DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Data Engineering
  3. Big Data
  4. Top Five Trends to Transform Enterprise Security in 2017

Top Five Trends to Transform Enterprise Security in 2017

More data translates to more security vulnerabilities.

Tom Smith user avatar by
Tom Smith
CORE ·
Jan. 19, 17 · Opinion
Like (4)
Save
Tweet
Share
3.04K Views

Join the DZone community and get the full member experience.

Join For Free

Axiomatics released its top enterprise security trends from industry executives on the challenges enterprises can expect to see in 2017.

Based on expert commentary from security leaders at Axiomatics, the trends identify five key areas that range from regulation and compliance to the increasing importance of securing the Internet of Things, so data is not accessible to the wrong people.

“This year’s trends examine the evolving ways organizations can realize better enterprise-wide security with the exploding amounts of data that enterprises need to protect,” said Marty Leamy, president of the Americas at Axiomatics. “Business executives are demanding better enterprise-wide security for all of their data, not only for regulatory compliance but also to protect their most critical assets.”

Key enterprise security trends for 2017 include:

Digital Transformation 

  • Digital transformation is a key priority for enterprises, but most IT decision makers have not completed technology deployments to address the initiatives that are critical to digital business.
  • Digital transformation is about improving the customer experience by modernizing tools and processes within an organization. One major digital transformation initiative is moving infrastructure to the cloud.
  • Identity and access management technology, like dynamic authorization, is a key enabler of digital transformation, it allows secure cloud experiences. It helps companies deliver more personal, convenient and trusted mobile experiences to customers, employee and partners, while enabling secure access to apps and data in the cloud.

The Internet of Things (IoT) 

  • IoT is about interconnectivity. There is an increasing number of interconnected electronic devices producing massive amounts of data. For example, there are consumer appliances, wearables, vehicles, buildings and other physical devices that now have networking capabilities.
  • The benefits seem endless, but the security of the communication between devices could reveal new attack vectors to compromise the networked managed home or connected vehicle.
  • The key to securing IoT is putting controls in place to ensure that IoT data is not accessible to the wrong parties.

Microservices and APIs 

  • Microservices are the latest approach to breaking down large applications. With a microservices architecture, the functions of an application are built as discrete components that communicate with each other via APIs. This approach lends itself to a faster, almost continuous development and deployment cycle.
  • From a security perspective, building many microservices components could mean that you also need to enhance your strategy for securing access to the individual components. An API gateway combined with an Attribute Based Access Control (ABAC) approach can be very beneficial.

Wider Adoption of Hadoop 

  • More and more organizations will be adopting Hadoop and other big data stores, in turn, organizations will have a need to secure the massive amounts of data stored in Hadoop and other big data stores.
  • Organizations will want to enforce access to big data stores with a contextual, policy-based approach, to safeguard sensitive data stored in Hadoop and other big data stores.

Regulation and Compliance 

  • Regulatory compliance has always been a challenge within the security industry – and especially working across borders and complying with different regulations in various countries and regions. In addition, the changing of the guard in the United States could impose new types of regulatory challenges.
  • Attribute Based Access Control can help meet and manage the moving target of compliance. A policy-based approach provides centralization of management, ease of change, and enforcement across the enterprise.

“Vast amounts of data are generated every second yet organizations across all industries are struggling with securing that data,” said Leamy. “We believe that identity access management technologies and shifting to Attribute Based Access Control can effectively ensure enterprise-wide security and privacy.”


security Big data trends IoT

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Kubernetes vs Docker: Differences Explained
  • Top 10 Secure Coding Practices Every Developer Should Know
  • A Brief Overview of the Spring Cloud Framework
  • Understanding gRPC Concepts, Use Cases, and Best Practices

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: