Through Rajesh Ganesan, Vice President, ManageEngine
The role of IT has grown dramatically over the past two years as organizations are forced to rethink and reorganize the way they work. In the future, the focus will once again be on harnessing technological advancements to meet the business challenges presented by the remote workforce.
âAfter the pandemic, hybrid work will be an expectation if not the norm in most organizations around the world. This means that cybersecurity, AI, automation and analytics will play an increasingly important role in organizational efforts to support this way of working, âsaid Rajesh Ganesan, vice president of products at ManageEngine.
Here are ManageEngine’s top five forecasts in the IT management space for 2022.
1- Organizational insights will become immediately exploitable
When information is presented directly in a line-of-business application, the chances of an organization to act on it are much higher than when that same information is presented in stand-alone business intelligence software. For example, when information on project effectiveness is available in project management software, it is easier for project managers to relate results to their day-to-day work and implement actions to correct inefficiencies. .
The way we train and deploy AI models is expected to change dramatically over the coming year. With more sustainable techniques such as meta-learning, transfer learning, and causal AI expected to complement deep learning, AI and ML will eventually become integral parts of corporate workflows. contextual analysis.
2- The mesh model of cybersecurity will provide better protection in the age of the hybrid workforce
As employees continue to access organizational resources from different locations, traditional network-based security becomes obsolete. The security landscape has evolved in part due to the accelerated shift to the cloud and the use of unchecked personal devices, which has made many organizations highly susceptible to cyber threats and insider attacks.
In this scenario, a cybersecurity mesh model, with its central principle of zero trust, will gain popularity. The cybersecurity mesh model is a distributed approach in which smaller individual security perimeters are built around people or objects acting as access points, giving IT teams greater control over security.
3- IT business models will continue to evolve to support the hybrid workforce
Organizations had to stumble in implementing their business continuity plans in response to the first lockdown. But with employees preferring long-term hybrid work, further changes will need to be made to operating models to ensure that hybrid work is streamlined and sustainable.
Despite self-service portals, the productivity of remote workers is still disrupted when an incident occurs. In the age of hybrid work, aspects such as hands-off service management that can handle machine-resolvable incidents, digital experience monitoring to ensure high availability and constant improvements to end users, and increased adoption of desktop as a service and VDIs will be more important than ever.
4- AIOps and IT automation will be essential elements of enterprise technological architectures
The growing ubiquity of AI, supported by the operational improvements this means that AI will continue to consolidate itself as a cornerstone of the technological architecture of organizations. IT managers will become more dependent on AIOps and intelligent automation, where problems are detected using algorithms and resolved automatically before they disrupt productivity or network operations. AIOps-based surveillance will play an important role in forecasting, capacity planning, combating alert fatigue, and maintaining the security posture of an organization.
5- Lack of cybersecurity skills could force organizations to turn to service providers
There is likely to be an imbalance between the supply and demand for skilled cybersecurity employees. To meet their evolving needs, organizations will increasingly use the services of MSSPs and managed detection and response providers. For example, the increasing number of remote employees, the adoption of the cloud, and the need to adhere to compliance regulations make IAM a tedious process for most organizations. As many organizations do not have the skills and resources to implement an IAM solution, more organizations will look to Identity Provider as a Service to fulfill this role.