SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
THE IT INDUSTRY IS MOVING
AT AN UNPRECEDENTED PACE.
TO BETTER UNDERSTAND
WHERE THINGS ARE HEADED,
WE’VE PULLED TOGETHER A
SAMPLING OF EXPERT
PREDICTIONS FOR 2020.
ALTARO - http://bit.ly/2OIYPoX
INDUSTRY-ALTERING TECHNOLOGIES TO KEEP AN EYE ON
• Containers Will Continue to Change the Industry
Microsoft and nowVMware are both making huge investments in bringing additional
containerization technologies and features to the market, including tight integration
with Kubernetes. Many of these investments will bring containers more into the
realm of the IT Pro via management of underlying hardware and technologies.
• Hybrid Cloud Adoption Will Continue to Grow
Many organizations see the value into the cloud but are starting with only certain
workloads. I see this trend continuing for some time, and those admins and vendors
that are able to manage and provide value to both public and private clouds
effectively will be in high demand.
• Ransomware Will Continue to Be a Rampant Mess - Especially for Service
Providers
As an industry we've seen nothing but a large up-tick in ransomware infections and
variants over the last year, but one trend is increasingly worrisome. Ransomware bad-
actors have found high levels of success in targeting service providers specifically. It
will be quite a while before this issue is solved for good.
Andy Syrewicze, Tech Evangelist at
Altaro
BOOMI - http://bit.ly/31O2hE4
WELCOME TO PLANET DATA
Our planet is a giant living universe that is an entity where its
circulatory system is made of networks and data.What can go wrong?
My primary prediction is that we will see a new evolution in innovations
because of changes in culture and expectations around data.Think
about how quickly we now look at a new application or feature on our
mobile phone, and immediately think, "how did that application know
that about me?" Or, "what data is that application collecting?"This was
not even a thought a few years ago, but now there is increasing
uneasiness and concern for privacy that is naturally happening because
of the production and availability of so much and different types of data
about people and businesses.
Michael J. Morton, Chief
Technology Officer of Boomi, a
Dell Technologiesbusiness, and
Dell Fellow
CITRIX - http://bit.ly/3bu7i97
THE NEW YEAR PROMISES A NEW LOOK
Despite advances in technology and the rise of a new generation of
workers, the way we work hasn't changed much in the last two
decades. Most companies still organize work around big hubs often in
large and costly metropolitan areas, and then do their best to hire and
retain talent with competitors across the street. But that's about to
change.And several key trends will transform the way work gets done
in four radical ways:
1. Flexible work models will come into their own.
2. Employees will revolt against the tyranny of enterprise technology.
3. Employees will engage with workplace technology in totally new
ways.
4. The augmented worker will come into its own.
Tim Minahan, Executive Vice
President, Business Strategy and
Chief Marketing Officer, Citrix
COMMVAULT - http://bit.ly/2SjxJqG
MULTI-CLOUD, IT HIRING, AND RECOVERY READINESS
Penny Gralewski, Solutions Lead,
Commvault
• Multi-cloud Adoption Will Increase Demand For More Diverse Data Protection
Capabilities
As organizations adopt more clouds for different organizational requirements, the need
for fast, flexible data protection - able to protect a diverse set of data workloads - will
increase. Organizations are choosing different clouds for different use cases, so today's
data protection platforms need to accommodate a wide variety of cloud use cases,
including Platform as a Service (PaaS), containers, and massive databases like Microsoft
SQL Server, MySQL, PostgreSQL, Splunk, SAP HANA and Oracle.
• The Cloud Data Center RaceWill Drive Greater Data MigrationTo, From, and
Across Clouds
Cloud vendors are quickly expanding their regional data center availability.There are
currently 54 Microsoft Azure regions, 22 AmazonWeb Services (AWS) regions and 20
Google Cloud Platform regions. Oracle Cloud just announced a goal of 36 regions
available by the end of 2020. For Oracle customers, that means a new availability region
every 23 days.This will provide organizations have more choice as they determine how
to support worldwide offices, call centers and manufacturing organizations with cloud
regions located close to these facilities. However, this will also require them to find data
protection solutions that give their global IT teams visibility into where all their data is
located and how it's managed, especially as country and region specific data
governance requirements change.
DATACORE SOFTWARE - http://bit.ly/3bxkkTg
PRIMARY/SECONDARY STORAGE WILL INCREASINGLY BECOME
"SHADES OF GRAY"
Gerardo A. Dada, CMO at DataCore
Software
• Hyperconverged Disillusionment and Maturity
As hyperconverged (HCI) technologies are beginning to reach a more mature state after a
few years of deployment, some users have entered a period of
disillusionment. Companies are starting to see that many HCI systems have become an
additional silo rather than the panacea it promised to be. HCI is, however, proving to be
valuable for specific use cases like edge computing andVDI, as well as applications that
can work in isolation. But, it hasn't proved to be the "end all, be all" for every IT need.
• Transformation From a Hardware-Centric to a Software-Defined Model
Will Contribute to Accelerated Adoption of Software-Defined Storage
It's time for the storage industry to jump on the software-defined infrastructure
bandwagon and to move from a hardware-centric model to a software-centric model. The
benefits of software-defined storage are now well understood - and proven, after a period
when they sounded too good to be true.The technology is now mature and readily
available.SDS makes storage smarter, more efficient, and easier to manage - resulting in
significant economic benefits.
The industry is also now increasingly realizing that it's the data that matters and not the
actual storage system. Furthermore, the software that controls where data is placed is
where the value lies, not in the type of hardware or the media.
FACTION
DISASTER RECOVER GOES MULTICLOUD IN 2020
Matt Wallace, CTO, Faction
Over the past few years, a lot of customers started to migrate their
DR into the cloud leveragingVMware Cloud on AWS.Today,VMware
has announced major partnerships with Azure and Google Cloud
Platform so people can now select any of the public clouds for their
DR workflows.
We think, because of the adoption we've seen onVMware Cloud on
AWS, the single largest trend for DR in 2020 is going to be that
many more people start adopting different public clouds for their
Disaster Recovery leveragingVMware technologies.
FORWARD NETWORKS - http://bit.ly/3bqEzlA
THE GROWING TREND OF NETWORK AUTOMATION
Nikhil Handigol is a co-founderat
Forward Networks and a Computer
Science PhD from Stanford
1. Automation and verification will drive IT infrastructure evolution.
Within the past years, we have seen organizations operate at various levels of automation. 2020 will
see automation grow as verification initiatives have proven to help make network automation more
reliable and robust. As IT infrastructures continue to grow and become more complex, the
deployment of verification technology will be the key driving force in shifting towards intent-based
networking. Over the last few years, network verification has proved to prevent network outages and
to improve the efficiency and agility of enterprise operations. Network verification will continue to
lead the network automation story in 2020. It will continue to transform IT processes and help
organizations transition to a more software-driven model.
2. Open Source tools will fuel network automation.
2019 saw a growing trend of adoption of open source tools to power automation efforts across
several IT operations. In 2020, this trend will continue to grow. More companies will aim to automate
their network infrastructure efforts in order to speed up IT processes - a shift that will benefit both
small and large, complex networks. Combined with verification technologies, automation will prove
to be a more efficient and more reliable way of managing configurations and optimizing network
infrastructures.
3. SDN deployments will see greater adoption of whitebox switches.
The growing trend towards automation and disaggregation in enterprise networks will see greater
adoption of whitebox switches.Whitebox switches provide greater vendor flexibility and better
economies of scale. As automation and verification tools mature, network engineers have greater
confidence to migrate to newer whitebox vendors to realize the potential of SDN -- greater
flexibility, better visibility, and lower cost.
FLEXERA - http://bit.ly/39FMvxV
HOW TO KEEP YOUR HEAD IN THE CLOUD
Jim Ryan, President &
CEO of Flexera
I believe that in 2020 the industry is finally going to wake up and realize
what a complete mess cloud spend truly is. Most people conflate cloud with
being cheaper and easier, and in many instances, that's true. But
sometimes it's far more economical to stay where you are with bricks and
mortar.
Many companies quickly rush to the cloud without really thinking through
the consequences. My recommendations for any CIO or CFO presented
with cloud options is to pause, take a breath, and understand exactly what
business problem you're trying to solve.
I certainly don't believe the cloud is more expensive in every case, or that
it's a bad alternative, or it's something that's going to go away. Cloud isn't a
fad. But I do believe it's a little bit overhyped. I'm always reluctant
whenever I hear any buzzword. "Digital transformation" sounds great. How
can anyone argue against digital transformation? It's like arguing against
peace. But when it comes to leading digital transformation, you need to
step back and decide what you're trying to accomplish.
IGEL TECHNOLOGIES - http://bit.ly/31M1gMC
CLOUD WARS - THE RISE OF DAAS
Simon Townsendis the
chief marketing officer
for IGEL
• The year ofVDI is 2020, andVDI is spelled WVD.
Microsoft WindowsVirtual Desktop (WVD) will take the cloud workspace market by storm. In fact, I expect
that it will take off much faster than anyone expects, shipping more than 5,000,000 licenses in 2020.Why?
The Microsoft Azure-based Desktop-as-a-Service (DaaS) solution offers Microsoft customers an easy
migration path from traditionalWindows on individual endpoint devices toWindows in the cloud. And it's
not just about the technology (say that to yourself again!) Simple virtual desktop licensing and new DaaS-
friendly features like multi-session Windows 10, make WindowsVirtual Desktop a logical, economical and
safe choice. Plus, you can bet given Microsoft's success withOffice 365, Microsoft will put some serious
muscle behind its new entry to the DaaS market.
• It's not just about Desktops...
Deploying applications continues to plague organizations and Microsoft AppAttach,Amazon AppStream,
Liquidware, Droplet Computing and layering technologies from other ecosystem vendors will be an
interesting area to watch.With the ability to securely deliver "legacy Windows" desktop applications to
any computer or provide new ways to deploy application sets to common non persistent images, these
technologies will play a major role in the move to virtual desktops. Other, new DaaS and application
delivery as a service solutions, such as Nutanix Frame and Workspot also offer new ways to consume both
applications and desktops from the cloud.
• The cloud supremacy battle will intensify.
Amazon Web Services, Microsoft Azure and Google Cloud will each be clamoring to secure the greatest
