Virtualization Technology News and Information
Article
RSS
Iland 2016 Predictions: The Ostriches Emerge - IT Execs Stop Denying Vulnerability

Virtualization and Cloud executives share their predictions for 2016.  Read them in this 8th Annual VMblog.com series exclusive.

Contributed by Lilac Schoenbeck, VP, Product Management and Marketing at iland

The Ostriches Emerge: IT Execs Stop Denying Vulnerability

2015 brought a slew of high-profile breaches, attacks, and threats. From Ashley Madison to Anthem, Sony Pictures to CVS, a Jeep Cherokee to a little organization known as the U.S. Government - no one was safe.

And yet, IT leaders are in denial. According to one study, two-thirds of executives say their organizations experience significant attacks on a daily or weekly basis, but only 9% proactively run inward-directed attacks to test their systems. A different report found that half of IT security pros don't even view themselves as targets, although 61% lack confidence in their ability to detect advanced threats and just 38% believe that their IT security team is capable of identifying potential intrusions.

In 2016, we'll get our heads out of the sand.

Denial is no longer an option. Instead, organizations will commit to these three security strategies:

1.     Encryption. While not a silver bullet, encryption assumes that your networks will be breached and protects your data accordingly. It can add nearly 20 percent to an organization's ROI in security, and hide threats as well as protect data. Although well known, encryption hasn't been used to its potential. In 2016, we'll see companies using more innovative, powerful encryption strategies.

2.     Malware detection. The traditional approach to malware focused more on infection than detection, treating individual instances instead of proactively preventing attacks. New strategies will look at malware more holistically, implementing customized anti-malware architectures that prevent, detect, contain, eradicate, and recover from threats in a cohesive, effective way.

3.     Disaster recovery. Disaster recovery solutions have been around for some time. Adoption lagged, however, due to the ostrich effect (see above) and the perception and sometimes reality that disaster recovery planning was too complex, expensive, and resource-intensive. Today's disaster recovery-as-a-service (DRaaS) solutions change that. DRaaS allows organizations to keep up with today's threats and expectations, providing comprehensive protection while delivering faster recovery times with lower overhead. (Full disclosure: iland is a DRaaS provider.)

IT threats become more widespread and sophisticated each year. In 2016, IT execs will finally smell something phishy, and start dedicating the time, money, and manpower that data security and protection deserve.

##

About the Author

Lilac Schoenbeck is VP, Product Management and Marketing at iland. She has more than 15 years of experience with product marketing, strategy, business development, and software engineering in the grid, virtualization, and cloud domains. Prior to this role, she led cloud and automation marketing for BMC Software, and has worked for IBM, Fortisphere, Innosight, and the Globus Alliance. Lilac holds an MBA from MIT Sloan School of Management and a Computer Science degree from Pacific Lutheran University.
Published Thursday, November 19, 2015 6:32 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<November 2015>
SuMoTuWeThFrSa
25262728293031
1234567
891011121314
15161718192021
22232425262728
293012345