Welcome!

DevOps Journal Authors: Pat Romanski, Noel Wurst, Elizabeth White, Denise Dubie, Lori MacVittie

Related Topics: Cloud Expo, SOA & WOA, Virtualization, Web 2.0, Big Data Journal, SDN Journal

Cloud Expo: Article

2014 Cloud Predictions: Enterprise IT Makes a Comeback

Enterprise IT organizations move to role of strategic partner

Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partner to the business unit. It will be the year that the CIO carves out a new role of strategic importance, namely the enabler of cloud apps that drive agility, productivity and competitive advantage for their business units.  In 2014, CIOs and IT departments will use rapidly emerging cloud security solutions to accelerate the adoption of SMAC (social, mobile, analytics and cloud) within the enterprise and will embark on security transformation.

1. Rush to adopt cloud services will drown out security fears
Cloud security risks will never be completely eliminated, obviously, but security won't be a cloud adoption obstacle in 2014. Cloud security is already on par, if not better than, traditional digital security, and 2014 will mark the cloud security tipping point, the beginning of real security transformation.

The major tech giants (Microsoft, Apple, Facebook, Google, Amazon, etc.) have all placed major bets on the cloud, and the rest of the economy, regardless of industry, will follow their lead. In fact, a recent study found that cloud adoption is already high in industries as varied as manufacturing, health care, media and financial services - and that's just reported adoption.Shadow IT would push those numbers higher.

2. IT stops blocking cloud services over outdated risks
There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky.

This approach is pointless at best, since it's so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.

In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them.

3. IT gains more organizational power due to the rise of SMAC
Not that long ago, the IT world fretted about whether or not IT was becoming irrelevant in this service-driven world. Now, with social, mobile, analytics, and cloud trends all converging in chaotic ways and the number of service providers increasing at dizzying rates, IT will start to get over their self-image as operators and providers of all IT infrastructure, applications, devices, and services and will start to see themselves more as the strategic enabler of services

According to Computerworld, the hottest IT job right now is IT business analyst. Not long ago, only the CIO worried about aligning technology with business goals. In 2014, it will be the entire IT department.

4. Revenge of the CIO - CIOs will transition from CI-No's to business enablers
As IT departments become more strategic, the CIO's role will change drastically too. CIOs are tired of being "CI-No's." It's not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages.

CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience.

5. CIOs who aren't comfortable with SMAC will be challenged
By the end of 2014, CIOs who don't understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who "just say no" and fail to adapt will face criticism from everyone from board members who can't live without access to corporate data on their personal tablets to developers who demand access to services like AWS.

Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-to-adapt organizations.

6. Unencrypted data will start to disappear
Ask any digital security professional for tips on how to better secure anything from the cloud to mobile end points to social media, and every single one will mention encryption at some point. In 2014, data will be encrypted everywhere - in motion, at rest, on corporate-owned smartphones, on employee-owned mobile device, etc.

As more applications and services reside in the cloud, the focus on how best to encrypt data will shift away from endpoints to cloud services and networks. The weak link in data encryption is the endpoint, but in 2014 that weak link will start to be eliminated, with important data never stored on end devices.

In 2014, enterprises will also demand encryption services that encrypt data no matter where it resides. Soon, there will be no such thing as unencrypted data.

7. Cloud adoption will force the enterprise to regain control of encryption keys
As unencrypted data disappears, so too will encryption keys that the enterprise does not own or control. New key escrow mechanisms will emerge allowing cloud service providers to have access to the customer data in the clear, but only for controlled, narrow windows of time. There will also be massive interest in encryption algorithms that allow enterprise ownership of encryption keys and do not break cloud service provider functionality.

8. VPNs and agents begin to disappear
Mobile devices access more enterprise services each and every day, and the way most enterprises protect data as it travels from applications to mobile devices is through a VPN. However, even simple to use VPN clients have their issues, such as reduced battery life and misconfigurations and connectivity issues.