market share, particularly with enterprises. As a result, we'll see many announcements of multi-billion
commitments to these vendors. Likewise, you'll see an increasing pressure for software vendors to offer
truly cloud-agnostic solutions so that customers can retain choice and be free from cloud lock-in.
KASPERSKY - http://bit.ly/2vuZ9B2
ADVANCED PERSISTENT THREATS IN 2020 - ABUSE OF PERSONAL
INFORMATION AND MORE SOPHISTICATED ATTACKS ARE COMING
• The abuse of personal information: from deepfakes to DNA leaks
After a number of personal data leaks that happened in recent years, the number of personal details available made it
easier for attackers to perform targeted attacks, based on victims' leaked info. In 2020, threat actors will dive deeper,
hunting for more sensitive leaks, such as biometric data.
• False flag attacks reach a whole new level.
These attacks will develop further, with threat actors seeking not only to avoid attribution but also to actively lay the
blame on someone else. Commodity malware, scripts, publicly available security tools and administrator software,
mixed with a couple of false flags, where security researchers are hungry for any small clue, might be enough to divert
suspected authorship to someone else.
• Ransomware shifts toward targeted threats.
Attackers will focus more on organizations that are likely to make substantial payments in order to recover their data.
A potential twist might be that, instead of making files unrecoverable, threat actors will threaten to publish data that
they have stolen from the victim company.
• More infrastructure attacks and attacks against non-PC targets.
Determined threat actors have, for some time, been extending their toolsets beyondWindows, and even beyond PC
systems. VPNFilter and Slingshot, for example, targeted networking hardware.
• Personal information abuse grows, armed with AI.
It is very similar to some of the techniques used for driving election advertisements through social media.This
technology is already in use and it is just a matter of time before some attackers take advantage of it.
KONICA MINOLTA - http://bit.ly/2vpX7lu
THE EVOLUTION OF PRIVACY AND THE ROLE OF MSPS
Marco Maggio, All Covered VP
Strategic Strategies, Konica
Minolta
Our role, our value and our existence as an MSP will change
dramatically over the next few years.When you think about the
traditional role of an MSP to date, it has been solely focused on
proactively managing a physical network with servers, PC switches,
routers, etc.
Now, as more organizations encroach a server-less environment with
access from any device from anywhere at any time, the focus of an
MSP will continue to shift to improving clients' data experience. As all
MSPs reinvent our value proposition to our clients, the ability to
prepare them for rapid technology shifts will certainly keep us on our
toes and help them focus on their desired business results and let us
leverage our world-class expertise to effectively manage the
technology.
LIQUIDWARE - http://bit.ly/2SjB5Ki
READY OR NOT, DESKTOPS ARE GOING CLOUD, AND CLOUD
STAGING WILL INCREASE
Jason E. Smith is VP of Product Marketing
for Liquidware
Major organizations will continue to adopt cloud hostedWindows desktops in
2020, and it's no longer a matter of "if" but "when" that will happen.The
leading enabling platforms - AmazonWorkSpaces, MicrosoftWVD, and
Nutanix Xi Frame - are now mature enough, and the use cases now are too
prevalent, for massive desktop cloud adoption not to happen. 2020 will
continue to see large customers adopt these platforms, as well as Citrix and
VMware cloud desktop transformations.The question you need to ask
yourself right now is, "Is my organization'sWindows desktop enterprise ready
for the shift?"
Let's be clear, not all desktops will be good candidates for cloud hosted
desktops this year, but many clear uses cases are obvious candidates for these
emerging desktops. In particular, the easiest use cases are adopting cloud
desktops first, such as call centers and task worker type use cases.
Just likeVDI, additional use cases will follow, including knowledge worker type
jobs. Knowledge worker adoption is exactly where the cloud hosted desktops
will see exponential adoption.
NUODB - http://bit.ly/2HkxftS
"DIGITAL TRANSFORMATION" IS NOT HOT, BUT IT
INFRASTRUCTURE MODERNIZATION IS CHANGING FAST
Ariff Kassam, CTO, NuoDB
In 2020 everyone will be tired of the term "digital transformation" (if
they aren't already), and yet organizations will still be trying their best
to make it a reality.While "digital transformation" heard frequently, it's
really just another way of describing how organizations are
modernizing IT infrastructure so they can scale their services more
rapidly and bring new products and services to market faster. In short,
it's all about agility. No matter what you call it, it's more than a passing
trend. It's a critical factor for business survival.
As organizations continue to modernize applications and improve
business agility, many are reviewing their cloud adoption strategies.
Here are my top three predictions for what that will look like in 2020:
1. Microservices and containers will dominate new development
2. Kubernetes adoption will rise for stateful applications
3. Multi-cloud deployment ramps ups
SCALYR - http://bit.ly/2UNNEiK
EMERGENCE OF PERFORMANCE INFORMATION PLATFORMS
Kevin Woods is Head of Product
Marketing at Scalyr
The costs and complexities of managing performance data today inhibits use,
which means organizations are underperforming their full potential.There is
nothing in the laws of physics or of business that keep these problems from
being solved.
If you face competition for customers in your industry, then the cost of doing
business without a PIP is high.You may underperform across every aspect of
the customer's experience, spend more money to deliver the experience than
necessary, and take longer to correct problems, thus impacting customer
loyalty, trust, usability and brand value.A leap ahead of the competition
happens with insights into customer needs, system behaviors, capacity
requirements, and trouble spots, creating new business advantages in the
new year.
It is possible to ingest and cost-effectively store performance data and
instantly access and search data in real time. Collecting and searching
performance data has been too slow and expensive because first generation
architectures are limited in scale and speed.The rise of second generation
architectures provide affordable scale and provide a reason to celebrate as we
roar into the 2020s.
SIOS TECHNOLOGY - http://bit.ly/37kp5fP
CLOUD-NATIVE DEVELOPMENT EFFORTS WILL BECOME
PERVASIVE ACROSS THE INDUSTRY - FROM ENTERPRISES TO
VENDORS
Frank Jablonski, VP of Global
Marketing at SIOS Technology
As the cloud continues on its inexorable track to IT dominance, 2020 will witness players
from all across the IT industry accelerating their cloud-native development efforts.That
includes the cloud service providers and their enterprise customers, of course, but also
application and system software vendors, as well as system integrators.
Enterprise DevOps teams will seek to take full advantage of the cloud's agility by re-
architecting their application/technology stacks specifically for the cloud environment. IT
departments regularly use a "lift and shift" approach to migrating applications to the
cloud, but owing to some differences between private and public infrastructures, the
effort still requires some changes to ensure meeting desired service levels.After the initial
wave of migration is complete, DevOps will drive re-architecting their
application/technology stacks to a cloud-native implementation to take further advantage
of the cloud's greater efficiency, reliability, scalability and affordability.
Application and system software vendors will endeavor to deliver greater value and higher
reliability by integrating robust high availability (HA) and disaster recovery (DR) features
into their solutions. Most applications today require the customer to provide these
protections separately, and most enterprises do this for all their applications with a
general-purpose HA/DR solution.A high priority for integrating HA/DR features will be
eliminating limitations, such as the dependencyWindows Server FailoverClustering
(WSFC) has on shared storage, which is not available in the cloud. Microsoft addressed this
limitation with Storage Spaces Direct, but S2D works only in a single datacenter, and not
across availability zones, making it unsuitable for truly mission-critical applications.
SOLARWINDS - http://bit.ly/2SjlFFI
BACK TO THE BASICS - AVOIDING DISASTER THROUGH GOOD
CYBERHYGIENE
Thomas LaRock, Head
Geek, SolarWinds
Whether it's spear-phishing, malware, or ransomware, criminals find new ways to attack and
compromise businesses. In 2020, to combat these threats and avoid low-hanging-fruit vulnerabilities,
organizations will realize the need to prioritize best practices for good cyberhygiene and training for
everyone from entry-level staff to C-suite leaders.This includes simple employee best practices, such
as leveraging password managers and account takeover prevention tools, to following the 3-2-1
backup rule (three copies of a data set in two different formats and one copy must be stored offsite)
to critical end-user trainings to prevent ransomware and phishing attacks.
I also expect to see an evolution in the way we think about cybersecurity: moving from more of a
hardware security focus to a broader digital security focus, to encompass the swath of personal data
existing online and potentially being hacked or breached. We're already beginning to see tech pros'
acknowledgement of this changing landscape with a greater focus on security-based skillsets.The
recent SolarWinds® ITTrends Report 2019: Skills forTech Pros ofTomorrow revealed 54% of
respondents considered SIEM and threat intelligence the second most important technology for
career development by weighted rank.
Hackers, viruses, and intelligent malware are all part of today's hostile cybersecurity landscape, and
the adoption of good cyberhygiene will help organizations better prevent and prepare for security
threats.
SPYCLOUD - http://bit.ly/39Kthb7
THE DEATH OF THE PASSWORD ROTATION POLICY
Ted Ross, CEO and co-
founder, SpyCloud
The standard 90-day password change policy has long been an accepted industry best practice for keeping
enterprise networks safe from harm. Only a small inconvenience to the user, changing login credentials at
a regular frequency promised to provide protection from threats and breaches that could wreak havoc on
business. While this approach may have kept criminals guessing in the past, continuing to rely on this dated
approach to password management is detrimental to your security posture.
Today, the average internet user has logins for ~200 sites. It's no surprise that most people just use the
same (or a variation on the same) password across multiple sites and accounts. When users are put on the
spot to come up with a new password every three months, the desire to reuse or tweak one from the past
is understandably strong.The problem?The more often people change their passwords, the higher the
chances of them using one that is already exposed. And criminals are waiting patiently to try their list of
compromised passwords every ninety days - again and again until they successfully take over the
account. Because of this, the forced 90-day password rotation actually plays into the hands of the criminal.
So, what's the safe bet for the enterprise? Only force a password change when a user's password has been
compromised. Drop the regularly scheduled password changes and use an automated ATO prevention
