Featured

Blog

What We Can Expect to See in 2020 from 5G, Mobile Security Controls

John Aisien | Jan 6, 2020

What We Can Expect to See in 2020 from 5G, Mobile Security Controls

2019 was a big year for the Blue Cedar team as we continue to empower enterprises to adopt and secure their enterprise-level applications. As we step into 2020, we anticipate yet another year of exciting developments here at Blue Cedar, as well as some compelling advancements in the technology landscape that will enable even further innovation.  

Below are a couple of trends I anticipate will unfold as we head into 2020:  

The BYOD and CYOD trend enterprises have adopted for their employees will create a need for application-specific security:     

67% of employees report using a personal device at work to some degree. As enterprises continue to adopt a BYOD (bring your own device) or a CYOD (choose your own device) strategy for their employees, there will be continued push pack from employees who are required to relinquish control over their mobile devices and the private data stored on them. As the stakes for privacy management become higher and higher from endless breaches (54% higher in 2019 alone) and increased regulations, like GDPR and CCPA, we’ll see enterprises deploy more effective means of privacy control for its employee’s personal devices (like application-specific security, as opposed to only device-level). This will mitigate privacy invasion for employees and enable tighter vulnerability controls for the enterprise, all while still providing necessary corporate data and accessibility to the end-user via the mobile device of their choice. 

AdobeStock_263924573

5G will bring about a new era of true edge compute capabilities that call for equally sophisticated security. -   

5G is expected to have 1.1 billion device connections by 2025. This rise and widespread deployment of 5G will facilitate an era of true edge compute power. Enterprises will leverage 5G’s speed and agility and the mobile nature of edge devices to store and access sensitive corporate data from any location. With that evolution will be an integral need for better, more efficient edge device security that can withstand the next generation of computational power and is capable of managing and protecting mobile devices at the edge.   

The low-code trend will be overrun by no-code solutions that enable citizen developers and allow highly skilled IT professionals to focus on larger issues at hand. -  

Low-code solutions will become less attractive as full no-code solutions continue to surface and enable developers to focus less on rote, repeatable problems (like SaaS vendors enabling customers to make extensions on their platforms or automated security integration) and more on sophisticated projects that are not able to be automated. As no-code solutions empower more citizen developers to automate some of those simpler problems, we will see a new generation of software innovation emerge as high-value developers narrow in on the more complex issues that burden the broader technology ecosystem. 

DevSecOps will shift left as enterprises prioritize security and employee privacy: 

A reported 53% of online users are currently more concerned about their online privacy compared to a year ago. With heightened privacy concerns, there will be an increased focus on addressing both corporate security and user privacy concerns much earlier in the  development cycle. Dev teams will start investigating tech that provides granular controls that address both security and privacy, such as app level security. In parallel, teams will also investigate how to automate security integration into the development lifecycle. Cybersecurity programming skills are in short supply and there is no cost effective way for teams to address the growing dev demands through solely manual coding. Having security automatically integrated addresses the mundane nature of certain repeatable processes, freeing up developer time. More importantly, automation that brings in security tech early in the lifecycle allows the entire solution to be tested at once, again saving dev cycles. If security isn’t shifted left (i.e., brought into the dev cycle early) testing will have to be repeated once security is added in. 

It will be an exciting year for enterprise technology, and we’re thrilled to be a part of the movement as we continue to watch the evolution unfold. As those advancements continue, we hope to see an equally secure technology landscape in 2020 and beyond. 

Let's Stay In Touch

All our latest content delivered to your inbox a few times a month.

Blue Cedar

Copyright © 2020 Blue Cedar. All Rights Reserved. | Privacy Policy Various trademarks held by their respective owners.

Blue Cedar

325 Pacific Avenue, San Francisco CA, 94111
Phone: (415) 329-0401

Payment Method: All Major Credit Cards and Checks