Cloud access security brokers are the top security technology trend for 2014, according to analyst firm Gartner.
The top 10 technologies for information security were highlighted at the Gartner Security & Risk Management Summit in National Harbor, Maryland.
In top spot, analysts named cloud access security brokers, which are on-premises or cloud-based security policy enforcement points between consumers and providers of cloud services.
Gartner said, in many cases, initial adoption of cloud-based services has occurred outside the control of IT, and cloud access security brokers offer an organisation increased visibility and control as its users access cloud resources.
Adaptive access control, a form of context-aware access control that acts to balance the level of trust against risk at the moment of access, was named in second spot.
According to Gartner, adaptive access management architecture enables an organisation to allow access from any device, anywhere, and allows for social ID access to a range of corporate assets with mixed risk profiles.
Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve and maintain effective security and risk management
Neil MacDonald, Gartner
In third place, Gartner named pervasive sandboxing or “content detonation”.
Some attacks will inevitably bypass traditional blocking and prevention security protection mechanisms, in which case it is key to detect the intrusion in as short a time as possible to minimise the hacker’s ability to inflict damage or extract sensitive information, said Gartner.
Many security platforms now include embedded capabilities to run or “detonate” executables and content in virtual machines (VMs) and observe the VMs for indications of compromise.
This capability is rapidly becoming a feature of a more-capable platform, not a standalone product or market, said Gartner.
“Organisations are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication. Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the nexus of forces, which brings mobile, cloud, social and big data together to deliver new business opportunities,” said Neil MacDonald, vice-president and Gartner Fellow.
“With the opportunities of the nexus come risks. Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve and maintain effective security and risk management programmes that simultaneously enable business opportunities and manage risk,” he said.
Cloud access security brokers
Adaptive access control
Endpoint detection and response systems
Big data security analytics at the heart of next-generation security platforms
Machine-readable threat intelligence, including reputation services
Containment and isolation as a foundational security strategy
Interactive application security testing
Security gateways, brokers and firewalls to deal with the internet of things (IoT)
Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Related content from ComputerWeekly.com
RELATED CONTENT FROM THE TECHTARGET NETWORK