Connect with us

Hi, what are you looking for?


Management & Strategy

Symantec’s Security and Storage Predictions for 2011

Symantec today announced its predictions for what to expect in 2011 in the security and storage space. Hardly a surprise, the security giant says cloud, virtualization, mobile security and social media will be the hot topics and trends for the year. Here’s what Symantec Predicts for 2011:

Symantec Logo

New Technologies, New Challenges

Symantec today announced its predictions for what to expect in 2011 in the security and storage space. Hardly a surprise, the security giant says cloud, virtualization, mobile security and social media will be the hot topics and trends for the year. Here’s what Symantec Predicts for 2011:

Symantec Logo

New Technologies, New Challenges

As technologies become smarter and faster, the threats to these technological assets follow suit. For example, the exponential consumer adoption of smart mobile devices will increasingly result in these devices making their way into enterprises through the back door, blurring the lines between business and personal use, and driving new IT security models to market in 2011. Although cyber criminals have shown little interest in mobile devices in the past, as devices grow more sophisticated and as a handful of mobile platforms corner the market, it is inevitable that attackers will target mobile devices in 2011 and that mobile devices will continue to grow as a source of confidential data loss.

Gap in Virtual Machine Protection

A similar challenge exists with the widespread adoption of virtualization. Although many companies believe the information and applications within their virtual infrastructure are protected, many IT administrators will face the harsh reality that they are not in 2011. The rapid adoption, fragmented implementation and lack of standardization of virtual infrastructures will continue to expose gaps in the security, backup and high availability of virtual environments. Although virtualization decreases server costs, organizations are realizing that virtualization is simultaneously increasing management and storage costs, and without a plan to protect these environments, they may not realize the full return on investment. (Ten Criteria for Evaluating Virtualization Security Solutions)

Taking Control of Information

The exponential level of data growth is impeding organizations’ ability to effectively manage and recover data. In 2011, storage administrators must regain control of information, lose their “pack-rat” mentality and categorize what information is most important for retention purposes. Otherwise, storage costs will continue to skyrocket, and organizations will face extensive recovery times and be unable to comply with regulatory compliance standards, including privacy laws, and e-Discovery.

Advertisement. Scroll to continue reading.

Adding to the complexity is the use of social media to improve communication and productivity throughout an organization. Although social media will continue to change the way we collaborate in 2011, IT organizations will also need to understand how to protect and manage these non-standard applications for recovery and discovery of business information that is communicated in these channels. Social media archiving will grow in importance as companies unleash the power of social business but maintain archiving as a form of control to reduce information risk. Additionally, as data goes “mobile” and becomes less centralized, regulators will start cracking down in 2011, which will drive organizations to increasingly implement encryption technologies, particularly for mobile devices.

The Next Generation Data Center of 2011

As organizations continue to manage with limited resources in 2011 while facing more intelligent and specific threats, IT will take a more strategic and innovative approach to solving problems. While software will continue to drive innovation, 2011 will bring new delivery models in response to customers’ need to ease IT operations. Cloud computing, hosted services and appliances are examples of increasingly attractive delivery models that will change the landscape of today’s data center by providing organizations with flexibility and ease of deployment.

Organizations will leverage public and private clouds as they become highly available in the coming year. Tools will also emerge to manage this new, complex storage environment and to help IT administrators better understand and capture information about unstructured data that resides within it. This will allow IT to fully utilize the benefits of the cloud and intelligently report to management. While customers opt to take advantage of cloud messaging services, they are still finding that they can drive greater cost out of the discovery process by keeping their archives in-house. This hybrid cloud archiving model allows organizations to use hosted messaging services while keeping their archives on-premise. This way they can combine email with other on-premise content sources like PSTs, IM and SharePoint that are relevant to the discovery process.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.


Twenty-one cybersecurity-related M&A deals were announced in December 2022.