By 2014, IT hiring in major Western markets will come predominantly from Asian-headquartered companies enjoying double-digit growth.
An increasing number of successful Asian companies — particularly from China and India — are enjoying double-digit growth rates and will substantially grow their geographic footprints, making significant investments in major Western markets through 2015. Consequently, these organizations will be responsible for major hiring of IT professionals to support their growth at a time when Western companies will still be coping with the impact of the economic crisis. Exacerbating the disparity between the hiring practices of Western and Asian organizations will be the increased use of industrialized IT solutions, which will further reduce the IT staffing needs of Western firms.
By 2017, 40 percent of enterprise contact information will have leaked into Facebook via employees' increased use of mobile device collaboration applications.
Facebook is one of the top five applications installed on smartphones and tablets, and many organizations are being pressured to permit interlinking with Facebook and similar products, because those products provide a high degree of leverage for new contacts. While many organizations have been legitimately concerned about the physical coexistence of consumer and enterprise applications on devices that interact with IT infrastructure, there has been little discussion about the underlying technologies that permit transfer of information between legitimate enterprise-controlled applications and consumer applications. These interactions are difficult to track, and the technologies to control the transfer are more difficult to build, deploy and manage.Through 2014, employee-owned devices will be compromised by malware at more than double the rate of corporate-owned devices. Corporate networks will become more like college and university networks, which were the original "bring your own device" (BYOD) environments. Because colleges and universities lack control over students' devices, they focus on protecting their networks by enforcing policies that govern network access. Gartner believes that enterprises will adopt a similar approach and will block or restrict access for those devices that are not compliant with corporate policies. Enterprises that adopt BYOD initiatives should establish clear policies that outline which employee-owned devices will be allowed and which will be banned. In the BYOD era, security professionals will need to diligently monitor vulnerability announcements and security incidents involving mobile devices and respond appropriately with policy updates.
Check Out Our Best Services for Investors
- $2.5+ million portfolio
- Large-cap and dividend focus
- Intraday trade alerts from Cramer
Access the tool that DOMINATES the Russell 2000 and the S&P 500.
- Buy, hold, or sell recommendations for over 4,300 stocks
- Unlimited research reports on your favorite stocks
- A custom stock screener
- Model portfolio
- Stocks trading below $10
- Intraday trade alerts