{"id":21931,"date":"2012-12-13T21:50:50","date_gmt":"2012-12-14T02:50:50","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-04T11:40:03","modified_gmt":"2021-07-04T15:40:03","slug":"top-five-it-trends-for-2013","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/top-five-it-trends-for-2013\/","title":{"rendered":"Top Five IT Trends for 2013"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20190203223657\/https:\/\/www.psychics4today.com\/fake-psychics-and-mediums\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-109027\" title=\"Top five IT trends for 2013\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?resize=121%2C100&#038;ssl=1\" alt=\"Top five IT trends for 2013\" width=\"121\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?resize=768%2C636&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?resize=1024%2C848&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?w=1181&amp;ssl=1 1181w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-7.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" \/><\/a>Ian Kilpatrick, who has the longest job title I have ever seen, chairman of international value added distributor, specialists in market development for secure IP infrastructure solutions and convergence at <a title=\"Wick Hill Group\" href=\"https:\/\/web.archive.org\/web\/20181111162130\/https:\/\/www.wickhill.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wick Hill Group<\/a> shares his vision of the top five IT trends for 2013. In the article, Top five IT trends for 2013 at <em><a title=\"ITnewslink\" href=\"https:\/\/web.archive.org\/web\/20200928204650\/http:\/\/itnewslink.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ITnewslink<\/a><\/em> he shares his predictions.<\/p>\n<p><strong><a href=\"http:\/\/web.archive.org\/web\/20120723071857\/http:\/\/xangati.com\/blog\/the-abcs-of-byod-part-three-criteria-for-change\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109029\" title=\"BYOD Man\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-3.jpg?resize=83%2C100&#038;ssl=1\" alt=\"BYOD Man\" width=\"83\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-3.jpg?resize=125%2C150&amp;ssl=1 125w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-3.jpg?resize=62%2C75&amp;ssl=1 62w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-3.jpg?w=425&amp;ssl=1 425w\" sizes=\"auto, (max-width: 83px) 100vw, 83px\" \/><\/a>1. BYOD &#8211;<\/strong> He says the first IT Trend for 2013 is BYOD. BYOD is now an unstoppable, user-driven wave that will continue to make a major impact on the IT world in 2013 and beyond.\u00a0 2013 will see companies trying to integrate BYOD into their networks.<\/p>\n<p>He also speculates that we can expect to see the growth of <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"Windows to Go\" href=\"https:\/\/web.archive.org\/web\/20150502112257\/http:\/\/www.microsoft.com:80\/en-us\/windows\/enterprise\/products-and-technologies\/windows-8\/enterprise-edition.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Windows to Go<\/a> secure USB sticks based on <a title=\"Windows 8\" href=\"http:\/\/www.microsoft.com\/en-us\/windows\/enterprise\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 8<\/a>, which provide remote users with the supported version of the corporate desktop. These are available from a limited number of suppliers authorized by Microsoft and include <a title=\"Imation IronKey Workspace for Windows to Go\" href=\"https:\/\/web.archive.org\/web\/20130116053217\/http:\/\/www.imation.com\/en-US\/Mobile-Security\/Mobile-Security-Products\/Secure-Mobile-Workspace\/IronKey-Workspace\/\" target=\"_blank\" rel=\"noopener noreferrer\">Imation\u2019s IronKey Workspace for Windows to Go<\/a>.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20200305070752\/http:\/\/www.air-watch.com:80\/capabilities\/mobile-device-management\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109031\" title=\"Mobile Device Management\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/air-watch-logo-1-e1571011323923-150x73.gif?resize=119%2C58&#038;ssl=1\" alt=\"Mobile Device Management\" width=\"119\" height=\"58\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/air-watch-logo-1-e1571011323923.gif?resize=150%2C73&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/air-watch-logo-1-e1571011323923.gif?resize=75%2C36&amp;ssl=1 75w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a>2. Mobile Device Management &#8211;<\/strong> The next IT trend for 2013 is that <a title=\"Mobile Device Management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device_management\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Device Management<\/a> solutions growth will accelerate in 2013. The growth is due to the rapid growth of mobile devices such as smartphones, tablets, and laptops, but particularly smartphones.<\/p>\n<p>Growth will be strongest for MDM solutions that offer features such as ensuring mobile device usage complies with company security policies, allocating access rights, managing configuration, updating policies, dealing with data leakage issues, and dealing with lost or stolen devices.<\/p>\n<p>A crucial component for the continued growth of MDM solutions will be the clear separation between the management of business and personal data on devices. There are over 100 suppliers in mobile device management many of them are good but niche solutions. The <a title=\"Gartner\" href=\"https:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a> (<a title=\"NYSE : IT\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IT\" target=\"_blank\" rel=\"noopener noreferrer\">IT<\/a>) <a title=\"Magic Quadrant\" href=\"http:\/\/en.wikipedia.org\/wiki\/Magic_Quadrant\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Magic Quadrant<\/a> identifies the strategic leaders, which includes <a title=\" Zenprise\" href=\"https:\/\/www.informationweek.com\/mobile\/citrix-buys-zenprise-what-s-next-in-byod-\" target=\"_blank\" rel=\"noopener noreferrer\">Zenprise<\/a>.<\/p>\n<p><strong><a href=\"http:\/\/ciscorouterswitch.over-blog.com\/article-cisco-enterprise-802-11ac-sooner-not-later-107199694.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109033 size-thumbnail\" title=\"High density wireless\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/802-11ac-wi-fi.jpeg?resize=75%2C75&#038;ssl=1\" alt=\"High density wireless\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/802-11ac-wi-fi.jpeg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/802-11ac-wi-fi.