of the biggest trends impacting the security posture of "the enterprise" is the migration away from "Bring Your Own Device" and toward the "Internet of Things" - whether discussing wearables or Internet connected devices, information security professionals can't ignore the momentum of data being collected by and interacted with devices which are not what IT might call a "device" in the spirit of any defined BYOD policy. When most people think about the notion of BYOD in the context of IT, it's usually about laptops, tablets, and phones. Yet only few BYOD policies account for IoT devices like the Apple Watch, Google Glass, Samsung Gear, Nest, or even a Fitbit - that is because those are not things that IT thinks of as part of the enterprise ecosystem.

"User Enablement" is so 2014. In 2015, IT will be in a unique position to provide a competitive edge by taking cues from employees. In the context of IoT, the first thing I think we'll see is the end of "cloudphobia" and an acceptance that everything is going to be connected, data will be in the cloud, and thus a moving of the goal posts of IT - if accepting BYOD shifted things from control to enablement, then the next evolution must be from enablement to improvement. By the way, this also means the death of MDM as we know it (thank goodness).

There are already signs that data creation and consumption are organizing work at a faster rate than the Moore's Law framework. In many ways IT is in a race where radical changes in the fundamental structure of competition can occur during the actual race, rather than before or after. In the context of security, I believe IT will begin to view policy compliance as competitive crutch, not as an authoritarian truncheon. If there are a bunch of checkboxes that are hindering innovation, in 2015 IT will shift from "keeping up by ticking the boxes" to "being creative by thinking outside the checkboxes". The result will be that IT and security professionals who work collaboratively with the business to understand and anticipate (satisfy is not good enough) the needs of the users will provide their companies with palatable productivity gains and competitive differentiation.

My last prediction is on the future of PaaS. I don't think anyone can dispute that SaaS has become pretty standard fare in the business world. Like its legacy software predecessors, SaaS comes in many varieties. However, moving application and storage workloads to the cloud has removed many of the dependency and conflict issues which have long plagued IT. In other words, we have solved a lot of problems with SaaS.  Now with apps so important for business, I see the need for the next evolution of SaaS to a more PaaS like environment that fosters ecosystems built on the core functionality of the service. Naturally, as IaaS players like Amazon and Microsoft have also made the move to PaaS, and with the rapid growth of pure PaaS like Pivotal CF, the PaaS label describes a cornucopia of differing platforms - some focused on quickly bringing apps to market, some on automation and data analytics, and some tailored to have all the tools necessary to reliably build, test, deploy, and manage new applications. Each flavor has its benefits and use cases, but I believe that in 2015 most "SaaS" offerings will be built on an existing SaaS platform (like Salesforce1 or Box) rather than net new platforms all together, because the standardization on SaaS platforms is creating data lock-in.

##

About the Author

Tal Klein is vice president of strategy at Adallom. Previously, Tal was senior director of products at Bromium where he led product marketing and strategy from stealth mode to a multi-million dollar business, disrupting the enterprise information security landscape. Prior to Bromium, Tal managed integrated product strategy at Citrix, where he developed cross-platform technologies. Tal has also spent over a decade in the webhosting industry developing managed infrastructure services.
Published Tuesday, December 02, 2014 6:30 AM by David Marshall
Comments
@VMblog - (Author's Link) - February 10, 2015 6:59 AM

Once again, how great is it to be a part of the virtualization and cloud industries? 2014 was another banner year, and we witnessed a number of fantastic technologies take shape and skyrocket. And I, along with many industry experts and executives, media

To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<December 2014>
SuMoTuWeThFrSa
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910