Your SlideShare is downloading. ×
0
© 2014 IBM Corporation
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
© 2014 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not me...
Upcoming SlideShare
Loading in...5
×

Enterprise IT Security - Summary of Trends to Watch in 2014

4,182

Published on

This 2014 HorizonWatching Security Trend report provides an overview of the I.T. Security trend.  The target audience for this document is HorizonWatching Community members who want a resource document that can provide them with summary information, lists of resources, as well as insights into what trends we might see around the Security topic during 2014.

PURPOSE: The slides provide summary information about the Enterprise I.T. Security trend in 2014

CONTENT: Summary information about this emerging trend is provided along with many links to additional resources.

Note: This presentation represents my own personal thoughts and ideas….not those of my employer.

Published in: Technology, News & Politics
2 Comments
11 Likes
Statistics
Notes
No Downloads
Views
Total Views
4,182
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
424
Comments
2
Likes
11
Embeds 0
No embeds

No notes for slide

Transcript of "Enterprise IT Security - Summary of Trends to Watch in 2014"

  1. 1. © 2014 IBM Corporation Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Contact: Bill Chamberlin, Principal Emerging Trends Research Analyst / HorizonWatching Community Leader January 26, 2014 Security: A 2014 HorizonWatching Trend Report
  2. 2. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. About this report  Purpose: This HorizonWatching Trend Report provides an overview on the Security trend for IBM Clients  Content: Summary information about the trend is provided along with many links to additional resources.  How To Use This Report: This report is best read/studied and used as a learning document. There are many links provided in the report that will take you to other websites and resources where you can continue your learning. You may want to view the slides in slideshow mode so you can easily follow the links 2 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014
  3. 3. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Cybersecurity is perhaps the most critical of all IT trends, especially for Governments… 3 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 “Improving our cyber resilience includes: hardening our digital infrastructure to be more resistant to penetration and disruption; improving our ability to defend against sophisticated and agile cyber threats; and recovering quickly from cyber incidents—whether caused by malicious activity, accident, or natural disaster.” – whitehouse.gov (link) GEN Keith Alexander, Director of the National Security Agency and Commander of U.S. Cyber Command delivers the keynote address at 4th Annual Billington Cybersecurity Summit in Washington, DC. “Imagine if someone tried to break into your house. Now imagine it happens 60,000 times a day.” – IBM (link) Video: Cybersecurity Summit
  4. 4. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. However, the top I.T. Analyst firms do not call it out as a critical part of the new computing platform 4 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014
  5. 5. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. In 2014, we can expect more of the same security breaches that we saw in 2013, further elevating Security to Board level discussions. 5 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 IT Security in the Snowden Era – ZDNet For Target, the Breach Numbers Grow – The New York Times Security Breach Exposes 2.9 Million Adobe Users – Forbes 4 Million Patients At Risk After Computer Theft From Chicago Medical Group – Dark READING
  6. 6. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Consumerization, social, mobile, cloud, big data and IoT are all contributing an increased risk of security and data breaches 6 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 Infographic Sourced from IBM (link) “With continuing trends in cloud, consumerization, mobility and the "next big thing", the way IT is delivered is changing. Each brings new threats and breaks old security processes.”– Gartner (link) “Information security must evolve from just an IT project to the core of critical business decisions. You must protect enterprise data from compromise and drive innovation at the same time.” – Gartner (link) “We’re in a perfect IT security storm. Hackers are more sophisticated, your data is increasingly accessed anytime and anywhere and often resides in the cloud.” – IBM (link) “Increasing use of cloud-based services, user mobility and multiple devices is adding complexity to security, particularly identity management requirements.” – Ovum (link)