product to securely check employee passwords against a regularly updated corpus of exposed passwords.
Using this approach, users will only be required to change passwords when necessary. It's much less
annoying than forced password rotation policy and it's much safer.
"I love arbitrarily rotating my password," said no one ever. And this year, we are finally seeing the policy
being questioned. We expect that in 2020 we'll continue to see enterprise security teams happily moving
away from this decrepit security policy.
STACKROX - http://bit.ly/31Od7dh
AS KUBERNETES MATURES, SECURITY EVOLVES INTO SAFETY
Ali Golshan, CTO and
co-founder,StackRox
There are a number of factors you will need to consider to glean the most value from Kubernetes as its
ecosystem continues to mature.
• Kubernetes Maturity Means Businesses Can Build Bigger, BetterThings
The results of CNCF's first full Kubernetes audit revealed that Kubernetes is foundationally secure and fully
functional. But it also forced Kubernetes users to to take a closer look at potential vulnerabilities,
configuration issues, and other weaknesses.
Up to this point, a lot of organizations were running Kubernetes to build and test applications, or run in
environments that didn't have external exposures. They didn't have mission-critical applications with web-
facing services exposed. But this is changing, quickly.The pattern towards the maturity of Kubernetes is
similar to other technologies. Virtualization went through something very similar in the early 2000s. Public
cloud went through it from roughly 2008-2012. Kubernetes is following a very natural progression.
• Orchestration Consolidates around Kubernetes
A lot of companies have gone down the path of DevOps, building and using containers and microservices.
As a result, workloads are getting more complex, and companies are getting a much better sense of the
functionality they need from the container ecosystem. The Kubernetes ecosystem is very rich, and as more
companies find value in using Kubernetes as a container orchestrator, they will adopt more solutions in the
ecosystem. These advances mean we'll see increasingly complex workloads running in Kubernetes.
We're seeing a pattern where different types of workloads are becoming possible because of Kubernetes.
This proliferation is particularly true among companies building SaaS solutions - these applications are
data heavy and very complex. These applications also lend themselves well to wider adoption of service
mesh.
STORMAGIC - http://bit.ly/2QSBDEN
HOW THE 'EDGE-OLUTION' WILL EVOLVE THE STORAGE MARKET
Bruce Kornfeld,General
Manager - Americas,
StorMagic
More data is being created at the edge than ever before. IT continues to find that it is more efficient and
cost-effective to process and manage data at the location that it's being generated.This mass movement
away from expanding corporate datacenters and public clouds is reshaping and transforming the storage
landscape.
Here's a list of 2020 market predictions that StorMagic envisions based on this "Edge-olution":
1. Stemming from yesterday's Big Data craze, Artificial intelligence (AI) and Machine Learning (ML)
mature, and remain hot topics. AI and ML spikes and fuels global data explosion and the need for storage.
Both consume data from various different sources and attempt to correlate and identify patterns in
disparate data sets, creating data upon data.
2. Smarter management tools emerge to administer the edge environment of tomorrow. Solution
simplicity and speed are the top requirements for staff managing hundreds, thousands, or even tens of
thousands of edge locations.
3. High availability and security requirements soar at the edge due to regulations, and to avoid downtime
impact. As edge computing technologies continue to mature, datacenter class features like encryption with
key management, fault tolerance and five nines of availability, are now demanded in edge offerings.
4. Blockchain use cases evolve. As blockchain becomes more mainstream, its potential impact on edge
computing could be massive. Edge locations require new ways of handling security, management and data
protection due to the massive number of sites that now require IT attention. Blockchain is a natural fit to
help solve these issues because of its distributed nature and the ability to leverage a massive number of
instances to track information without dependence on a central location.This could dramatically change the
way IT manages edge computing sites.
STYRA
KUBERNETES AUTHORIZATION IN 2020
Chris Webber, VP of
Marketing at Styra
There will be three ways to think about authorization in a Kubernetes and cloud native world in 2020:
define it, decouple it, and make it declarative.
• Define: Define your authorization policy—what can do what, who can do what—with your legal
team, your IT security team, your compliance team. Get that figured out up front and you’re going
to save yourself a world of hurt on the back end, when you get into production.
• Decouple: Don’t waste time integrating authorization or hand-building it into your app or into your
infrastructure. From Kubernetes to service mesh into the app itself, find a way to get the
authorization decisions externalized.
• Declarative: Use those downstream APIs to do the enforcement using a policy engine to do the
context-aware decision-making.You’ve got everything you need in the apps of those APIs in the
environment, in the infrastructure.Take advantage of them.Work in a declarative way. Define what
can’t happen so you don’t have to worry about what could happen.
UNIT4 - http://bit.ly/2uHdXw3
PLATFORM AND PEOPLE EXPERIENCE WILL BECOME FRONT AND
CENTER FOR ERP
Claus Jepsen, Deputy CTO at Unit4
As we look at what is to come in the new year, we are compelled to
think about the results of trends and the predictions we made for
2019.We find ourselves reminiscing about different technologies, like
AI and chatbots, that we continued to develop, adopt and bet on.
In 2020 we will see these technologies, and others, being adopted for
the first time or for more mature organizations, filling specific gaps.
As with digital transformation, we will see different levels of
implementation whether by vertical, organizational size or specific
industries with a taste for innovation. We will see greater emphasis in
three main areas - digital assistants and AI; increased adoption of
hybrid cloud and the human aspect of the technology.
VEEAM SOFTWARE - http://bit.ly/2vr5mOk
DATA ACCESSIBILITY AND SPEED WILL BE ESSENTIAL TO
BUSINESSES
Dave Russell, Vice President of
Enterprise Strategy at Veeam
From an IT perspective, we have seen two major trends that will continue in 2020.The
first is that on-premises and public cloud will increasingly become equal citizens. Cloud is
becoming the new normal model of deployment, with 85% of businesses self-identifying
as being predominantly hybrid-cloud or multi-cloud today. Related to this are the issues
of cybersecurity and data privacy, which remain the top cloud concerns of IT decision
makers. In 2020, cyber threats will increase rather than diminish, so businesses must
ensure that 100% of their business-critical data can be recovered.
Here are some of the key technology trends that businesses will look to take advantage
of and prepare for in the year ahead.
1. Container adoption will become more mainstream.
2. Cloud Data Management will increase data mobility and portability.
3. Backup success and speed gives way to restore success and speed.
4. Everything is becoming software-defined.
5. Organizations will replace, not refresh, when it comes to backup solutions.
6. All applications will become mission-critical.
VEMBU TECHNOLOGIES - http://bit.ly/2Smsarq
A CENTRALIZED BACKUP SOLUTION IS A MUST
Nagarajan, Vice President of
Product Management, Vembu
Data has become an important asset of an organization.The complexity involved
in gathering, storing and protecting the data is enormous. Businesses require a
centralized backup and disaster recovery software that can protect the data stored
in any type of infrastructure, recover the data in minimal time to ensure business
continuity.
In 2020, cyber threats will be on a constant rise rather than decreasing and it is
imperative for businesses to protect their data.
Here are few trends businesses need to look out for in 2020:
1. Cloud Data mobility
2. Focus more on Disaster Recovery
3. Artificial intelligence in Data Centers
4. Increase in adoption of containers
5. Having a centralized backup solution is going to be crucial
VMWARE - http://bit.ly/2ULnBZj
WHAT WE CAN EXPECT FROM ENTERPRISE TECH
Chris Wolf, VP of the
Advanced Technology Group,
Office of the CTO, VMware
This past decade has seen a boom in enterprise technology, from the massive growth of cloud
computing to distributed edge workloads, 5G networks and more.What could the next year,
the next decade hold?
InVMware'sOffice of the CTO, we are continually noodling on new ideas and discussing them
in partnership with numerous leaders within our customer base and partner landscape. Based
on those conversations, here's what I see as not too far off on the horizon.
1.The Dawn of Hybrid Apps
2. Solutions at the Edge Come to Life
3. Specialized Hardware as a Shared Pool
4.The First StepsToward Intrinsic Security
5. Big Ideas for Small Devices
6. Machine Learning for the 99 Percent
7. Further Cloud Disaggregation
8. Shared Services Platforms
ZENOSS - http://bit.ly/37o9XxO
AI AND OTHER TRENDS IMPACTING INFRASTRUCTURE
MONITORING
Brian Wilson, Chief Customer
Officer, Zenoss
2019 saw many major strides in AI adoption, particularly in the IT Ops
arena, that were fueled by the need to tackle challenges around
drawing meaningful insights from large sets of raw infrastructure data.
Most IT projects involving AI invariably end up doing data manipulation
or aggregation by setting up models of data ingestion - typically,
without thinking about the business needs first. Looking ahead to 2020,
IT leaders and CIOs will spend more time assessing the real value of
theirAI bets.
1. AI - Fading Into the IT Fabric
2. Emergence of Cloud Marketplaces as B2B Resellers
3. Emergence of CIOs With DevOps Backgrounds
4. SaaS - All of theTime
ZERTO - http://bit.ly/2SpsZjn
A YEAR FOR RESILIENCE
Avi Raichel, CIO, Zerto
By now, most companies have already begun their digital transformation journey. In
so doing, they've learned one important lesson: you can't become digital without
deploying one or more cloud infrastructure architectures.With that in mind, cloud
usage will continue to grow in 2020 and become a strategic part of any IT
transformation modernization process-be it via hybrid cloud, multi-cloud or a
different combination environment.Organizations will continue looking for solutions
that will enable this complex architecture to connectedly run between on-premises
data centers and multiple cloud solutions.
Additionally, cyberthreats will continue to be a major, strategic risk for companies in
2020, especially those going through a digital transformation.These risks include loss
of productivity, loss of revenue, loss of customers and severe-often irreversible-
damages to the brand.The more digital your company becomes, the more you lean
on your IT staff.This tight correlation means that whenever there is a disruption to
your IT, it becomes a disruption to your whole business. Consequently, IT resilience
will become increasingly invaluable to companies as they undertake-and complete-
their digital transformation journeys.
In 2020, we anticipate a continued shift to a more fully digital business model and
expect the vitality of cyber resilience, IT resilience and business resilience to follow
suit.
READ 430+ EXPERT PREDICTIONS AT http://bit.ly/2QVorPI

