Cloud access security brokers are the top security technology trend for 2014, according to analyst firm Gartner.
The top 10 technologies for information security were highlighted at the Gartner Security & Risk Management Summit in National Harbor, Maryland.
In top spot, analysts named cloud access security brokers, which are on-premises or cloud-based security policy enforcement points between consumers and providers of cloud services.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Gartner said, in many cases, initial adoption of cloud-based services has occurred outside the control of IT, and cloud access security brokers offer an organisation increased visibility and control as its users access cloud resources.
Adaptive access control, a form of context-aware access control that acts to balance the level of trust against risk at the moment of access, was named in second spot.
According to Gartner, adaptive access management architecture enables an organisation to allow access from any device, anywhere, and allows for social ID access to a range of corporate assets with mixed risk profiles.
In third place, Gartner named pervasive sandboxing or “content detonation”.
Some attacks will inevitably bypass traditional blocking and prevention security protection mechanisms, in which case it is key to detect the intrusion in as short a time as possible to minimise the hacker's ability to inflict damage or extract sensitive information, said Gartner.
Many security platforms now include embedded capabilities to run or "detonate" executables and content in virtual machines (VMs) and observe the VMs for indications of compromise.
This capability is rapidly becoming a feature of a more-capable platform, not a standalone product or market, said Gartner.
“Organisations are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication. Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the nexus of forces, which brings mobile, cloud, social and big data together to deliver new business opportunities,” said Neil MacDonald, vice-president and Gartner Fellow.
“With the opportunities of the nexus come risks. Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve and maintain effective security and risk management programmes that simultaneously enable business opportunities and manage risk,” he said.
Gartner’s top 10 technologies for information security
- Cloud access security brokers
- Adaptive access control
- Pervasive sandboxing
- Endpoint detection and response systems
- Big data security analytics at the heart of next-generation security platforms
- Machine-readable threat intelligence, including reputation services
- Containment and isolation as a foundational security strategy
- Software-defined security
- Interactive application security testing
- Security gateways, brokers and firewalls to deal with the internet of things (IoT)