Just as cyber criminals are ramping up their attacks, IT security is becoming more sophisticated.
Attacks by cyber criminals are on the rise.
Fortunately, IT security vendors are equally active when it comes to developing new security measures. Here are five of the top security technologies that information technology research and advisory firm Gartner has identified for business in 2014:
1) Cloud access security brokers
Limited visibility into the security capabilities of external cloud providers has long been a concern, but it’s now possible to take back ownership of your cloud security by using a cloud access security broker (CASB). This software is placed between the cloud provider and consumer and boasts a range of enterprise security capabilities, such as authentication, encryption, malware detection, auditing and device management.
2) Adaptive access control
If the chief financial officer is holidaying in Spain and wants to check finances poolside at the hotel, an adaptive access control system can help. It will detect the user’s location and double-check their identity by asking for extra authentication information, such as a PIN. This context-sensitive approach to security allows users to access their data from any device and any location, while keeping it safe in case their primary password falls into the wrong hands.
3) Big data security analytics
As threats become more sophisticated, including under-the-radar attacks that often originate from inside the organisation, big data security analytics has become increasingly popular. By correlating data from a wide variety of sources over time, and modelling and analysing complex scenarios, big data can outperform traditional security information and event management (SIEM) systems by identifying threats earlier and with greater accuracy.
4) Software-defined security
As we continue to migrate from fixed, proprietary systems to open platforms and standard protocols, there is an increasing need for a ‘security everywhere’ approach, whereby security policies can be implemented at an abstract, business function level, rather than per server, storage device or network point. Software-defined security won’t completely dispense with the need for dedicated security hardware, but it does shift much of the core capability and intelligence into software.
5) Internet of Things (IoT) security
Network connectivity is finding its way into a huge range of devices – especially in asset-intensive sectors such as manufacturing, healthcare and public utilities. At the same time, proprietary networks are being dumped in favour of IP-based communications, dissolving the barriers between these devices and traditional computer networks, as well as the wider internet. The result is that IoT-specialised enterprise-class security – in the form of gateways, brokers and firewalls – is needed to protect and secure the billions of IoT network access points.
From ransomware to mobile malware and the Heartbleed bug, there is no shortage of threats to keep data security experts busy throughout 2014.
To protect their assets, companies must cultivate a risk-aware culture that treats security as a core priority. Find out more about the current risk landscape and what you can do to protect your organisation in our essential guide to cybersecurity.