
According to CA Technologies, enterprises will increasingly adopt the concept of “big data” and technologies such as cloud services in 2013. Also, several technologies will be phased out during this year.
CA Technologies has identified the following as the top five trends which will dominate the IT sector in 2013:
Big data projects will show demonstrable RoI: 2013 will mark the emergence of big data administrators, who will play a critical role in using new technologies to explore the different uses of big data and its business applications. In 2013, big data-led projects will begin to show a demonstrable return on investment. The concept of big data will mature and the infrastructure which integrates data from social media and open data sources will significantly increase the demand for network management and security.
Increased adoption of cloud by enterprises: Enterprises will increasingly adopt public cloud services in order to effectively tap the various products and services offered by service providers. In addition, as service providers’ franchise their business models and technologies, cloud services will see increased adoption outside the United States. Moreover, the mainframe will move more rapidly to the cloud as companies that already have a mainframe will adopt cloud technologies and processes to maximise benefits from their operations. The adoption of externally hosted private cloud will also increase in the next couple of years.
Traditional IT parameters will cease to exist: As enterprises adopt cloud services and collaborate globally with customers and partners from multiple devices, the traditional IT parameters will cease to exist. Strongly authenticated identity will emerge as the new IT perimeter. This places emphasis on reducing risk at the authentication point, thereby diluting the importance of passwords. 2013 will see the expansion of advanced authentication models. The industry will see more risk-based authentication coming into play based on the device, transaction and location. The industry will move towards more intelligent methods of authentication like pattern creation, image recognition, mobile phone-based authentication, audio and biometrics. There will be more content-driven security based on what the data is, or how it’s classified. Further, this information, coupled with user identity and role, will be used to provide access rights.
Sensing Technologies to dominate: With the concept of the Internet of things becoming popular, sensing technologies available in the majority of mobile devices will dominate. We will move towards an intelligent environment with sensors embedded into a wide range of devices. These technologies will drive additional demand for IT to manage, store, analyse and secure data traffic, privacy and end points.