Weekly Roundup – Cloud Computing in 2015, ECM Market Disruption and Security Predictions

2015 Forecast: The Sun is Out for Cloud Computing

Looking ahead into 2015, cloud computing will continue to evolve based on its growth in 2014. Businesses can continue to push cloud usage forward to solve problems and plan strategies, especially with Big Data available as a result of cloud applications.

“Gartner not only named cloud one of the top technology trends for 2015: It also proclaimed cloud as the new standard for application development. According to Gartner, ‘Cloud is the new style of elastically scalable, self-service computing and both internal applications and external applications will be built on this new style.’”

Read the entire article


What’s disrupting the traditional ECM software market?

The demand for simpler ECM processes has risen with market disruption. These disruptions are cloud computing, file-sharing devices, and mobile devices, with convenience being a common factor.

“With the cloud and mobile devices, data is now seeping out of the enterprise through emailed copies of files, copies of files saved to the cloud and so on. This reality has prompted companies to have to rethink data security and how to best save, share and collaborate on enterprise content.”

Read the entire article


Security predictions 2015: Encryption increases in enterprises

Security has never been more important for businesses with the amount of data available digitally and recent hacks of major companies. Outside of limiting access to a small group of employees, security factors directly related to software should be managed by developers and considered when upgrading software. The security features of software in 2015 will heavily affect purchase decisions.

“Data privacy is now part of the daily conversation of organizations,” says report co-author Heidi Shey. ‘It’s not just the job of the privacy officer or delegated to the security team. It’s pretty much involved in all parts of the organization. And the planning isn’t merely to meet regulatory requirements,” she added, “but how to handle data, how to communicate privacy policies to customers and making sure those policies align with technology and internal policies.”

Read the entire article