SlideShare a Scribd company logo
1 of 9
Download to read offline
accelerate your ambition
Copyright © 2015 Dimension Data
Top IT trends to watch in 2016
#cybersecurity
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
Some 52% of data that should be
protected isn’t protected – such
as financial information and
medical records (IDC).
By 2018, two-thirds of corporate
networks will have an Internet of
Things security breach (IDC).
Enterprise security market to grow
to USD 118 billion by 2019 (TBR).
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
In 2015, several high-profile
security breaches kept the topic of
cybersecurity in the headlines –
and the next 12 months doesn’t
look any different.
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
The chief information security officer (CISO)
faces a new headache: digital complexity.
The digital world has changed how
organisations communicate with the world
out there. The rapid increase in how we use
technology to communicate has led to more
data and more points of entry or breach.
Because of the rapid pace, security
hasn’t adapted fast enough.
read more
Security steps up to meet the digital age
Trend 1:
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
As organisations move security
controls from a traditional perimeter to
cloud-based providers, the traditional
corporate network is becoming
irrelevant. The adoption of cloud
platforms and security-as-a-
service, will continue in 2016.
read more
Cloud shatters the perimeter
Trend 2:
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
Yes, you read that right – a seize
mentality. A year ago, we predicted a
resurgence in interest in endpoint
security. Security professionals were
starting to take a closer look at their
devices – whether a PC, Mac,
smartphone, or tablet – for indicators of
compromise.
read more
Business adopts a ‘seize’ mentality
Trend 3:
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
Intelligence can’t be separated from
any security initiative as we move
into the next 12 months. With better
intelligence, you can get smarter about
security — taking a proactive rather
than a reactive stance.
read more
Intelligence takes on a defensive stance
– keep your eye on the target
Trend 4:
accelerate your ambition
Copyright © 2015 Dimension Data
2016 IT trends
cybersecurity
If anything, 2016 is set to be the year of
hypervirtualised security. The firewall was
always seen as the first and last line of
defence for preventing threats, but this can
lead to a false sense of security or, worse,
an attitude of complacency.
read more
Hypervirtualised, software-defined
security – the appliance is dead,
long live the (virtualised) appliance
Trend 5:
accelerate your ambition
Copyright © 2015 Dimension Data
To read more on Top IT trends in 2016
#cybersecurity
read more here

More Related Content

Viewers also liked

Viewers also liked (6)

NoSQL, no security?
NoSQL, no security?NoSQL, no security?
NoSQL, no security?
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 

More from DImension Data

More from DImension Data (20)

Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaboration
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edge
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top Employers
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Top it trends to watch in 2016 : cybersecurity

  • 1. accelerate your ambition Copyright © 2015 Dimension Data Top IT trends to watch in 2016 #cybersecurity
  • 2. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity Some 52% of data that should be protected isn’t protected – such as financial information and medical records (IDC). By 2018, two-thirds of corporate networks will have an Internet of Things security breach (IDC). Enterprise security market to grow to USD 118 billion by 2019 (TBR).
  • 3. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity In 2015, several high-profile security breaches kept the topic of cybersecurity in the headlines – and the next 12 months doesn’t look any different.
  • 4. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity The chief information security officer (CISO) faces a new headache: digital complexity. The digital world has changed how organisations communicate with the world out there. The rapid increase in how we use technology to communicate has led to more data and more points of entry or breach. Because of the rapid pace, security hasn’t adapted fast enough. read more Security steps up to meet the digital age Trend 1:
  • 5. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity As organisations move security controls from a traditional perimeter to cloud-based providers, the traditional corporate network is becoming irrelevant. The adoption of cloud platforms and security-as-a- service, will continue in 2016. read more Cloud shatters the perimeter Trend 2:
  • 6. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity Yes, you read that right – a seize mentality. A year ago, we predicted a resurgence in interest in endpoint security. Security professionals were starting to take a closer look at their devices – whether a PC, Mac, smartphone, or tablet – for indicators of compromise. read more Business adopts a ‘seize’ mentality Trend 3:
  • 7. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity Intelligence can’t be separated from any security initiative as we move into the next 12 months. With better intelligence, you can get smarter about security — taking a proactive rather than a reactive stance. read more Intelligence takes on a defensive stance – keep your eye on the target Trend 4:
  • 8. accelerate your ambition Copyright © 2015 Dimension Data 2016 IT trends cybersecurity If anything, 2016 is set to be the year of hypervirtualised security. The firewall was always seen as the first and last line of defence for preventing threats, but this can lead to a false sense of security or, worse, an attitude of complacency. read more Hypervirtualised, software-defined security – the appliance is dead, long live the (virtualised) appliance Trend 5:
  • 9. accelerate your ambition Copyright © 2015 Dimension Data To read more on Top IT trends in 2016 #cybersecurity read more here