  7. 7. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. IT Security Trends to Watch in 2014 1. “Target”ed Attacks: Expect more targeted and coordinated attacks (like we saw at Target) that are successful in disrupting service and fraudulently obtaining significant amounts of intellectual property. 2. CISO Role: As a result of attacks, more enterprises will institute the Chief Information Security Officer role and task them with developing a corporate wide security strategy. 3. More Complexity: IT Security continues to become very complex, thanks to the ‘third platform” of mobile, social, big data, and cloud. Enterprises must guard against both theft of data, fraud, etc. and hacking into systems and infrastructures.. Security skills will be in high demand. 4. Encryption: Expect a huge interest in encryption technologies as enterprises realize that unencrypted data traffic behind the firewall is vulnerable to detection from outsiders. 5. Biometrics: The acceptance of biometrics has been very gradual. In 2014, we will see increased adoption of biometrics as a way to transition from the traditional user ID/password combination used most frequently to verify online identities. 6. Internet of Things: Need to secure enterprise systems against unwelcome access by Sensors, M2M Devices, Wearables and Embedded Systems. 7 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 Study: IBM Cyber Security Intelligence Index Source: HorizonWatching, IBM Market Insights
  8. 8. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. IT Security Trends to Watch in 2014 (cont.) 7. Security Automation: Enterprises will invest in better security management facilities, the use of analytics and intelligence to identify trends and usage patterns, and the ability to monitor, report, and act on security intelligence. 8. Smarter Malware: Malicious code authors are very adept at camouflaging their work. They will get smarter in 2014. Expect mobile to be a target. 9. Mobile Threats: Mobile usage overtakes PCs. Mobile security platform weaknesses are giving rise to new threats. In 2014 hackers/criminals will increasingly target Mobile email, apps, platforms, wallets, and app stores. 10. BYOWearables: Employees will be bringing their Smart Glasses, Watches, and Health Monitors to work with them, causing more complexity for I.T. Security professionals. 11. Device & Location Important: Enterprises begin analyzing both device and location information to help them understand the potential context of the user’s attempt to access the network. 12. BYOS: Expect a rise in “bring your own security” scenarios, in which employees using their own mobile devices for work also employ their own personal security measures – often without the consent or awareness of enterprise security managers. 8 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 Gartner Webinar: Top Security Trends and Takeaways for 2014 Source: HorizonWatching, IBM Market Insights
  9. 9. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Social, Mobile/BYOD, Big Data, Analytics, Cloud and IoT will all put more stress on Security Proffesionals in for 2014 9 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 IDC Worldwide Security Predictions 2014: The New Value of Security Paranoia – IDC Cybersecurity in 2014: A roundup of predictions - ZDNet The Year Ahead in Cyber Security: What You Need To Know - Forbes
  10. 10. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Overview of Trend 10 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 Today, our world's infrastructure is both more sophisticated and more interconnected than ever before - linking vast amounts of information and services in new ways, but also introducing more security complexities and challenges in roughly equal proportion. For this reason, it is no longer enough for organizations, or even entire governments, to try to address security strictly within their own enterprises. Drivers • Cloud applications result in greater separation of data user and data owner. • Consumerization of Industries and of IT • Mobile Employees want access anytime, anywhere • Virtualization of all devices • Increased threats, including malware, cybercrime, Phishing, SPAM, bots • Business continuity and disaster recovery • Compliance. Fraud control breach notification & data privacy regulations • Trusted Identity - trusted, privacy-enabling, shared