As everything from tire pressure gauges to soil sensors to fitness monitors connects to the Internet, new ways to encrypt wireless data traffic will emerge. The agent-based approach will start to be phased out in 2014.

9. Data security re-emerges, this time to stay
Even as encryption becomes standard, it won't be enough. Encrypting data is indeed a best practice, but it's one tool in the tool chest. Just because your data is encrypted doesn't mean you know where it's been, where it's going, or whether or not it was accessed inappropriately. As a result, data access analytics and cloud-based data loss prevention (DLP) tools will start to become as common in the next few years as firewalls were in the past.

Data tracking tools will grow more powerful over time, meaning that even if you store data in a third-party cloud that you have no visibility into now, you'll need to start gaining visibility in 2014.

10. A virtual security perimeter begins to take shape
Traditional perimeter security is on life support. Traditional Firewalls, IPSes, and VPNs do a poor job of protecting against emerging cloud, mobile, and social threats. However, there is now a virtual cloud edge developing, one that enforces policies spanning authentication, identity management, access control, encryption, data movement, and more. This virtual cloud edge will enable organizations to securely stitch together their various clouds (private, public, hybrid), while even protecting traditional behind-the-firewall applications.

In 2014, the virtual security edge will begin to take shape in response to BYOD and cloud risks, but its benefits will be much further reaching.

11. The SMACS famous five (Social, Mobile, Analytics, Cloud, Security) will be the rage in 2014
Cloud is the main driver of social and mobile today. Cloud-delivered analytics will become more widely used. In 2014 cloud and analytics will form another alliance, namely, "Analytics for the Cloud." This will help the industry gain better, more actionable insights into cloud usage and behavior. The analogous alignment between Cloud and Security will emerge: cloud-delivered security will become more widely used and will be joined by security tools purpose-built for the cloud.

Meanwhile, those organizations blocking services will be at a major disadvantage in 2014, since their ability to compete will be seriously hindered.

More Stories By Rajiv Gupta

Rajiv Gupta is Founder and CEO of Skyhigh Networks. He has more than 20 years of successful enterprise software and security experience, and is widely recognized as a pioneer of Web Services and Client-Utility Computing, which was the precursor to cloud services as we know it today. With over 45 patents to his name, Rajiv has led two other companies to successful acquisitions by Cisco (Securent, Inc) and Oracle (Confluent Software). Previously, Rajiv spent 11 years at HP as GM of the E-speak Division – a division he started in 1998 to bring the Client-Utility Computing technology to market. Under his leadership, E-speak delivered some of the earliest Web Services technologies and standards and has been inducted into the Smithsonian National Archives. @TrustedMind

