null

2018 Trends in DevOps and Cloud Computing

DevOps at its core is a methodology comprised of people, process, and technology, and organizations are quickly taking advantage of its transformational capabilities to knock down organizational boundaries and optimize the flow of work.

This applies to cloud computing, as well, with organizations employing DevOps principles to inject security into all iterative phases of cloud implementations—plan, build, test, deploy, and operate—to reduce costs and better protect data.

Sila sees the following specific trends making an impact this year and beyond.

DevOps

DevOps in enterprises will continue to gain traction, peaking this year. The focus will be around adapting automation standards/utilization and tooling. Organizational and cultural aspects (and how that lends to processes) will continue to be considered, but the focus will be on the nuts and bolts, as well as related key performance indicators to accelerate and measure DevOps adoption.

DevSecOps will continue to gain momentum in the overarching DevOps conversation. Security is continuing to grow in pertinence, and there is a solid home here in the DevOps conversation. Tooling, process maturity, and organizational adherence will only continue to get stronger.

Cloud Computing

Organizations will obtain measurable benefits by investing in optimization and refinement of workloads. Organizations have jumped on the cloud bandwagon, and businesses will continue to migrate workloads. Organizations will now move to optimize and refine those workloads by refactoring designs and architectures, adapting development/release processes, extending security capabilities, increasing availability and redundancy, and identifying cost management techniques.

The intersection of cloud and identity and access management will continue to evolve. There will be continued emphasis on enhancing and strengthening this connection as organizational data, applications, and activities get dispersed across more diverse boundaries. As both the perimeter and attack surface continue to expand across this federated landscape, new and enhanced identity and access management standards and processes must be deployed and leveraged by both cloud-service providers and organizations.