Protecting over 200 million PCs, Macs, & Mobiles – more than any other antivirus

Archive

Posts Tagged ‘enterprise security’
January 10th, 2013

Enterprise Security Trends for 2013

Security experts agree that enterprise security is growing more complex this year with the continued development and growth of big data, mobile useage, BYOD (bring-your-own-device), and cloud computing. The impact that malware had across the financial and business sectors in 2012 even have IT pros rethinking traditional models of security.

Jonathan Penn, Avast Software’s Direct of Strategy, looks at some of the security trends that will put pressure on IT professionals in 2013.

Mobile as an attack vector

As business use of smartphones and tablets increases, attackers will target your employees’ mobile devices; not to compromise the device itself, but to gain entry into your corporate IT environment for purposes of data theft.

Big Data = Big Target

Many “big data” analytic efforts are maturing, and with that they are starting to migrate to the cloud and are being opened up to use by 3rd party partners. All this means more opportunity for inappropriate access and compromise of treasure troves of data.

Growth in security outsourcing

Use of managed security services (MSS) is an ever-expanding trend, but is being further propelled by corporate BYOD challenges and by advances in security analytics that bolster the case for having MSSPs monitor your IT environment for signs of attack.

Shift in endpoint security perspectives

IT security professionals look at iPhone and iPads and wish that their corporate systems could be as trustworthy. While there are many reasons why you can’t draw an equivalence between Windows and iOS, we will start so see organizations try to bridge this gap by shifting to a more “default-deny” attitude. In 2013, we will see notable strides in enterprise use of application whitelisting, virtualization and sandboxing, and other techniques that either assume programs are malicious unless proven otherwise or simply isolate them as a just-in-case measure.

Categories: General Tags:
Comments off