Cloud Expo Breaking News
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
The Internet of Things is a natural complement to the cloud and related technologies such as Big Data, analytics, and mobility. In his session at Internet of @ThingsExpo, Joe Weinman will lay out four generic strategies – digital disciplines – to exploit emerging digital technologies for strategic advantage. Joe Weinman has held executive leadership positions at Bell Labs, AT&T, Hewlett-Packard, and Telx, in areas such as corporate strategy, business development, product management, operations, and R&D.
SYS-CON Events announced today that DevOps.com has been named “Media Sponsor” of SYS-CON's “DevOps Summit at Cloud Expo,” which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. DevOps.com is where the world meets DevOps. It is the largest collection of original content relating to DevOps on the web today Featuring up-to-the-minute news, feature stories, blogs, bylined articles and more, DevOps.com is where the thought leaders of the DevOps movement make their ideas known.
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that allow marketers to cut through the noise and design their campaigns around strong, predictive signals, rather than arbitrary statistics. SendGrid sends up to half a billion emails a day for customers such as Pinterest and GitHub. All this email adds up to more text than produced in the entire twitterverse. We track events like clicks, opens and deliveries to help improve deliverability for our customers – adding up to over 50 billion useful events every month. While SendGrid data covers only abo...
SYS-CON Events announced today that the Web Host Industry Review has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Since 2000, The Web Host Industry Review has made a name for itself as the foremost authority of the Web hosting industry providing reliable, insightful and comprehensive news, reviews and resources to the hosting community. TheWHIR Blogs provides a community of expert industry perspectives. The Web Host Industry Review Magazine also offers a business-minded, issue-driven perspective of interest to executives and decision-makers. WHIR TV offers on demand web hosting video interviews and web hosting video features of the key persons and events of the web hosting industry. WHIR Events brings together like-minded hosting industry professionals and decision-makers in local communities. TheWHIR is an iNET Interactive property.
SYS-CON Events announced today that O'Reilly Media has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. O'Reilly Media spreads the knowledge of innovators through its books, online services, magazines, and conferences. Since 1978, O'Reilly Media has been a chronicler and catalyst of cutting-edge development, homing in on the technology trends that really matter and spurring their adoption by amplifying "faint signals" from the alpha geeks who are creating the future. An active participant in the technology community, the company has a long history of advocacy, meme-making, and evangelism.
SYS-CON Events announced today that Verizon has been named “Gold Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that generate growth, drive business innovation and move society forward. With industry-specific solutions and a full range of global wholesale offerings provided over the company's secure mobility, cloud, strategic networking and advanced communications platforms, Verizon Enterprise Solutions helps open new opportunities around the world for innovation, investment and business transformation. Visit verizonenterprise.com to learn more.
SYS-CON Events announced today that TMCnet has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Technology Marketing Corporation (TMC) is the world's leading business to business and integrated marketing media company, servicing niche markets within the communications and technology industries.
Cloud Computing is evolving into a Big Three of Amazon Web Services, Google Cloud, and Microsoft Azure. Cloud 360: Multi-Cloud Bootcamp, being held Nov 4–5, 2014, in conjunction with 15th Cloud Expo in Santa Clara, CA, delivers a real-world demonstration of how to deploy and configure a scalable and available web application on all three platforms. The Cloud 360 Bootcamp, led by Janakiram MSV, an analyst with Gigaom Research, is the first bootcamp that introduces the core concepts of Infrastructure as a Service (IaaS) based on the workings of the Big Three platforms – Amazon EC2, Google Compute Engine, and Azure VMs. Bootcamp attendees will get to see the big picture and also receive the knowledge needed to make the best cloud decisions for their business applications and entire enterprise IT organization.
"In my session I spoke about enterprise cloud analytics and how we can leverage analytics as a service," explained Ajay Budhraja, CTO at the Department of Justice, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at the Javits Center in New York City. Cloud Expo® 2014 Silicon Valley, November 4–6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading Cloud industry players in the world.
“We are starting to see people move beyond the commodity cloud and enterprises need to start focusing on additional value added services in order to really drive their adoption," explained Jason Mondanaro, Director of Product Management at MetraTech, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at the Javits Center in New York City. Cloud Expo® 2014 Silicon Valley, November 4–6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading Cloud industry players in the world.
"We are automated capacity control software, which basically looks at all the supply and demand and running a virtual cloud environment and does a deep analysis of that and says where should things go," explained Andrew Hillier, Co-founder & CTO of CiRBA, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at the Javits Center in New York City. Cloud Expo® 2014 Silicon Valley, November 4–6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading Cloud industry players in the world.
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity. In his session at Internet of @ThingsExpo, Mac Devine, Distinguished Engineer at IBM, will discuss bringing these three elements together via Systems of Discover.
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at 15th Internet of @ThingsExpo, Chad Jones, Vice President, Product Strategy of LogMeIn's Xively IoT Platform, will show you how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
All too many discussions about DevOps conclude that the solution is an all-purpose player: developer and operations guru, complete with pager for round-the-clock duty. For most organizations that is not the way forward. In his session at DevOps Summit, Bernard Golden, Vice President of Strategy at ActiveState, will discuss how to achieve the agility and speed of end-to-end automation without requiring an organization stocked with Supermen and Superwomen.