Más contenido relacionado

La actualidad más candente

Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureKim Jensen
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in ThailandIMC Institute
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014Peak 10
 
Enterprise Architecture Networking
Enterprise Architecture Networking Enterprise Architecture Networking
Enterprise Architecture Networking Cohesive Networks
 
Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021Rick Lievano
 
Cisco Cloud White Paper
Cisco  Cloud  White  PaperCisco  Cloud  White  Paper
Cisco Cloud White Paperjtiblier
 
User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?Koru UX Design
 
The benefits of cloud technology for remote working
The benefits of cloud technology for remote workingThe benefits of cloud technology for remote working
The benefits of cloud technology for remote workingAbaram Network Solutions
 
Cloud Usage in Business Today and Tomorrow
Cloud Usage in Business Today and TomorrowCloud Usage in Business Today and Tomorrow
Cloud Usage in Business Today and Tomorrowrftclouds
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - CloudSonovate
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Rick Lievano
 

La actualidad más candente (17)

Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
 
Enterprise Architecture Networking
Enterprise Architecture Networking Enterprise Architecture Networking
Enterprise Architecture Networking
 
Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021
 
Cisco Cloud White Paper
Cisco  Cloud  White  PaperCisco  Cloud  White  Paper
Cisco Cloud White Paper
 
User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
The benefits of cloud technology for remote working
The benefits of cloud technology for remote workingThe benefits of cloud technology for remote working
The benefits of cloud technology for remote working
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Fight COVID Crisis With Cloud
Fight COVID Crisis With CloudFight COVID Crisis With Cloud
Fight COVID Crisis With Cloud
 
Cloud Usage in Business Today and Tomorrow
Cloud Usage in Business Today and TomorrowCloud Usage in Business Today and Tomorrow
Cloud Usage in Business Today and Tomorrow
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020
 
Enabling Digital Business (EDB)
Enabling Digital Business (EDB)Enabling Digital Business (EDB)
Enabling Digital Business (EDB)
 

Similar a VMblog - 2020 IT Predictions from 26 Industry Experts

Shamit khemka list outs 6 technology trends for 2015
Shamit khemka list outs 6 technology trends for 2015Shamit khemka list outs 6 technology trends for 2015
Shamit khemka list outs 6 technology trends for 2015SynapseIndia
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfinfosec train
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edgemyehuman
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportCensornet
 
