Given the events of September 11, companies will be increasing their spending on information protection and privacy, suggests new research from Gartner, Inc. Current information security, privacy and risk management problems require new or improved solutions, which can provide new domains for theoretical research or commercial exploitation. In 2002, Gartner says companies can anticipate these information security trends
- Advanced provisioning will develop as authorization, authentication, privilege and identity management tools overlap in 2002 through 2004, and will converge in products and customized solutions for large enterprises in 2004 through 2006.
- Biometric authentication will remain in the advanced technology evaluation stage through 2002; privacy concerns will delay full-scale public and private- sector implementation of face recognition technology, although niche and high- risk application use will increase. Fingerprint-based authentication will be largely limited to special cases, with fewer than five percent of new personal computer procurements requiring integrated biometric readers through 2004.
- Web content will increasingly be protected through content validation tools, digital signatures and digital rights management in the face of frequent, high-profile Web content compromises that will erode confidence and threaten intellectual property. Eighty percent of commercial Web sites, and 60 percent of government and nonprofit Web sites, will use one or more of these tools by 2003.
- Malicious-code detection and handling tools will change from predominantly signature-based solutions to predominantly behavioral-based solutions by 2005, partly due to the growth of Web services and increasingly active "malware."
- Managed-security services will grow in importance, particularly for small to midsize businesses, as the skills needed to manage security continue to be in short supply. However, market consolidation will occur in 2003 through 2004, with larger vendors swallowing the first, innovative providers, which will bring credibility to the market.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access