and easy-to-use identities • A high profile security breach can cause major damage to a customer’s brand Inhibitors/Challenges • Security is a major barrier to cloud adoption • ROI is still not a true value of measurement of security investment • Pureplay security vendors continue to be challenged by the most dominant software providers and by nimble and innovative new entrants • Employees use of personal devices or consumer grade applications. Implications • Increased role for security professionals and service providers • Must manage risk end-to-end across all areas of the organization and every external system they connect to • Compliance will require continued investment • IT depts, must understand implications of key trends such as cloud, mobility, social, big data, IoT, etc. • Encryption behind the firewall becomes a necessity • Biometrics continues to be an emerging technology that can be embedded into solutions to enhance information security “By 2020, 75% of enterprises' information security budgets will be allocated for rapid detection and response approaches, up from less than 10% in 2012..” – Gartner (link)
  11. 11. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. The Security trend is a long term trend that just continues to grow in importance and size. 11 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 “The cloud-based security services market will be worth $2.1 billion in 2013, rising to $3.1 billion in 2015.” – Gartner (link) Top Security Trends and Takeaways for 2014 – Gartner Webinar (registration required) “The worldwide security technology and services market is forecast to reach $67.2 billion in 2013, up 8.7 percent from $61.8 billion in 2012, according to Gartner, Inc. The market is expected to grow to more than $86 billion in 2016.” – Gartner (link) “Security products did well in 2012, with growth of 6.5%. A more difficult threat environment and changing technology landscape brought on by consumerization, mobility, and cloud computing require continued investment in security. For the forecast period, we expect security product revenue to grow at a CAGR of 7.1%” – IDC (link) “Cyber security spending for critical infrastructure will hit $46 billion globally by the end of 2013.” – ABI Research (link)
  12. 12. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Each year, security professionals are faced with new challenges as each new emerging technology opens up new risks. 12 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 “In 2014, cyber espionage and state-sponsored threats will continue to make headlines, but the concerning underlying trend is that similar technology can and will be used against ordinary businesses.” – CIO.com (link) “Context-aware security and security intelligence are becoming critical to the effectiveness of future security technologies.” – Gartner (link) What is Security Intelligence? - IBM “An ever-increasing number of devices and growing volumes of data can make it difficult to develop and deploy effective cyber security measures.” – IBM (link)
  13. 13. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Selected Additional Information and Resources 13 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 • ABI Research: Security and CyberSecurity • Forrester: • Security Research • Security Blog Posts • Frost & Sullivan: Network Security • Gartner: • Security and Risk Management • Security Blog posts • Top Security Trends and Takeaways for 2014 (Webinar) • Security and Privacy • Identity and Access Management • IDC: • Security Products and Services • Security and Business Continuity, • Security Research • Search for Security “As threat ecosystems are stimulated by state-sponsored organizations, industrial espionage firms, professional criminals, and hacktivists, consumer and corporate privacy concerns are driving new products and services to make up for the shortcomings of some existing technologies. Moreover, the Internet of Things will create an exponential need for protection.” – IDC (link) “Mobile device and network security investments will account for nearly $9 Billion in 2013 alone. The market is further expected to grow at a CAGR of nearly 21% over the next 7 years.” – SNS Research (link)
  14. 14. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Selected Media Websites and Other Resources 14 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 • Businessweek: Search for Cyber-Security • CIO.com: Security • ComputerWorld: Security • eWeek: Security • Forbes: CyberSecurity and Security • InformationWeek: Security • Infotech: Security • InfoWorld: Security and Security-related Blog posts • Network Computing: Data Protection Channel • Network World: Security Research Center • NY Times: CyberSecurity • VentureBeat: Security and Cybersecurity • Whitehouse.gov: CyberSecurity • Wired: Security IT Security in the Snowden Era – ZDNet
