Beruflich Dokumente
Kultur Dokumente
IT Challenges
Q: What are the biggest IT challenges you face in 2013? Please choose up to
three.
Base: All organizations
Increasing cost efficiency of IT
51%
46%
30%
Maintaining security
28%
26%
25%
23%
Change management
20%
12%
12%
8%
7%
3%
Click here
Trojans/worms
Botnets (users)
Leakage
DDoS
Hackers/crackers
Social engineering
Adv. persistent threat
Physical damage
150k
86k
Blame mobility
1200
39%
1000
800
47%
600
400
52%
-4%
200
88%
-4%
-11%
-8%
0
2011
Smartphones
2012
Tablets
Portable PCs
2013
Desktop PCs
~2.5b industrial/auto
~3.7b embedded devices
~5.0b accessories
~2.0b toys/appliances
~4.3b mobile devices
~4.0b networking devices
~4.5b computers
~24b devices!!
WW CAGR:
20-30%
WW smartphones: 1 in 6
Re-aggregated:
Hyperscale
datacenter
Resource level
Greenfield
Homogenous
Density optimized
Capex optimized
Singular app
portfolio
Enterprise
datacenter
System level
Legacy
heterogeneous
Bladed/Converged
OPEX Optimized
Complex App
Portfolio
IDC 2013
Virtualize
~10%
System
Management
System
Management
I/O
convergence
I/O
convergence
Virtualizati
on Layer
Virtualizati
on Layer
Virtualizati
on Layer
Shared
Storage
Shared
Storage
Shared
Storage
Shared
Storage
Rack and
blades
Rack and
blades
Rack and
blades
Rack and
blades
~25%
EU
organizations
Bring Resources
to Datacenter
Reduce
physical
servers
Storage, server,
network aware
of each other
Build or Rent
Application Specific
Systems
Certified
configurations
~15%
~50%
Speed up
deployment
10
Latency issues
00
05
10
15
20
25
30
35
40
45
50
% of respondents; N = 401
Source: IDC, 2014
11
Private Cloud
(on premise)
Public cloud
(IaaS)
Public cloud
(PaaS)
Public cloud
(SaaS)
Physical security
user
user
provider
provider
provider
Security services
user
user
user
user or
provider
provider
Data protection
user
user
user
user
provider
Application
protection
user
user
user
user or
provider
provider
Supply chain
protection
user
user
provider
provider
provider
Staff training/
surveillance
user
user
???
???
???
11%
57%
14%
Security &
Vulnerability Mgmt
Identity & Access
Mgmt.
Other modules
12%
50%
11%
9%
Home
Banking
Central Government
Telecommunications
Other verticals
16
INTERNAL
THREATS
DRIVE THE
NEED FOR
DLP
Deploy messaging
security to monitor and
prevent sending of
sensitive files/data
Use IAM to link user
credentials, identities,
roles with data
access/usage rights
Protect endpoints with
file and disk encryption
Prevent the accidental educate end-users on
policies and best
practices
17
YOU MAY BE
BUT DONT BE THE
NEXT NEWS STORY !
18
900
800
Identity and Access
Management
700
Messaging Security
600
Endpoint Security
500
Security and Vulnerability
Management
400
Web Security
300
Network Security
200
100
0
2010
2011
2012
2013*
* Forecast
19
Thank you!
Ivan Juras
Research Analyst
Marketing & PR Specialist
IDC Adriatics (Croatia)
ijuras@idc.com
+385 1 30 40 054
21
22
38
Firewall
35
37
22
15
14
12
Adoption of multi-function
appliances and gradual
displacement of single-function
appliances
2013
23
Security MaturityScape
Malicious apps
0
Total (n = 200)
%
10 20 30 40 50 60 70 80
IT controlled (n = 75)
BYOD (n = 125)
26