/// Industry Trends

Evolving patterns in consuming and managing digital content sources. Protect the data itself, share it safely with anyone.

DATA PROTECTION EVOLUTION

With the exponential growth of wireless connectivity and smart device access to public and private digital content sources, information security, corporate privacy and data encryption have recently moved up the corporate agenda. Information protection is consistently among the top 10 recent IT industry trends. Bluezone is the first in the world to offer a complete spectrum of products to protect your sensitive data by isolating it before it enters your IT network, covering a range of information access channels. Our engineering and support teams are committed to stay on top of the current technology trends, including cloud computing, smart device integration, financial transaction processing, information privacy and data security techniques.

CLOUD COMPUTING

CLOUD PHENOMENON

According to a 2012 Gartner research on cloud computing, the cloud is a technology discontinuity that, within the next 10 years, is likely to dramatically change IT organizational missions, structures, roles, skills and operations. One major benefit that cloud brings to organizations is capability on demand, with better and faster technology service delivery to reduce time-to-business.

Recent IDC cloud research shows that worldwide revenue from public IT cloud services exceeded $21.5 billion in 2010 and will reach $72.9 billion in 2015, representing a compound annual growth rate of 27.6%. This rapid growth rate is over four times the projected growth for the worldwide IT market as a whole (6.7%), with cloud phenomenon being a core ingredient of a large transformation of IT industry.

CLOUD DATA PROTECTION

According to a 2015 Forrester report on cloud data protection, many Software as a Service (SaaS) and Infrastructure as a Service (IaaS) providers offer built-in data encryption capabilities. However, the clients report that to be absolutely sure they can avoid a data breach, they need to have a third-party cloud data protection vendor with its own solution that offers key management, encryption and data governance.

While security and privacy concerns remain the biggest inhibitor to cloud adoption, the clients are driven by cost-efficiency and operational convenience of the cloud services yet legally mandated to protect data they collect, process and store.

Anyone embarking on a cloud implementation or integration in the near future is advised to consider:

  • Multi-cloud provider support capability
  • Dedicated security cloud service providers
  • More integrated behavioral event intelligence
  • Integration with enterprise rights management
  • Integration with identity and access management

CLOUD SECURITY

The results of a 2016 CSA cloud security survey indicate that 65% of respondents were confident that cloud had equal or greater security than internal IT systems. However, integrating and aligning security programs across a cloud provider and an enterprise is a challenge.

It is critical to understand that enterprises, particularly those from highly regulated industries, own the accountability for their security posture regardless of who actually manages it. Enterprises want a holistic view of this security posture to see cloud as an extension of their on-premise IT footprint. Enterprises