What were interested in is not what might happen in 2008, but what is already starting to happen. The following trends are here. They may not have hit your data center yet. Your user base may not yet be clamoring for them, but on your list of New Years resolutions, these technologies should be on it.
1. Data leaks and IP Theft - Even as viruses grow more dangerous and zombie botnets flood us with spam, security experts are turning inward. The real threat is from within. One disgruntled sales manager jumping ship to a competitor and taking customer lists along can do more damage than the latest worm, while being much harder to detect.
Not all of the damage is intentional. Data leaks got a lot of press last year, with the TJX scandal leading the way. The typical data leak incident combines a careless employee or lax security policies with opportunistic crooks. Yes, TJX was technically the victim of an external attack. However, TJX gathered customer credit card information that it shouldnt have and stored it in an unencrypted database. Its pretty much like leaving the keys in the ignition of your car and being surprised when someone steals it.
Security vendors are tackling this problem with new solutions that range from enterprise rights management to data discovery and policy generation to data-leak prevention. If your security profile doesnt take IP theft and data leakage into account, you should look at vendors like Liquid Machines, Proofpoint, Reconnex or Vericept.
You may soon have access to these features through your existing vendors, as well. Symantec recently acquired Vontu, while RSA and Websense made acquisitions of their own earlier this year, snatching up Tablus and PortAuthority.
2. Virtualization - Until recently, virtualization has been focused on data-center optimization. With virtualized servers, hardware utilization goes up and flexibility increases. At the same time, costs associated with hardware and ongoing maintenance drop.
Virtualization is now expanding beyond servers. On the trend front, it is being linked to the green data-center movement. The server efficiencies that come with virtualization also translate into lower power consumption and a smaller footprint within the data center.
Meanwhile, now that the technology for server consolidation has matured, virtualization could expand beyond the data center. VMware, Sun, Citrix and Novell all have mature technologies. Meanwhile, behemoths like Microsoft and Oracle have entered the space, further validating the technology.
Within the next couple of years, virtualization could find its way to the desktop. In the near-term, though, virtualization will be mainly a data-center play. Virtualization is the driving force behind data-center automation initiatives. It has the potential to bring on-demand workload automation and high-availability infrastructures together for cheaper, more flexible, more reliable infrastructures.
In the longer term, desktop virtualization could give users greater flexibility and IT better control. Many analysts have dismissed virtual desktops as yet another thin-client mirage, but what is more likely to happen is that virtualization will line up with other trends like service-orientated architecture (SOA) and mobility to deliver on-demand applications to whatever device users happen to favor, be they PCs, thin clients or smart phones.
3. Software as a Service - Speaking of services, the software as a service (SaaS) market continues to grow. SaaS has slowly been expanding beyond the mid-market, and since it dovetails well with other trends like virtualization and utility computing, 2008 could be a breakout year.
The big success story in the SaaS world is Salesforce.com, which has created an entire ecosystem of related third-party applications. In fact, the company has started to refer to its offering as a PaaS (platform as a service). For the enterprise, this delivers the promise of one-stop shopping for related applications and better data sharing among applications.
Another important SaaS happening this past year was Googles acquisition of Postini. Google continues to make inroads into what were previously desktop applications, and service-based offerings are leading the charge.
4. The Mobile Workforce - If your concerns about mobility are still centered on rogue access points and weak wireless encryption, youre not keeping up. With the release of the iPhone, the long-hyped computer-like smart phone phenomena finally arrived. Each iPhone within the enterprise represents an uncontrolled node that could introduce viruses, leach out intellectual property secrets and generally undermine your security policies.
At the same time, mobility isnt just about wireless. USB storage devices are cheap and robust. At a trade show this past spring, I was given a 2 GB drive as a party favor. When 2 GB USB devices are given away like key chains or beer cozies, youd better wake up and pay attention to them. Fortunately, there is security software out there from the likes of SanDisk, DeviceLock, and SkyRecon Systems that allows you to create and enforce policies for peripherals. The big security vendors, such as Symantec, are also starting to pay attention to this problem, so you should have plenty of options for protection in 2008.
5. Windows Vista - The question here is what should you do about Vista. The typical enterprise isnt showing much love for Vista, and Microsoft has responded by keeping XP on the market longer than it had planned to. However, with their heavy investment in Vista, dont expect this to go on indefinitely.
This means CIOs have a decision to make. Do they give in, cross their fingers and hope that Microsoft fixes all of Vistas glitches, or do they start weighing their options? Open-source vendors, predictably, see Vista as an opportunity. Some have even been touting desktop virtualization as a way to tentatively try Vista, while having a stable Linux operating system running alongside just in case.
Google also sees this as an opportunity. While enterprises have traditionally been reluctant to give up the control of the desktop to third parties, the growing acceptance of service-based applications is making this less of an issue. Meanwhile, as mobile handsets get more and more robust, the mobile OS developers might have a say in the matter; probably not in 2008, but not that far down the road.