Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

2017: Security to focus on data, IoT, cloud and mobile payment systems

Tim Liu, Chief Technology Officer, Hillstone Networks | Jan. 17, 2017
As the new year fast approaches, enterprises continue to adopt new technologies, security will continue to be a priority, especially in the Asia-Pacific region

Security for Cloud
In 2016, we see continuous build-up of hybrid cloud deployments by enterprises and this trend will continue in 2017. This is driven by familiarity and economics of the public cloud, while at the same time a persistence of perception that there is a lack of comparable security in the cloud with that of on-premises implementations. In 2017, we will see more adoption of tools that help enterprises manage security across hybrid clouds. Also for this past year, enterprises have seen increased numbers of cloud related incidents and were using their cloud security investments to address these problems. Visibility is continuing to be critical in understanding security gaps in the cloud. In addition, we will also use tools that ease management problems across heterogeneous cloud deployments, with policy enforcement, identity and access, monitoring and behavior analysis as some of the foci. On another front, enterprises are in different stages of exploring container technology. While we are seeing companies implement security in development and deployment processes, implementing sophisticated security in operations will still not be a top priority for some time.

Security for Mobile Payment Systems
Mobile payment system is gaining popularity, especially with the e-commerce market expected to hit US$1.4 trillion in 2020, and one in five consumers using digital wallets when shopping online. Most mobile payment systems require linking a personal bank account or credit card for direct charges. Today, the level of security of mobile devices are not on par with computers and they are easier to hack and, therefore, breaches are harder to detect. A compromised mobile terminal may leak confidential information related to these accounts or allow unauthorized charges to these accounts. Today, financial institutions are relying on limiting transaction sizes and transaction fraud detection for security purposes. Over time, we will see hackers coming up with new ways to defraud the system.


Security will always be top of mind for years to come for every individual and enterprise, big or small. The challenge will be to keep ahead of the threat landscape and be prepared for when security is breached.  


Previous Page  1  2 

Sign up for CIO Asia eNewsletters.