What is next for cloud computing?
What is next for cloud computing?What is next for cloud computing?
What is next for cloud computing?Ahmed Banafa
 
New Trends in Cloud Computing
New Trends in Cloud ComputingNew Trends in Cloud Computing
New Trends in Cloud ComputingAhmed Banafa
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promisesGrand Crue
 
The 2017 data center: Clouds, containers and IoT data
The 2017 data center: Clouds, containers and IoT dataThe 2017 data center: Clouds, containers and IoT data
The 2017 data center: Clouds, containers and IoT dataClearSky Data
 
First step to the cloud white paper
First step to the cloud white paperFirst step to the cloud white paper
First step to the cloud white paperNewton Day Uploads
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud ComputingIMC Institute
 
State of Cloud 2016 - WGroup Industry Report
State of Cloud 2016 - WGroup Industry ReportState of Cloud 2016 - WGroup Industry Report
State of Cloud 2016 - WGroup Industry ReportWGroup
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computingCirro
 
Cloud Computing 2.0
Cloud Computing 2.0Cloud Computing 2.0
Cloud Computing 2.0Ahmed Banafa
 
Weekly Assignment Slideshare #4
Weekly Assignment Slideshare #4Weekly Assignment Slideshare #4
Weekly Assignment Slideshare #4MaggieWalker13
 
Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliverySoftweb Solutions
 

Similar a VMblog - 2020 IT Predictions from 26 Industry Experts (20)

Oracle
OracleOracle
Oracle
 
Shamit khemka list outs 6 technology trends for 2015
Shamit khemka list outs 6 technology trends for 2015Shamit khemka list outs 6 technology trends for 2015
Shamit khemka list outs 6 technology trends for 2015
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business Report
 
What is next for cloud computing?
What is next for cloud computing?What is next for cloud computing?
What is next for cloud computing?
 
New Trends in Cloud Computing
New Trends in Cloud ComputingNew Trends in Cloud Computing
New Trends in Cloud Computing
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promises
 
The 2017 data center: Clouds, containers and IoT data
The 2017 data center: Clouds, containers and IoT dataThe 2017 data center: Clouds, containers and IoT data
The 2017 data center: Clouds, containers and IoT data
 
First step to the cloud white paper
First step to the cloud white paperFirst step to the cloud white paper
First step to the cloud white paper
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
State of Cloud 2016 - WGroup Industry Report
State of Cloud 2016 - WGroup Industry ReportState of Cloud 2016 - WGroup Industry Report
State of Cloud 2016 - WGroup Industry Report
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
Cloud Computing 2.0
Cloud Computing 2.0Cloud Computing 2.0
Cloud Computing 2.0
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Cloud
CloudCloud
Cloud
 
Weekly Assignment Slideshare #4
Weekly Assignment Slideshare #4Weekly Assignment Slideshare #4
Weekly Assignment Slideshare #4
 
SMAC
SMACSMAC
SMAC
 
Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT Delivery
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

