Top Security Priorities for CIOs in 2014

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Top Security Priorities for CIOs in 2014-5 Next

On-premise email solutions

Cloud-based email was originally billed as a panacea for overworked (and often over budget) IT staff -- an innovative new model that would relieve them from the burden of purchasing their own hardware, maintaining their own systems, and managing their own data. But the price for this hype has all too often been paid at the compliance table, according to Kari Woolf, senior global product marketing manager at Novell, Inc. She said:

The cloud may be suitable for many organizations, but others -- particularly those with strict compliance requirements or data protection directives -- find that on-premise email solutions are the only way to keep sensitive data strictly within their control. While cloud-based email will continue to become more mature and secure over time, many of these organizations (and perhaps some specialized industries at large) will buck the trend.

Woolf said CIOs will turn to on-premise email solutions that offer the low administrative burden promised by the cloud, but more importantly, the on-premise solution will offer the equally critical ability to maintain control of data -- and prove it in audit. As the regulatory vice tightens in industries like health care and financial services, she expects on-premise email solutions that offer a simple, cloud-like user experience and all the benefits of IT control, along with capabilities like archiving, digital signatures and encryption, support for new authentication methods, and stronger security for data synchronized to mobile devices, to gain new footholds.

The security experts have made their predictions for 2014. Now it is time for CIOs to make some tough decisions and establish security priorities for the coming year. Certainly many of those predictions will come into play. The predictions aren’t made in a vacuum; CIOs would be foolish not to consider the situations in which experts expect serious threats and risks.

Bring Your Own Device (BYOD) will continue to be a primary concern for CIOs in 2014. However, CIOs will have to pay attention to a few twists to the BYOD movement, like BYOI, or Bring Your Own Identity. Unfortunately, as Jake O’Donnell pointed out in a SearchConsumerization piece, the budget doesn’t necessarily meet the needs for mobile security, and that’s a problem that CIOs will have to work around.

CIOs will also turn more attention to the cloud, not just to determine how to make data in the cloud more secure but to  see how the cloud plays a role in covering network security, as Philip Lieberman, CEO & Founder, Lieberman Software, stated, adding:

CIOs will have to reevaluate proposed security as a service being delivered via the cloud considering that hardware and software will no longer need to be purchased for deployment.

These issues are just the tip of the security iceberg. Overall, the primary challenge for CIOs will be to make sure everyone within the company is on board when it comes to security policy. It appears that 2014 will see a real shift in security concerns and in the way security will work. Education for everyone from the CEO down to every employee who has access to the corporate network will be a must.

Here are the top priorities that CIOs will be (or should be) focusing on in 2014.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.