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/802-11ac-wi-fi.jpeg?w=275&amp;ssl=1 275w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>3. High density wireless &#8211;<\/strong> Wireless requirements have been significantly incrementing over the last year making it the third IT trend for 2013. The firm says BYOD has changed both the data transfer and performance expectations of users. However, these expectations have not been met, with many networks still inadequate in their coverage and performance.<\/p>\n<p>The new <a title=\"802.11ac\" href=\"http:\/\/whatis.techtarget.com\/definition\/80211ac\" target=\"_blank\" rel=\"noopener noreferrer\">802.11ac<\/a> standard, with 1 gigabit per second throughput rates, will be a key driver in organizations moving to high-density wireless in 2013. High density wireless will provide companies with high coverage and high performance, supporting business-critical applications and delivering complete site coverage There will continue to be a shift from niche solutions towards more strategic solutions. The Gartner Magic Quadrant identifies <a title=\"Xirrus\" href=\"http:\/\/www.xirrus.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Xirrus<\/a>, which will continue to experience stratospheric growth.<\/p>\n<p><strong><a href=\"https:\/\/clevelandcomputers.com\/services\/data-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109035\" title=\"Data back-up and recovery\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BackupRecovery2.jpg?resize=120%2C73&#038;ssl=1\" alt=\"Data back-up and recovery\" width=\"120\" height=\"73\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BackupRecovery2.jpg?resize=150%2C92&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BackupRecovery2.jpg?resize=75%2C46&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BackupRecovery2.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>4. Data back-up and recovery<\/strong> &#8211; 2013&#8217;s fourth IT trend for 2013 deals with data back-up and recovery. Organizations have been under immense pressure from ever-increasing data volumes, archiving, and compliance requirements.<\/p>\n<p>At the top end, new data replication technologies will have a major impact on data centers in 2013. For smaller organizations, the shift from tape will continue apace. For conservative organizations, the move to disc (and, in particular, <a title=\"RDX technologies\" href=\"http:\/\/www.rdxstorage.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">RDX technologies<\/a> that combine the best of tape and disk) will accelerate. Hybrid back-up to RDX and then the cloud will increase. In volume terms, the lowest move (but in market-hype the biggest) will be significant growth in direct back-up to the cloud. RDX, hybrid, and cloud data backup solutions are available from vendors such as <a title=\" Imation\" href=\"http:\/\/www.imation.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Imation<\/a> and <a title=\"Barracuda Networks\" href=\"http:\/\/www.barracudanetworks.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Barracuda Networks<\/a>.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20151116085243\/http:\/\/www.computing.co.uk\/ctg\/news\/2222510\/education-on-data-loss-needed-more-than-ico-fines-says-quest\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109037\" title=\"Data leakage protection\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak-breach.jpg?resize=120%2C74&#038;ssl=1\" alt=\"Data leakage protection\" width=\"120\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak-breach.jpg?resize=150%2C93&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak-breach.jpg?resize=75%2C46&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak-breach.jpg?w=370&amp;ssl=1 370w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>5. Data leakage protection &#8211;<\/strong> The last Wick Hill Group IT trend for 2013 says that with the growing volumes of data and regulatory bodies&#8217; willingness to levy fines for non-compliance, data leakage protection will continue to be a major cause for concern during 2013. Companies will be looking closely at how to secure and manage their data as their network boundaries spread even wider, with increased use of social networking and BYOD, increased remote access, the rapid growth of wireless, increased virtualization, and the move towards convergence.<\/p>\n<p>Increasingly, organizations will couple DLP products with SIEM (<a title=\"Security information and event management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Security Information and Event Management<\/a>) solutions. DLP concerns will also continue the growth curve for authentication (much of it hosted in the cloud) and encryption, to protect data, both in motion and at rest. Some companies will look to hosted security services and the cloud to cope with an increasingly complex security situation. SIEM and authentication solutions are available from companies such as <a title=\"LogLogic\" href=\"https:\/\/web.archive.org\/web\/20161022145444\/http:\/\/loglogic.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">LogLogic<\/a>, Check Point VASCO, and <a title=\"Safenet\" href=\"http:\/\/www.safenet-inc.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">SafeNet<\/a>.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>So these are not really earth-shattering predictions for 2013, BYOD, MDM, and Wi-Fi are already part of my world. We are doubling our backup capabilities and will be updating from our current McAfee to some sort of DLP<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/networkingnerd.net\/2012\/12\/03\/byod-vs-mdm-who-pays-the-bill\/\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD vs MDM &#8211; Who Pays The Bill?<\/a> (networkingnerd.net)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top five IT trends for 2013 BYOD MDM IEEE 802.11ac DLP, Data back-up<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[2197,1821,32,849,85,1247,1472,82,813,421,1471,1470],"class_list":["post-21931","post","type-post","status-publish","format-standard","hentry","category-business","tag-2197","tag-backup","tag-business","tag-data","tag-gartner","tag-it","tag-mdm","tag-microsoft","tag-mobile-device","tag-msft","tag-xirrus","tag-zenprise"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/21931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=21931"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/21931\/revisions"}],"predecessor-version":[{"id":132403,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/21931\/revisions\/132403"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=21931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=21931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=21931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}