VMblog - 2020 IT Predictions from 26 Industry Experts

  • 1. THE IT INDUSTRY IS MOVING AT AN UNPRECEDENTED PACE. TO BETTER UNDERSTAND WHERE THINGS ARE HEADED, WE’VE PULLED TOGETHER A SAMPLING OF EXPERT PREDICTIONS FOR 2020.
  • 2. ALTARO - http://bit.ly/2OIYPoX INDUSTRY-ALTERING TECHNOLOGIES TO KEEP AN EYE ON • Containers Will Continue to Change the Industry Microsoft and nowVMware are both making huge investments in bringing additional containerization technologies and features to the market, including tight integration with Kubernetes. Many of these investments will bring containers more into the realm of the IT Pro via management of underlying hardware and technologies. • Hybrid Cloud Adoption Will Continue to Grow Many organizations see the value into the cloud but are starting with only certain workloads. I see this trend continuing for some time, and those admins and vendors that are able to manage and provide value to both public and private clouds effectively will be in high demand. • Ransomware Will Continue to Be a Rampant Mess - Especially for Service Providers As an industry we've seen nothing but a large up-tick in ransomware infections and variants over the last year, but one trend is increasingly worrisome. Ransomware bad- actors have found high levels of success in targeting service providers specifically. It will be quite a while before this issue is solved for good. Andy Syrewicze, Tech Evangelist at Altaro
  • 3. BOOMI - http://bit.ly/31O2hE4 WELCOME TO PLANET DATA Our planet is a giant living universe that is an entity where its circulatory system is made of networks and data.What can go wrong? My primary prediction is that we will see a new evolution in innovations because of changes in culture and expectations around data.Think about how quickly we now look at a new application or feature on our mobile phone, and immediately think, "how did that application know that about me?" Or, "what data is that application collecting?"This was not even a thought a few years ago, but now there is increasing uneasiness and concern for privacy that is naturally happening because of the production and availability of so much and different types of data about people and businesses. Michael J. Morton, Chief Technology Officer of Boomi, a Dell Technologiesbusiness, and Dell Fellow
  • 4. CITRIX - http://bit.ly/3bu7i97 THE NEW YEAR PROMISES A NEW LOOK Despite advances in technology and the rise of a new generation of workers, the way we work hasn't changed much in the last two decades. Most companies still organize work around big hubs often in large and costly metropolitan areas, and then do their best to hire and retain talent with competitors across the street. But that's about to change.And several key trends will transform the way work gets done in four radical ways: 1. Flexible work models will come into their own. 2. Employees will revolt against the tyranny of enterprise technology. 3. Employees will engage with workplace technology in totally new ways. 4. The augmented worker will come into its own. Tim Minahan, Executive Vice President, Business Strategy and Chief Marketing Officer, Citrix
  • 5. COMMVAULT - http://bit.ly/2SjxJqG MULTI-CLOUD, IT HIRING, AND RECOVERY READINESS Penny Gralewski, Solutions Lead, Commvault • Multi-cloud Adoption Will Increase Demand For More Diverse Data Protection Capabilities As organizations adopt more clouds for different organizational requirements, the need for fast, flexible data protection - able to protect a diverse set of data workloads - will increase. Organizations are choosing different clouds for different use cases, so today's data protection platforms need to accommodate a wide variety of cloud use cases, including Platform as a Service (PaaS), containers, and massive databases like Microsoft SQL Server, MySQL, PostgreSQL, Splunk, SAP HANA and Oracle. • The Cloud Data Center RaceWill Drive Greater Data MigrationTo, From, and Across Clouds Cloud vendors are quickly expanding their regional data center availability.There are currently 54 Microsoft Azure regions, 22 AmazonWeb Services (AWS) regions and 20 Google Cloud Platform regions. Oracle Cloud just announced a goal of 36 regions available by the end of 2020. For Oracle customers, that means a new availability region every 23 days.This will provide organizations have more choice as they determine how to support worldwide offices, call centers and manufacturing organizations with cloud regions located close to these facilities. However, this will also require them to find data protection solutions that give their global IT teams visibility into where all their data is located and how it's managed, especially as country and region specific data governance requirements change.
  • 6. DATACORE SOFTWARE - http://bit.ly/3bxkkTg PRIMARY/SECONDARY STORAGE WILL INCREASINGLY BECOME "SHADES OF GRAY" Gerardo A. Dada, CMO at DataCore Software • Hyperconverged Disillusionment and Maturity As hyperconverged (HCI) technologies are beginning to reach a more mature state after a few years of deployment, some users have entered a period of disillusionment. Companies are starting to see that many HCI systems have become an additional silo rather than the panacea it promised to be. HCI is, however, proving to be valuable for specific use cases like edge computing andVDI, as well as applications that can work in isolation. But, it hasn't proved to be the "end all, be all" for every IT need. • Transformation From a Hardware-Centric to a Software-Defined Model Will Contribute to Accelerated Adoption of Software-Defined Storage It's time for the storage industry to jump on the software-defined infrastructure bandwagon and to move from a hardware-centric model to a software-centric model. The benefits of software-defined storage are now well understood - and proven, after a period when they sounded too good to be true.The technology is now mature and readily available.SDS makes storage smarter, more efficient, and easier to manage - resulting in significant economic benefits. The industry is also now increasingly realizing that it's the data that matters and not the actual storage system. Furthermore, the software that controls where data is placed is where the value lies, not in the type of hardware or the media.
  • 7. FACTION DISASTER RECOVER GOES MULTICLOUD IN 2020 Matt Wallace, CTO, Faction Over the past few years, a lot of customers started to migrate their DR into the cloud leveragingVMware Cloud on AWS.Today,VMware has announced major partnerships with Azure and Google Cloud Platform so people can now select any of the public clouds for their DR workflows. We think, because of the adoption we've seen onVMware Cloud on AWS, the single largest trend for DR in 2020 is going to be that many more people start adopting different public clouds for their Disaster Recovery leveragingVMware technologies.
  • 8. FORWARD NETWORKS - http://bit.ly/3bqEzlA THE GROWING TREND OF NETWORK AUTOMATION Nikhil Handigol is a co-founderat Forward Networks and a Computer Science PhD from Stanford 1. Automation and verification will drive IT infrastructure evolution. Within the past years, we have seen organizations operate at various levels of automation. 2020 will see automation grow as verification initiatives have proven to help make network automation more reliable and robust. As IT infrastructures continue to grow and become more complex, the deployment of verification technology will be the key driving force in shifting towards intent-based networking. Over the last few years, network verification has proved to prevent network outages and to improve the efficiency and agility of enterprise operations. Network verification will continue to lead the network automation story in 2020. It will continue to transform IT processes and help organizations transition to a more software-driven model. 2. Open Source tools will fuel network automation. 2019 saw a growing trend of adoption of open source tools to power automation efforts across several IT operations. In 2020, this trend will continue to grow. More companies will aim to automate their network infrastructure efforts in order to speed up IT processes - a shift that will benefit both small and large, complex networks. Combined with verification technologies, automation will prove to be a more efficient and more reliable way of managing configurations and optimizing network infrastructures. 3. SDN deployments will see greater adoption of whitebox switches. The growing trend towards automation and disaggregation in enterprise networks will see greater adoption of whitebox switches.Whitebox switches provide greater vendor flexibility and better economies of scale. As automation and verification tools mature, network engineers have greater confidence to migrate to newer whitebox vendors to realize the potential of SDN -- greater flexibility, better visibility, and lower cost.
  • 9. FLEXERA - http://bit.ly/39FMvxV HOW TO KEEP YOUR HEAD IN THE CLOUD Jim Ryan, President & CEO of Flexera I believe that in 2020 the industry is finally going to wake up and realize what a complete mess cloud spend truly is. Most people conflate cloud with being cheaper and easier, and in many instances, that's true. But sometimes it's far more economical to stay where you are with bricks and mortar. Many companies quickly rush to the cloud without really thinking through the consequences. My recommendations for any CIO or CFO presented with cloud options is to pause, take a breath, and understand exactly what business problem you're trying to solve. I certainly don't believe the cloud is more expensive in every case, or that it's a bad alternative, or it's something that's going to go away. Cloud isn't a fad. But I do believe it's a little bit overhyped. I'm always reluctant whenever I hear any buzzword. "Digital transformation" sounds great. How can anyone argue against digital transformation? It's like arguing against peace. But when it comes to leading digital transformation, you need to step back and decide what you're trying to accomplish.
  • 10. IGEL TECHNOLOGIES - http://bit.ly/31M1gMC CLOUD WARS - THE RISE OF DAAS Simon Townsendis the chief marketing officer for IGEL • The year ofVDI is 2020, andVDI is spelled WVD. Microsoft WindowsVirtual Desktop (WVD) will take the cloud workspace market by storm. In fact, I expect that it will take off much faster than anyone expects, shipping more than 5,000,000 licenses in 2020.Why? The Microsoft Azure-based Desktop-as-a-Service (DaaS) solution offers Microsoft customers an easy migration path from traditionalWindows on individual endpoint devices toWindows in the cloud. And it's not just about the technology (say that to yourself again!) Simple virtual desktop licensing and new DaaS- friendly features like multi-session Windows 10, make WindowsVirtual Desktop a logical, economical and safe choice. Plus, you can bet given Microsoft's success withOffice 365, Microsoft will put some serious muscle behind its new entry to the DaaS market. • It's not just about Desktops... Deploying applications continues to plague organizations and Microsoft AppAttach,Amazon AppStream, Liquidware, Droplet Computing and layering technologies from other ecosystem vendors will be an interesting area to watch.With the ability to securely deliver "legacy Windows" desktop applications to any computer or provide new ways to deploy application sets to common non persistent images, these technologies will play a major role in the move to virtual desktops. Other, new DaaS and application delivery as a service solutions, such as Nutanix Frame and Workspot also offer new ways to consume both applications and desktops from the cloud. • The cloud supremacy battle will intensify. Amazon Web Services, Microsoft Azure and Google Cloud will each be clamoring to secure the greatest market share, particularly with enterprises. As a result, we'll see many announcements of multi-billion commitments to these vendors. Likewise, you'll see an increasing pressure for software vendors to offer truly cloud-agnostic solutions so that customers can retain choice and be free from cloud lock-in.