  15. 15. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Selected IT Vendor & Consultant Websites & Resources 15 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 • Accenture: Security Services • Amazon Web Services: AWS Security and Compliance Center • Booz Allen: Cyber Solutions • Cisco: Security • Deloitte: Security & Privacy • EMC: Security • Google: Application Security • HP: Security Offerings • IBM: Security and Security Software • Infosys: Security Offerings • Microsoft: Security for IT Pros • Oracle: Security Solutions • SAP: Application Performance & Security • Tata Consultancy Services: Managed Security Services • VMware: Security and Compliance • Wipro: Enterprise Information Security The Evolving Role of the Chief Security Officer - IBM
  16. 16. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Selected Social Media Sites and Searches 16 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 • Google Search: CyberSecurity and “Information Security” and “IT Security” • Technorati Blog Search: Blog posts tagged Security • Google+ Communities Search: Security • LinkedIn Group Search: Security • IBM Institute for Advanced Security • Pinterest Search: Information Security and Cybersecurity • Slideshare: IT Security and Information Security and Cybersecurity • Twitter hashtag searches: #security and #cybersecurity • YouTube: Security Playlists and Security Channels / Cybersecurity Playlist and Cybersecurity Channels • Wikipedia: Information Security and cyberSecurity Building Tomorrow’s Cybersecurity Workforce (Infographic)
  17. 17. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Selected Experts and Online Influencers 17 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 LinkedIn Title & Company Twitter Followers Blog Eugene Kaspersky CEO and Co-Founder Kaspersky Lab e_kapersky 112073 eugene.kaspersky.com Mukesh Sharma CEO & Founder, iHackers iHackers 58456 ihackers.co.in/about-us/ Brian Krebs Founder, Krebs on Security LLC briankrebs 44181 krebsonsecurity.com/ Bruce Schneier Fellow, Harvard Law School schneierblog 39586 www.schneier.com/ Graham Cluley Founder, GrahamCluley.com gcluley 25447 nakedsecurity.sophos.com/ Richard Bejtlich CSO, Mandiant taosecurity 22457 taosecurity.blogspot.com/ Jermiah Grossman CTO, WhiteHat Security, Inc. jeremiahg 22205 jeremiahgrossman.blogspot.com/ Jack Daniel Technical Product Manager, Tenable Network Security jack_daniel 16756 blog.uncommonsensesecurity.com/ Chris Wysopal CTO, Veracode WeldPond 16394 www.veracode.com/blog/ Angela Orebaugh Fellow, Booz Allen Hamilton AngelaOrebaugh 15827 www.tomorrow-today.com/ Amarjit Sing Senior Engineer, Tulip Telecom amarjitinfo 14952 www.amarjit.info/ Chris Hoff VP, Strategy - Security at Juniper Networks beaker 14778 www.rationalsurvivability.com/blog/ Josh Corman Director, Security Intelligence at Akamai Technologies joshcorman 11033 cognitivedissidents.wordpress.com/ George Hulme Tech Journalist at George Hulme georgevhulme 10294 George Hulme Nicole Perlroth Technology Report, NYTimes nicoleperlroth 8632 nicole_perlroth Brian Honan Owner & CEO, BH Consulting BrianHonan 8462 bhconsulting.ie/securitywatch/ Martin McKeay Security Evangelist, Akami Technologies mckeay 8455 netsecpodcast.com/ Mohit Kumar Senior Executive at Deloitte unix_root 7929 thehackernews.com/ Rich Mogull Security Editor, TidBITS rmogull 7879 securosis.com/blog Dan Philpott Founder, FISMApedia danphilpott 7327 fismapedia.org/ Mike Murray Managing Partner, MAD Security mmurray 7049 www.madsecinc.com/blog/ Also… See The Most Influential People in Security 2013
  18. 18. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Other Selected Reports from 2013 18 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 • Cybersecurity Strategy of the European Union , European Commission, July 2, 2013 • Report to the President – Immediate Opportunities for Strengthening the Nation’s Cybersecurity, Whitehouse.gov, November 2013 • Cybersecurity: Authoritative Reports and Resources, by Rita Tehan of Congressional Research Service, September 20, 2013 • Cyber Security Perspectives, by Jeff Suffolk of Huawei Technologies, October 2013 • Cybersecurity and Trade: National Policies, Global and Local Consequences, by Allan Friedman of Brookings Institution, September 2013 • Preparing Millennials