We at StillSecure believe that 2013 will finally be the year that organizations demand security be included cloud offerings — en masse.  We also think the recent shift to cloud-usage based models will continue so much so that enterprise class product suites will fall out of favor. This is a direct result of customer demand for automation – and not just any automation, but automation without significant security touch points.

Don’t believe us? Take a look at the recent Gartner research that was recently discussed in a recent article in PCR.  Titled “Why you should assess your cloud computing practices,” the article all but proves our claim above by stating “considerations such as encryption have led research firm Gartner to identify the challenge of data security, resiliency and compliance in the cloud, and predict that, by 2016, 25 percent of enterprises will secure access to cloud-based services and vendor platforms through a unified solution to broker security in the cloud and enforce security policies, a step that is also advisable to all retailers.”

Our team at StillSecure is also seeing another big push – compliance in the cloud is continuing to be a huge focus for our partners and customers, especially for those in the financial services and healthcare industries, which are looking to ensure that HIPAA HITECH and PCI DSS compliance obligations are covered.

Furthermore, we think that there will be a greater emphasis within financial institutions to offer security solutions that address bring your own device (BYOD) issues, as well as enable better technology that can detect rogue devices and guest access. We’re already noticing this on the government side for sure. For example, the Department of Defense (DoD) has set the bar high for security and continues to innovate on an aggressive level. We are proud to be working with them as a valued partner on most of the NAC needs.

Lastly, and somewhat unrelatedly, we see Twitter growing as a true medium for influencers and engineers in the security industry.  We typically shy away from such mediums (knowing the risks involved) but the fact of the matter is that analysts, reporters and bloggers are covering breaches and hacker movement in real-time and we are relying on the reporting of trends, story links and predictions more and more. Here is our first list of top reporters, bloggers, and analysts we think every security engineer should follow (#FivetoFollowin2013):

Be sure to also follow @StillSecure. We’re looking forward to a safe and secure 2013!

Tags: ,