  • 11. KASPERSKY - http://bit.ly/2vuZ9B2 ADVANCED PERSISTENT THREATS IN 2020 - ABUSE OF PERSONAL INFORMATION AND MORE SOPHISTICATED ATTACKS ARE COMING • The abuse of personal information: from deepfakes to DNA leaks After a number of personal data leaks that happened in recent years, the number of personal details available made it easier for attackers to perform targeted attacks, based on victims' leaked info. In 2020, threat actors will dive deeper, hunting for more sensitive leaks, such as biometric data. • False flag attacks reach a whole new level. These attacks will develop further, with threat actors seeking not only to avoid attribution but also to actively lay the blame on someone else. Commodity malware, scripts, publicly available security tools and administrator software, mixed with a couple of false flags, where security researchers are hungry for any small clue, might be enough to divert suspected authorship to someone else. • Ransomware shifts toward targeted threats. Attackers will focus more on organizations that are likely to make substantial payments in order to recover their data. A potential twist might be that, instead of making files unrecoverable, threat actors will threaten to publish data that they have stolen from the victim company. • More infrastructure attacks and attacks against non-PC targets. Determined threat actors have, for some time, been extending their toolsets beyondWindows, and even beyond PC systems. VPNFilter and Slingshot, for example, targeted networking hardware. • Personal information abuse grows, armed with AI. It is very similar to some of the techniques used for driving election advertisements through social media.This technology is already in use and it is just a matter of time before some attackers take advantage of it.
  • 12. KONICA MINOLTA - http://bit.ly/2vpX7lu THE EVOLUTION OF PRIVACY AND THE ROLE OF MSPS Marco Maggio, All Covered VP Strategic Strategies, Konica Minolta Our role, our value and our existence as an MSP will change dramatically over the next few years.When you think about the traditional role of an MSP to date, it has been solely focused on proactively managing a physical network with servers, PC switches, routers, etc. Now, as more organizations encroach a server-less environment with access from any device from anywhere at any time, the focus of an MSP will continue to shift to improving clients' data experience. As all MSPs reinvent our value proposition to our clients, the ability to prepare them for rapid technology shifts will certainly keep us on our toes and help them focus on their desired business results and let us leverage our world-class expertise to effectively manage the technology.
  • 13. LIQUIDWARE - http://bit.ly/2SjB5Ki READY OR NOT, DESKTOPS ARE GOING CLOUD, AND CLOUD STAGING WILL INCREASE Jason E. Smith is VP of Product Marketing for Liquidware Major organizations will continue to adopt cloud hostedWindows desktops in 2020, and it's no longer a matter of "if" but "when" that will happen.The leading enabling platforms - AmazonWorkSpaces, MicrosoftWVD, and Nutanix Xi Frame - are now mature enough, and the use cases now are too prevalent, for massive desktop cloud adoption not to happen. 2020 will continue to see large customers adopt these platforms, as well as Citrix and VMware cloud desktop transformations.The question you need to ask yourself right now is, "Is my organization'sWindows desktop enterprise ready for the shift?" Let's be clear, not all desktops will be good candidates for cloud hosted desktops this year, but many clear uses cases are obvious candidates for these emerging desktops. In particular, the easiest use cases are adopting cloud desktops first, such as call centers and task worker type use cases. Just likeVDI, additional use cases will follow, including knowledge worker type jobs. Knowledge worker adoption is exactly where the cloud hosted desktops will see exponential adoption.
  • 14. NUODB - http://bit.ly/2HkxftS "DIGITAL TRANSFORMATION" IS NOT HOT, BUT IT INFRASTRUCTURE MODERNIZATION IS CHANGING FAST Ariff Kassam, CTO, NuoDB In 2020 everyone will be tired of the term "digital transformation" (if they aren't already), and yet organizations will still be trying their best to make it a reality.While "digital transformation" heard frequently, it's really just another way of describing how organizations are modernizing IT infrastructure so they can scale their services more rapidly and bring new products and services to market faster. In short, it's all about agility. No matter what you call it, it's more than a passing trend. It's a critical factor for business survival. As organizations continue to modernize applications and improve business agility, many are reviewing their cloud adoption strategies. Here are my top three predictions for what that will look like in 2020: 1. Microservices and containers will dominate new development 2. Kubernetes adoption will rise for stateful applications 3. Multi-cloud deployment ramps ups
  • 15. SCALYR - http://bit.ly/2UNNEiK EMERGENCE OF PERFORMANCE INFORMATION PLATFORMS Kevin Woods is Head of Product Marketing at Scalyr The costs and complexities of managing performance data today inhibits use, which means organizations are underperforming their full potential.There is nothing in the laws of physics or of business that keep these problems from being solved. If you face competition for customers in your industry, then the cost of doing business without a PIP is high.You may underperform across every aspect of the customer's experience, spend more money to deliver the experience than necessary, and take longer to correct problems, thus impacting customer loyalty, trust, usability and brand value.A leap ahead of the competition happens with insights into customer needs, system behaviors, capacity requirements, and trouble spots, creating new business advantages in the new year. It is possible to ingest and cost-effectively store performance data and instantly access and search data in real time. Collecting and searching performance data has been too slow and expensive because first generation architectures are limited in scale and speed.The rise of second generation architectures provide affordable scale and provide a reason to celebrate as we roar into the 2020s.
  • 16. SIOS TECHNOLOGY - http://bit.ly/37kp5fP CLOUD-NATIVE DEVELOPMENT EFFORTS WILL BECOME PERVASIVE ACROSS THE INDUSTRY - FROM ENTERPRISES TO VENDORS Frank Jablonski, VP of Global Marketing at SIOS Technology As the cloud continues on its inexorable track to IT dominance, 2020 will witness players from all across the IT industry accelerating their cloud-native development efforts.That includes the cloud service providers and their enterprise customers, of course, but also application and system software vendors, as well as system integrators. Enterprise DevOps teams will seek to take full advantage of the cloud's agility by re- architecting their application/technology stacks specifically for the cloud environment. IT departments regularly use a "lift and shift" approach to migrating applications to the cloud, but owing to some differences between private and public infrastructures, the effort still requires some changes to ensure meeting desired service levels.After the initial wave of migration is complete, DevOps will drive re-architecting their application/technology stacks to a cloud-native implementation to take further advantage of the cloud's greater efficiency, reliability, scalability and affordability. Application and system software vendors will endeavor to deliver greater value and higher reliability by integrating robust high availability (HA) and disaster recovery (DR) features into their solutions. Most applications today require the customer to provide these protections separately, and most enterprises do this for all their applications with a general-purpose HA/DR solution.A high priority for integrating HA/DR features will be eliminating limitations, such as the dependencyWindows Server FailoverClustering (WSFC) has on shared storage, which is not available in the cloud. Microsoft addressed this limitation with Storage Spaces Direct, but S2D works only in a single datacenter, and not across availability zones, making it unsuitable for truly mission-critical applications.
  • 17. SOLARWINDS - http://bit.ly/2SjlFFI BACK TO THE BASICS - AVOIDING DISASTER THROUGH GOOD CYBERHYGIENE Thomas LaRock, Head Geek, SolarWinds Whether it's spear-phishing, malware, or ransomware, criminals find new ways to attack and compromise businesses. In 2020, to combat these threats and avoid low-hanging-fruit vulnerabilities, organizations will realize the need to prioritize best practices for good cyberhygiene and training for everyone from entry-level staff to C-suite leaders.This includes simple employee best practices, such as leveraging password managers and account takeover prevention tools, to following the 3-2-1 backup rule (three copies of a data set in two different formats and one copy must be stored offsite) to critical end-user trainings to prevent ransomware and phishing attacks. I also expect to see an evolution in the way we think about cybersecurity: moving from more of a hardware security focus to a broader digital security focus, to encompass the swath of personal data existing online and potentially being hacked or breached. We're already beginning to see tech pros' acknowledgement of this changing landscape with a greater focus on security-based skillsets.The recent SolarWinds® ITTrends Report 2019: Skills forTech Pros ofTomorrow revealed 54% of respondents considered SIEM and threat intelligence the second most important technology for career development by weighted rank. Hackers, viruses, and intelligent malware are all part of today's hostile cybersecurity landscape, and the adoption of good cyberhygiene will help organizations better prevent and prepare for security threats.
  • 18. SPYCLOUD - http://bit.ly/39Kthb7 THE DEATH OF THE PASSWORD ROTATION POLICY Ted Ross, CEO and co- founder, SpyCloud The standard 90-day password change policy has long been an accepted industry best practice for keeping enterprise networks safe from harm. Only a small inconvenience to the user, changing login credentials at a regular frequency promised to provide protection from threats and breaches that could wreak havoc on business. While this approach may have kept criminals guessing in the past, continuing to rely on this dated approach to password management is detrimental to your security posture. Today, the average internet user has logins for ~200 sites. It's no surprise that most people just use the same (or a variation on the same) password across multiple sites and accounts. When users are put on the spot to come up with a new password every three months, the desire to reuse or tweak one from the past is understandably strong.The problem?The more often people change their passwords, the higher the chances of them using one that is already exposed. And criminals are waiting patiently to try their list of compromised passwords every ninety days - again and again until they successfully take over the account. Because of this, the forced 90-day password rotation actually plays into the hands of the criminal. So, what's the safe bet for the enterprise? Only force a password change when a user's password has been compromised. Drop the regularly scheduled password changes and use an automated ATO prevention product to securely check employee passwords against a regularly updated corpus of exposed passwords. Using this approach, users will only be required to change passwords when necessary. It's much less annoying than forced password rotation policy and it's much safer. "I love arbitrarily rotating my password," said no one ever. And this year, we are finally seeing the policy being questioned. We expect that in 2020 we'll continue to see enterprise security teams happily moving away from this decrepit security policy.
