MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--BDNA, the leader in delivering the industry’s most authoritative enterprise IT data, today released its top 10 predictions for the enterprise in 2016. The report forecasts the top IT trends that will shape the landscape of enterprise IT and the businesses it supports.
While the Internet of Things industry continues to boom, BDNA predicts a growing need to manage, secure and operate non-traditional assets in the enterprise. The Big Data quandary will continue as IT managers expand their focus to software security, BYOD management and the rise of the Chief Data Officer.
“In 2015, we saw the maturation of Big Data, broader cloud adoption and a growing embrace of the Internet of Things,” said Walker White, president of BDNA. “Amid this continued progress, newer trends are beginning to emerge. Our predictions for 2016 outline how various IT habits will flourish or flounder, as well as new trends that organizations need to be mindful of in order to get ahead of their competitors, embarking on a successful year of innovation and promise.”
By being aware of and embracing evolving enterprise priorities, IT managers will be better equipped to compete and thrive in their spaces throughout 2016. According to BDNA, in 2016 the top 10 trends in enterprise IT will be:
1. BYOD Management: It Will Get Worse Before it Gets Better
With Gartner predicting that half of employers globally will require employees to bring their own device for work purposes by 2017, the enterprise will need to prepare for formatting inconsistencies, security holes and the potential for software audits – calling into question the cost-effectiveness of executing BYOD policies. Enterprises will need to implement new security measures, tracking installments and increasing use of cloud software, before the trend’s full potential can be realized.
2. Increasing Focus on Software Security
As the annual number of data breaches continues to grow, companies will look for new solutions to take proactive measures to protect themselves. Many corporations are using software that is past its end-of-life support date, putting them at increased risk of a hack. In 2016, C-level executives will refocus their cybersecurity strategy to identify vulnerable software still in the enterprise and take steps to eliminate it.
3. Maturation of the Internet of Enterprise Things
This year saw the birth of the Internet of Enterprise Things with smart devices entering the workplace for the first time, and in 2016 we will watch it mature as IoT technology spreads through the business lifecycle, from manufacturing hubs to the scions of Silicon Valley. Companies will seek ways to manage, secure and operate non-traditional IT assets as the IoT industry explodes and becomes immersed throughout the enterprise.
4. Big Data Quandary Continues as Companies Try to Understand its
Today’s Big Data phenomenon can be compared to data warehousing when it first started about 15 years ago – the data collected was useless until it was put into the right context for solving specific business operations problems. Big Data is similar in the sense that it provides the raw materials to provide significant insights, but has no value without the right tools to analyze it. Some strides are being made in data analytics, but Big Data is still far from the panacea that has been promised.
5. New Awareness of Medical Device as an Avenue to Exploit Enterprise
Smartphones, smartwatches, smarthomes – the world as a whole is becoming “smarter,” with the IoT onslaught now spilling over into medical devices, allowing patients and doctors to track information like heart rate, blood pressure and glucose levels, all in real-time. The problem is that these devices now collect incredibly sensitive personal data, which must be zealously secured to keep it from falling into the wrong hands. In addition, every new connected device is yet another potential path for hacking a given network. Developers are working at a furious pace to create hack-proof protections, but more awareness is needed to incentivize industry-wide standards that will uniformly secure connected medical devices.
6. Asset Management is Finding its Level On-Premise and in the Cloud
Whether it’s files shared through Dropbox, a company’s internal files or your personal music collection, the sky is the limit for uses for cloud computing. But enterprises cannot do everything in the cloud, and must maintain their on premise practices even while migrating more and more processes to the cloud. In 2016, IT asset management will marry the two worlds to give enterprises better ways to manage their hybrid systems.
7. Need for More Insight into Open-Source Asset Terms
Open-source software is a playground for developers and their organizations, able to be modified to best fit their business needs. However, growing concerns about security vulnerability and compliance issues – especially in the government sector – have put a bit of a damper on the trend. Many also fail to realize that open-source software has licensing restrictions just like traditional software assets. Moving into 2016, open-source users must become fully educated about the license requirements associated with their assets, and software developers need to provide transparency around what can and can’t be done with their code.
8. IoT Spending to Continue to Grow
With the uptick in connected devices, including the adoption of wearables and smarthomes, IoT spend is going to continue to rise. According to a recent Gartner report, 6.4 billion connected “things” will be used in 2016, driving $235 billion in spending – an increase of 22 percent over 2015. Despite the spotlight currently shining on the consumer IoT market, IoT in the enterprise will become an increasingly important vertical for IoT spend and innovation as it proliferates throughout the business world.
9. IT Enterprises See Technology Adoption as a Risky Business
Today’s technology environment is bringing constant innovation, but its fast-paced nature – coupled with the economic ups and downs of the past decade – has made companies increasingly hesitant to take on the risk of adopting fledgling technologies. But the extent of this defensive posture is approaching its peak, getting in the way of innovation and limiting its benefits. In 2016, the level of risk avoidance practiced in IT decisions will begin to scale back as organizations realize there is no reward without some inherent risk.
10. The Rising Profile of the Chief Data Officer
Traditionally relegated to the wings, the CDO has taken on an increasingly vital role within enterprise IT just as data has become a central focus, and in 2016 this trend will lead to a significant restructuring of the C-suite. To extract maximum value from this analytics-, security- and asset-focused role, the CDO should report directly to the Chief Information Security officer – a position that itself needs to have a direct line to the CEO to recognize the importance of better data for security and for an organization’s overall IT posture.
BDNA creates the most authoritative enterprise IT data. Armed with this invaluable information, enterprises will make the best decisions possible, lower costs and risks as well as accelerate the pace of their business. To produce the most relevant results, BDNA maintains Technopedia, the most complete, current and reliable content repository about hardware and software. This catalog is the foundation from which BDNA creates the highest quality enterprise IT data in the industry, which in turn results in visibility, insight and information enterprises can trust. Venture backed and based in Mountain View, California, BDNA operates globally with customers across all segments and vertical markets. For more information, please visit www.bdna.com.