Menu
Can lessons learnt in 2014 boost security levels in 2015?

Can lessons learnt in 2014 boost security levels in 2015?

For anyone responsible for securing company and customer data, 2014 was a year of lessons, learnings and luck if you dodged the bullets that were flying from external and internal attacks...

For anyone responsible for securing company and customer data, 2014 was a year of lessons, learnings and luck if you dodged the bullets that were flying from external and internal attacks, and technology vulnerabilities that were discovered.

According to Michelle Waugh, director of product marketing, Security, CA Technologies, “last year has set the stage for a very interesting 2015 and beyond.”

Reliving the predictions of 2014, last January, Waugh made seven predictions and after looking at activity over the year, claims success in predicting four, with three of the predictions showing some progress, indicating they are much longer-term and complex shifts or trends in the market.

Moving forward, for 2015, CA Technologies predicts the following five trends will emerge and have the greatest impact on security professionals dealing in identity this year.

1. Identity-aware organisations will adopt an “identity dial tone” or a single source of identity truth to simplify app development, deployment and adoption and spark new innovation.

The dial tone will apply to all apps, across all channels and be easily available using identity APIs.

2. Universal authentication comes to your pocket or bag in the form of your mobile phone or device.

The attention on authentication is increasing with every breach and executive order, and the mobile phone is in a position to be used as a universal authenticator.

It will play a role as organisations move toward “zero-touch authentication” for a frictionless and password-free experience.

3. Identity management shifts emphasis to identity access security as a result of the impacts of last year’s breaches. Protecting organisations against rogue or compromised insider identities will require new identity and access security that is intelligent, contextual and verifiable.

4. Mobility and the Internet of Things will drive lighter-weight, API-first architectures in order to more easily connect into the digital ecosystem.

These architectures will be better suited for the application economy and the large array of user types that need to access apps and data on-premise or in the cloud and across a range of device types.

5. Boards of directors and corporate executives increasingly will be held accountable for breaches that damage their corporate brand, as security shifts from an “IT problem” to an “executive problem.”

Boards and executives will become more engaged on security strategy and governance.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags CA Technologiessecurity

Featured

Slideshows

Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Reseller News ICT Industry Awards 2017 - Meet the winners...

Reseller News ICT Industry Awards 2017 - Meet the winners...

Reseller News honoured the industry’s finest on a standout evening for the New Zealand channel, recognising the achievements of established and emerging partners on a memorable night in Auckland.

Reseller News ICT Industry Awards 2017 - Meet the winners...
Show Comments