SHARE
Facebook X Pinterest WhatsApp

IBM: IT Organizations to Up Their Security Game in 2013

If 2012 is any indication of things to come, 2013 will be the year that IT organizations start implementing significantly more comprehensive approaches to managing security. According to Steve Robinson, vice president of worldwide development for strategy and product management within the newly formed IBM security systems division, roughly half the customers that IBM deals […]

Written By
MV
Mike Vizard
Dec 21, 2012

If 2012 is any indication of things to come, 2013 will be the year that IT organizations start implementing significantly more comprehensive approaches to managing security. According to Steve Robinson, vice president of worldwide development for strategy and product management within the newly formed IBM security systems division, roughly half the customers that IBM deals with have appointed a head of IT security in the last year.

Most of those appointments have been within the IT organization. But Robinson says a fair number of those people may also report into chief risk officers, the legal department and, in some rarer cases, the CEO. Their existence, says Robinson, is testimony to just how tough a year 2012 was in terms of securing the enterprise.

Rather than focusing all their efforts on perimeter security for 2013, IBM is predicting that we’ll see a number of strategic security initiatives, including:

  • Cloud security will go from “mystery and hype” to become a more routine activity. 
  • By the end of 2014, mobile devices will be more secure than laptops are today.
  • Compliance initiatives will be more tightly coupled to security.
  • The amount of data that will be collected to deal with advanced threats will increase.
  • Data scientists with security expertise will be in high demand.
  • Sharing of security data between government and the private sector will increase.
  • Aggressive mining of “social dark channels” to identify potential targets will increase.

Perhaps the most surprising of those predictions is the level of security that will be found on mobile computing devices. Unlike previous generations of client devices, security concerns relating to mobile computing, especially in the context of transactions, will result in these devices becoming more secure than the average PC within the next two years.

The degree to which organizations will pursue these various initiatives, says Robinson, will be governed by their tolerance for risk. IBM is betting that as security as a whole becomes more complex to manage, IT organizations will decide to rely more on managed services provided via the cloud by providers such as IBM, which is one reason IBM is investing heavily in security intelligence software.

Whatever the eventual outcome, it’s pretty clear that IT organizations will need to significantly up their security game in 2013, if for no other reason than that multiple types of purveyors of malware already have.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.