  • 19. STACKROX - http://bit.ly/31Od7dh AS KUBERNETES MATURES, SECURITY EVOLVES INTO SAFETY Ali Golshan, CTO and co-founder,StackRox There are a number of factors you will need to consider to glean the most value from Kubernetes as its ecosystem continues to mature. • Kubernetes Maturity Means Businesses Can Build Bigger, BetterThings The results of CNCF's first full Kubernetes audit revealed that Kubernetes is foundationally secure and fully functional. But it also forced Kubernetes users to to take a closer look at potential vulnerabilities, configuration issues, and other weaknesses. Up to this point, a lot of organizations were running Kubernetes to build and test applications, or run in environments that didn't have external exposures. They didn't have mission-critical applications with web- facing services exposed. But this is changing, quickly.The pattern towards the maturity of Kubernetes is similar to other technologies. Virtualization went through something very similar in the early 2000s. Public cloud went through it from roughly 2008-2012. Kubernetes is following a very natural progression. • Orchestration Consolidates around Kubernetes A lot of companies have gone down the path of DevOps, building and using containers and microservices. As a result, workloads are getting more complex, and companies are getting a much better sense of the functionality they need from the container ecosystem. The Kubernetes ecosystem is very rich, and as more companies find value in using Kubernetes as a container orchestrator, they will adopt more solutions in the ecosystem. These advances mean we'll see increasingly complex workloads running in Kubernetes. We're seeing a pattern where different types of workloads are becoming possible because of Kubernetes. This proliferation is particularly true among companies building SaaS solutions - these applications are data heavy and very complex. These applications also lend themselves well to wider adoption of service mesh.
  • 20. STORMAGIC - http://bit.ly/2QSBDEN HOW THE 'EDGE-OLUTION' WILL EVOLVE THE STORAGE MARKET Bruce Kornfeld,General Manager - Americas, StorMagic More data is being created at the edge than ever before. IT continues to find that it is more efficient and cost-effective to process and manage data at the location that it's being generated.This mass movement away from expanding corporate datacenters and public clouds is reshaping and transforming the storage landscape. Here's a list of 2020 market predictions that StorMagic envisions based on this "Edge-olution": 1. Stemming from yesterday's Big Data craze, Artificial intelligence (AI) and Machine Learning (ML) mature, and remain hot topics. AI and ML spikes and fuels global data explosion and the need for storage. Both consume data from various different sources and attempt to correlate and identify patterns in disparate data sets, creating data upon data. 2. Smarter management tools emerge to administer the edge environment of tomorrow. Solution simplicity and speed are the top requirements for staff managing hundreds, thousands, or even tens of thousands of edge locations. 3. High availability and security requirements soar at the edge due to regulations, and to avoid downtime impact. As edge computing technologies continue to mature, datacenter class features like encryption with key management, fault tolerance and five nines of availability, are now demanded in edge offerings. 4. Blockchain use cases evolve. As blockchain becomes more mainstream, its potential impact on edge computing could be massive. Edge locations require new ways of handling security, management and data protection due to the massive number of sites that now require IT attention. Blockchain is a natural fit to help solve these issues because of its distributed nature and the ability to leverage a massive number of instances to track information without dependence on a central location.This could dramatically change the way IT manages edge computing sites.
  • 21. STYRA KUBERNETES AUTHORIZATION IN 2020 Chris Webber, VP of Marketing at Styra There will be three ways to think about authorization in a Kubernetes and cloud native world in 2020: define it, decouple it, and make it declarative. • Define: Define your authorization policy—what can do what, who can do what—with your legal team, your IT security team, your compliance team. Get that figured out up front and you’re going to save yourself a world of hurt on the back end, when you get into production. • Decouple: Don’t waste time integrating authorization or hand-building it into your app or into your infrastructure. From Kubernetes to service mesh into the app itself, find a way to get the authorization decisions externalized. • Declarative: Use those downstream APIs to do the enforcement using a policy engine to do the context-aware decision-making.You’ve got everything you need in the apps of those APIs in the environment, in the infrastructure.Take advantage of them.Work in a declarative way. Define what can’t happen so you don’t have to worry about what could happen.
  • 22. UNIT4 - http://bit.ly/2uHdXw3 PLATFORM AND PEOPLE EXPERIENCE WILL BECOME FRONT AND CENTER FOR ERP Claus Jepsen, Deputy CTO at Unit4 As we look at what is to come in the new year, we are compelled to think about the results of trends and the predictions we made for 2019.We find ourselves reminiscing about different technologies, like AI and chatbots, that we continued to develop, adopt and bet on. In 2020 we will see these technologies, and others, being adopted for the first time or for more mature organizations, filling specific gaps. As with digital transformation, we will see different levels of implementation whether by vertical, organizational size or specific industries with a taste for innovation. We will see greater emphasis in three main areas - digital assistants and AI; increased adoption of hybrid cloud and the human aspect of the technology.
  • 23. VEEAM SOFTWARE - http://bit.ly/2vr5mOk DATA ACCESSIBILITY AND SPEED WILL BE ESSENTIAL TO BUSINESSES Dave Russell, Vice President of Enterprise Strategy at Veeam From an IT perspective, we have seen two major trends that will continue in 2020.The first is that on-premises and public cloud will increasingly become equal citizens. Cloud is becoming the new normal model of deployment, with 85% of businesses self-identifying as being predominantly hybrid-cloud or multi-cloud today. Related to this are the issues of cybersecurity and data privacy, which remain the top cloud concerns of IT decision makers. In 2020, cyber threats will increase rather than diminish, so businesses must ensure that 100% of their business-critical data can be recovered. Here are some of the key technology trends that businesses will look to take advantage of and prepare for in the year ahead. 1. Container adoption will become more mainstream. 2. Cloud Data Management will increase data mobility and portability. 3. Backup success and speed gives way to restore success and speed. 4. Everything is becoming software-defined. 5. Organizations will replace, not refresh, when it comes to backup solutions. 6. All applications will become mission-critical.
  • 24. VEMBU TECHNOLOGIES - http://bit.ly/2Smsarq A CENTRALIZED BACKUP SOLUTION IS A MUST Nagarajan, Vice President of Product Management, Vembu Data has become an important asset of an organization.The complexity involved in gathering, storing and protecting the data is enormous. Businesses require a centralized backup and disaster recovery software that can protect the data stored in any type of infrastructure, recover the data in minimal time to ensure business continuity. In 2020, cyber threats will be on a constant rise rather than decreasing and it is imperative for businesses to protect their data. Here are few trends businesses need to look out for in 2020: 1. Cloud Data mobility 2. Focus more on Disaster Recovery 3. Artificial intelligence in Data Centers 4. Increase in adoption of containers 5. Having a centralized backup solution is going to be crucial
  • 25. VMWARE - http://bit.ly/2ULnBZj WHAT WE CAN EXPECT FROM ENTERPRISE TECH Chris Wolf, VP of the Advanced Technology Group, Office of the CTO, VMware This past decade has seen a boom in enterprise technology, from the massive growth of cloud computing to distributed edge workloads, 5G networks and more.What could the next year, the next decade hold? InVMware'sOffice of the CTO, we are continually noodling on new ideas and discussing them in partnership with numerous leaders within our customer base and partner landscape. Based on those conversations, here's what I see as not too far off on the horizon. 1.The Dawn of Hybrid Apps 2. Solutions at the Edge Come to Life 3. Specialized Hardware as a Shared Pool 4.The First StepsToward Intrinsic Security 5. Big Ideas for Small Devices 6. Machine Learning for the 99 Percent 7. Further Cloud Disaggregation 8. Shared Services Platforms
  • 26. ZENOSS - http://bit.ly/37o9XxO AI AND OTHER TRENDS IMPACTING INFRASTRUCTURE MONITORING Brian Wilson, Chief Customer Officer, Zenoss 2019 saw many major strides in AI adoption, particularly in the IT Ops arena, that were fueled by the need to tackle challenges around drawing meaningful insights from large sets of raw infrastructure data. Most IT projects involving AI invariably end up doing data manipulation or aggregation by setting up models of data ingestion - typically, without thinking about the business needs first. Looking ahead to 2020, IT leaders and CIOs will spend more time assessing the real value of theirAI bets. 1. AI - Fading Into the IT Fabric 2. Emergence of Cloud Marketplaces as B2B Resellers 3. Emergence of CIOs With DevOps Backgrounds 4. SaaS - All of theTime
  • 27. ZERTO - http://bit.ly/2SpsZjn A YEAR FOR RESILIENCE Avi Raichel, CIO, Zerto By now, most companies have already begun their digital transformation journey. In so doing, they've learned one important lesson: you can't become digital without deploying one or more cloud infrastructure architectures.With that in mind, cloud usage will continue to grow in 2020 and become a strategic part of any IT transformation modernization process-be it via hybrid cloud, multi-cloud or a different combination environment.Organizations will continue looking for solutions that will enable this complex architecture to connectedly run between on-premises data centers and multiple cloud solutions. Additionally, cyberthreats will continue to be a major, strategic risk for companies in 2020, especially those going through a digital transformation.These risks include loss of productivity, loss of revenue, loss of customers and severe-often irreversible- damages to the brand.The more digital your company becomes, the more you lean on your IT staff.This tight correlation means that whenever there is a disruption to your IT, it becomes a disruption to your whole business. Consequently, IT resilience will become increasingly invaluable to companies as they undertake-and complete- their digital transformation journeys. In 2020, we anticipate a continued shift to a more fully digital business model and expect the vitality of cyber resilience, IT resilience and business resilience to follow suit.
  • 28. READ 430+ EXPERT PREDICTIONS AT http://bit.ly/2QVorPI