Given new capabilities at IBM Storage, we can expect more breakout products like the new FlashSystem 9100 that include, like this hardware does, powerful new performance surprises unique to IBM.
With apps now supported by continuous integration/continuous deployment (CI/CD), the number of logs under management not only scales dramatically, but they must be parsed and analyzed in real time.
DevOps requires a new approach to security that calls for a renewed commitment by all team members to place protection of data and apps as a core element to their contributions to the overall project.
The most significant change that DevOps brings to the security equation is where and how it is implemented in the development/operations workflow. In a shift-left approach, security is implemented as a core requirement early in the process.