to Lead in Cyberspace, by Raytheon, October 2013 • Under cyber attack, EY’s Global Information Security Survey 2013 • The five most common cyber security mistakes, by KPMG, August 2013 • Cybersecurity education for the next generation, by IBM Center for Applied Insights, April 2013 • Insights from the 2013 IBM Chief Information Security Officer Assessment, by IBM, October 2013 • Application Security Guide For CISOs, by Marco Morana for Open Web Application Security Project, November 2013 • IBM Helps Bridge the Cyber Security Skills Gap by Partnering with More Than 200 Global Universities – IBM Press Release, November 2013 • IBM Study: Security Officers Gaining a Strategic Voice, Transforming Technology and Business in Global Organizations – IBM Press Release, October 2013
  19. 19. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – Other Selected Reports from the 2012 Report 19 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 • Evolving Security Threats and Countermeasures, A presentation by Stewart Cawthray, Chief Security Architect at IBM, Published December 2012, 20 slides • Security Predictions for 2013, Marc van Zadelhoff, VP Strategy and Product Management, IBM Security Systems • Information Security in Transition: Top things to consider in 2013, A Webcast featuring Jon Oltsik of ESG and Michael Applebaum of Q1 Labs, an IBM Company • IBM Addresses Security Challenges of Big Data, Mobile and Cloud Computing, An IBM Press Release, October 2012 • Fighting to Close the Gap, Ernst & Young’s 2012 Global Information Security Survey, Published October 2012, 54 pages • Top tips for securing big data environments: Why big data doesn’t have to mean big security challenges, An IBM Software report, October 2012, 13 pages • A Compendium of Perspectives: A report from Deloitte’s Center for Security & Privacy Solutions, Published October 2012, 64 pages • Information Security: Better Implementation of Controls for Mobile Devices Should Be Encouraged: A U.S. GAO Report to Congressional Committees, published September 2012, 54 pages • IBM X-Force 2012 Mid-Year Trend & Risk Report, An IBM Security Systems in-depth analysis of the latest internet security threats, September 2012, 108 pages • Changing the game. Key Findings from The Global State of Information Security Survey 2014, A report by PWC, published September 2012, 32 pages • Securing the Mobile Enterprise with IBM Security Solutions, An IBM Software Solution Brief, July 2012, 8 Pages • Safeguarding the cloud with IBM Security solutions: Maintain visibility and control with proven security solutions for public, private and hybrid clouds, An IBM Software Solution Brief, July 2012, 8 pages • Finding a strategic voice: Insights from the 2012 IBM Chief Information Security Officer Assessment, An IBM Center for Applied Insights report, by David Jarvis, Marc van Zadelhoff, and Jack Danahy, 12 pages, May 2012 • The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Report by Dimensional Research, Published January 2012, 7 pages
  20. 20. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Security – IBM Resources and Links 20 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014 ibm.com links • IBM Security: http://www.ibm.com/security/ • Smarter Planet: Security and Resillience • Smarter Computing: Security • Services: IT Security Services , Secure Engineering • Software: IBM Security • Cloud Computing: Cloud Security • developerWorks: Security • IBM Institute for Advanced Security • x-Force: X-Force IBM Social Media Platforms • Twitter: @ibmsecurity, @InstituteAdvSec • Twitter Hashtag: #ibmsecurity • Blogs: Security Intelligence Blog, IBM Institute for Advanced Security, and IBM Application Security Insider , and X-Force • YouTube: IBM Security • LinkedIn Group: IBM Security • Slideshare: IBM decks tagged Security and Resilience • Community: IBM Institute for Advanced Security Twitter: @ibmsecurity
  21. 21. © 2014 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Appendix: About The IBM HorizonWatching Community  HorizonWatch is an IBM internal community in place since January 2001  Our focus is on learning about and sharing our knowledge on emerging trends, business issues, and technologies so we can – Develop better strategies for the future – Help our customers develop better strategies for the future  For more on the internal IBM HorizonWatch Community send an email to Bill Chamberlin, IBM HorizonWatch Community Leader at whchamb@us.ibm.com 21 Security: A 2014 HorizonWatching Trend Report (Client Ready)26Jan2014
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×