Gartner Predictions for 2018 and Beyond: Analyzing the Research Report

Gartner recently released its top predictions for IT organizations and users for 2018 and beyond. Several of the predictions are relevant to the area of security threat detection and prevention. Let’s delve into a few of these predictions – and add one of our own – and discuss how monitoring software such as the Teramind solution can impact these predictions.

Gartner Predictions for 2018 and Beyond: Analyzing the Research Report

Gartner: By 2021, 40% of IT staff will be versatilists, holding multiple roles, most of which will be business, rather than technology-related.

Gartner predicts that these versatilists will rise first in infrastructure and operations (I&O), as the need for I&O that can support on-demand infrastructure will emerge.

Two particular trends are driving changes to IT staff, especially where security is concerned:

  • The rise of the cloud, mobile applications, and IoT means that IT organizations are abandoning a control approach to security and, instead, focusing more on aligning with business needs (and speed) and addressing security within this new model.
  • There is a skill shortage of experienced security professionals.

These two trends will require organizations to look at ‘doing more with less’ by focusing on automation and technology.

Many security professionals note the presence of too many manual processes as detrimental to achieving security. Employing monitoring software can replace many of these manual processes that organizations now perform by listening for suspicious behavior and alerting IT to incidents such as privileged user misuse, large file downloads, and other behavior that may indicate an insider threat.

Gartner: By 2020, IoT technology will be in 95% of electronics for new product designs.

Every supplier must, at the very least, make plans to implement IoT technology into its products, for both consumer and business buyers.

Multiplying entry points into an organization will require increased vigilance across the organization. Again, this prediction touches directly on the issue of IT staffing. Increased vigilance will require augmenting staff with online monitoring and threat detection software.

Gartner: Through 2022, half of all security budgets for IoT will go to fault remediation, recalls and safety failures rather than protection.

Security budgets overall will likely see an increase, because the impact of data breaches is severe. But protection will very likely remain as important, if not more so, going forward. A proper focus on protection and prevention will be key in light of public outcry in the aftermath of large-scale breaches such as Equifax.

Government regulations could become a factor, as well, making a focus on protection more important.  In reaction to the Equifax incident, New York Gov. Andrew Cuomo premised new regulations on credit reporting agencies on the sort that banks and insurance companies are subjected to through the New York State Department of Financial Services, which has added compliance requirements for cyber security more robust than anywhere else in the country.

Monitoring software offers several ways to protect against security threats, particularly those coming from insiders. Rule-based risk analysis and anomaly detection will be key in the protection process.

Our Prediction: Organizations will increasingly turn to behavior monitoring to mitigate and protect against security threats coming from the inside.

A 2017 report on the state of cyber crime from CSO and IDG found that 58% of surveyed organizations monitor user behavior to catch insiders who may have malicious intent. The use of monitoring software is significant now and will continue to grow across industries as organizations look to protect information.

READ ALSO:
The Future of Work and Security: 5 Predictions for 2018
Insider Threats, 2018 Security Concerns, GDPR: An Interview with Troy Hunt
Cyber Security Predictions for 2018: The Top Experts Speak

Marianna Noll

Marianna Noll

Marianna Noll is a Maryland-based writer with an interest in the impact that technology has on organizations and users. She writes about software, user adoption and engagement with software, and IT security.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *