Sei sulla pagina 1di 1

CEB Infrastructure Executive Council

Emerging Technology Roadmap


Over 350 IT Professionals from 95 Companies Collaborated to Roadmap
the Adoption of 75 Infrastructure and Operations Technologies

MAINSTREAM ADOPTION TIMELINE


Represents at least one-half of all
companies having a technology deployed
at scale
2015+

ENTERPRISE VALUE

High Value

Medium Value

Low Value

o
H

Capital Cost Efficiency


Operational Cost Efficiency
Effect on Provisioning Speed

Please note: Security uses modified


assessment factors.

DEPLOYMENT RISK

Public Cloud-based
HR solutions

Low Risk

Calculated based on a prescriptive


analysis of six factors where the
technology presents potential risks
to value capture when deployed:

Software Defined Networks (SDNs)


IPv6

2013

VPLS (Virtual Private LAN Services)


4G Mobile Data

2012

Network Fabrics

Network Virtualization
Solutions
SIP Trunking

Access to Support Skills

Self Encrypting Drive


(SED)
Security as a Service

Availability of Mature Management Tools


Security Risk

Rich Media-Live
Streaming

rity
Secu

Runtime Application
Self-Protection

MAINSTREAM BY H1 2012
Storage: Small Form Factor Drives, Solid
State Disk, Backup Storage Deduplication,
Appliance Based Replication

End-user biometrics

Folder Level Encryption

Unified
Communications
Automated
Provisioning
and Tiering
Data Warehouse
Appliances

Bring Your Own PC

Local VDI
Mobile Enterprise
Applications
Primary Storage Data
Deduplication

Fiber Channel over Ethernet

Mac OS X for Enterprise


Desktops/Laptops

Near Field Communications (NFC)

Network Unified Storage (NUS)


In Memory Database
Hybrid SSDs
Management Systems
Big Data
Public Cloud-Based Storage
Storage Solutions
Cloud-based
Archiving for Email/IM

Application Delivery
Controller (ADC)

Content Addressable
Storage (CAS)

End-User Computing: Bring Your Own


Mobile Device, Client-Based Desktop
Virtualization, SharePoint 2010
Network: Virtual Switches, WAN
Optimization Controllers

Microsoft Office 365

Enterprise Social Media Apps

Endpoint DLP

Context Aware Firewalling

Gmail for Enterprise

Desktop and Mobile


Device Video
Application Virtualization

Unified Threat
Management Tools

Fit with Architecture Direction

Blue denotes technologies for which


significant uncertainty exists on value
and risk (30% or more responded No
Opinion).

2014

Identity as a Service
(IDaaS)
Web Application Firewalls

Scalability

UNCERTAINTY FACTOR

Wi-Fi as a
Primary Network

XML Gateway Protection Tools

Marketplace Maturity

Please note: Security uses modified


assessment factors.

2015+

Massively
Multi-Core Servers
Public Cloud-based
Development and Testing
Private Cloud Converged
Private Cloud
Infrastructure
Orchestration
Private cloud-based
Public Cloud-based
Platform-as-a-Service
Disaster Recovery
Public Cloud-based CRM solutions
Private Cloud-based
Infrastructure-as-a-Service

Effect on Availability

Medium Risk

4G Enterprise WAN

Public Cloud-based
Infrastructure-as-a-Service
Low Energy Servers

Effect on Performance

Ne
tw
or

Public Cloud-based Platform-as-a-Service

Enterprise Functionality Benefits

High Risk

< 50%
Adoption
by 2015

ks

Calculated based on a prescriptive


analysis of six factors where the
technology has the potential to
demonstrate enterprise value:

d
u
lo
C
Public Cloud-based
/
Supply Chain Solutions
g
Public
Cloud-based
n
i
Finance Solutions
t
s
Public Cloud-based Databases

Com
puting

2014

se r

2013

En
d-U

2012

Technologies by Mainstream Adoption Timeline, Value, and Risk

NoSql
Linear Tape File
System (LTFS)
Application Centric Storage

Security: Mobile Device Management


Tools, DMZ-Perimeter Networking,
GRC Tools
To view the definitions for the technologies,
please refer to the Glossary for the 2012 to
2015 Emerging Technology Roadmap on
the IEC website.

Storage

Partial List of the 95 Participating Companies

2012 The Corporate Executive Board Company.


All Rights Reserved.IEC1034411SYN

www.executiveboard.com
Client Site: www.iec.executiveboard.com

Potrebbero piacerti anche