Story image

Personal cloud growing in importance

06 Aug 15

Personal cloud is shaping how employees operating across their digital lives, and it growing in importance as it intersects with IT initiatives. 

That’s according to industry analysts Gartner, who says digital workplace managers responsible for building the digital workplace will be increasingly challenged as the personal cloud continues to evolve.

"The personal cloud is the collection of content, services and tools that users assemble to fulfil their personal digital lifestyle needs across any device,” explains says Stephen Kleynhans, research vice president at Gartner. “Each user's personal cloud is unique and evolving, as the user's daily needs change and as vendors and products come and go," he says. 

"Looking forward, we see continued upheaval and challenges from the blending of personal and corporate digital tools and information within each user's life."

The next wave of the personal cloud will be shaped by two key trends, Kleynhans says. These trends are increased access to personal information and increased intelligence applied to the user experience and against the user's information. 

Already, new photo apps have emerged that apply robust recognition algorithms to personal photos stored in cloud services, to automatically tag locations, people and events.

"The rate of change is accelerating as new technologies like Windows 10, ubiquitous sensors, wearables and smart machines alter the landscape and further blur the lines between consumer and enterprise computing," says Kleynhans. 

"By 2018, 25% of large organisations will have an explicit strategy to make their corporate computing environment similar to a consumer computing experience."

Kleynhans says there are three specific areas where the next wave of the personal cloud will impact the enterprise.

VPAs will increasingly become the anchor point for users' personal clouds and have broad access to both user and enterprise information, creating potential security challenges for the digital workplace manager

Virtual personal assistants (VPAs) are emerging as a critical new service that can mask the differences between multiple services and apps, and in the past few years all three of the big smartphone platforms (Apple iOS, Google Android and Microsoft Windows Phone) have added a VPA capability to their platforms. Kleynhans explains.

VPAs often have access to not only personal data, but also potentially sensitive corporate data as information about meetings, employee travel and business operations may be exposed to the VPA. 

Kleynhans says Gartner expects that VPAs will evolve to have different contexts - a personal one, a corporate one and perhaps even a group or team one. 

“This will enable IT organisations to exercise some control over one context while still permitting a level of freedom to the user,” says Kleynhans. “Some organisations will be tempted to block use or VPA access to organisation data. However, this will reduce a VPA's effectiveness and simply encourage employees to bypass IT controls.”

Internet of Things and wearables will exponentially expand each user's personal cloud and raise new challenges for EUC and digital workplace managers in overseeing security and privacy

With the emergence of sensors, beacons and wearable technology, users are increasingly connecting the physical world into their personal cloud, expanding the number of endpoints, the types of devices, the usage models, and the amount and type of data that make up their unique collections. 

“This flood of real-time data further blurs the line between what is work and what is personal, and it is exacerbating the security and privacy issues for both users and enterprises,” says Kleynhans.” Security, particularly authentication, is increasingly critical to ensure the information is not falling into the wrong hands.”

Strong authentication technology will become increasingly critical across a user's personal cloud as part of an overall data protection strategy, causing end-user computing managers to rethink their current authentication strategies

“Critical to all of these new capabilities will be a reliable and secure way for users to ensure the security and integrity of data within their personal clouds,” Kleynhans explains.  While strong authentication technologies are only the first step toward longer-term approaches to securing both user and corporate data, Kleynhans says they do form an important initial step in the chain.

“Over the long term, this situation will change, and identity will be established in the device using strong multifactor methods, then used to establish secure sessions with various services,” he says. 

Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
Preparing for the future of work – growing big ideas from small spaces
We’ve all seen it: our offices are changing from the traditional four walls - to no walls. A need to reduce real estate costs is a key driver, as is enabling a more diverse and agile workforce.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
How AI can fundamentally change the business landscape
“This is an extremely interesting if not pivotal time to discuss how AI is being deployed and leveraged, both in business and at home.”