IT security skills remain red hot, but just how many security positions are open now? What do top security pros earn? We round up instructive data
7 IT leaders urge automation in these key areas
The Enterprisers Project asked top IT executives to provide the areas all modern CIOs should have automated by now, if they haven't already. Here's what they said:
1. Technology Operational Environment
John Marcante, CIO and managing director of Vanguard's Information Technology Division, Vanguard
2. Deliver to mobile devices
Curt Carver, vice chancellor and chief information officer for the Board of Regents of the University System of Georgia
3. Focus on manual processes
Stuart Kippelman, corporate vice president and chief information officer, Covanta
4. Ask customers and watch them work
Ron Webb, executive director of Open Standards Benchmarking, Stats Hub, and Information System, The American Productivity & Quality Center
5. IT on demand
Uri Sarid, chief technology officer, MuleSoft
"Why choose just one area? The credo for IT should be, 'Work yourself out of your job.' Ideally, you want to automate everything by making IT a self-service PaaS or iPaaS. There’s no reason IT should have to stand up every new app or integration. You don’t want IT creating a new environment or sandbox every time developers start a project. It should focus on creating services that enable everyone else to do their work. The way to do that is with IT on demand."
6. Data archiving
Ty Rollin, chief technology officer, Mobiquity
"Automation has eliminated the human in the loop for moving data across the entire fleet of systems to near real-time backups, and then cost effective archives. Data archiving must be automated across all tiers of storage, including all databases, file systems, web servers, and big data sets."
Dr. Nicko van Someren, chief technology officer, Good Technology
"Automating the analysis of all the log data created by various systems can save IT a fortune. This sort of log management can find issues with both security and service more quickly than manual analysis, not only shutting down attacks more swiftly but delivering better up-time and reducing costly support calls."