With end users really beginning to look for a tangible return on their investments, there's likely to be a marked change in IT security solutions come the end of next year. According to John Todd, the new world order in 2003 will be driven by the desire for – and the benefits directly associated with – policy compliance.
As far as the IT industry is concerned, the past two years have been difficult to say the least. Although 2003 is not likely to witness the industry emerging from the wilderness, it should see the beginning of a new world order.

2003 will likely be remembered as the year when the IT industry – and in particular its IT security strand – finally came of age.

That said, all security solutions purchased must be seen to deliver demonstrable returns on investment, not to mention a centralisation solution for many disparate environments, geographies and technologies. No small feat.

An all-embracing strategy
The need for an all-embracing IT security strategy should form the driving force behind next year's new world order.

IT budgets for 2003 will be spent on policy compliance solutions which bring about the security of corporate data and integrity. Solutions that ensure an organisation is meeting its legislative and Governmental standards. Solutions that enable a corporate organisation to transact in a secure and trusted manner because of an adherence to these mandatory policies.

More importantly, perhaps, 2003 will witness the development of centralised IT security solutions that really deliver, and provide a tangible return on investment.

The reason behind all this is actually quite simple. It's down to corporate evolution. Organisations are now realising that it's not enough to simply 'dig the moat'. They realise that enterprise perimeters are porous. Managers in the blue chip sector need to dig their moat, protect the drawbridge and then know exactly who is entering their IT domain.

Just as importantly, they must ascertain exactly what these 'visitors' will need to access while they are there, and how they'll go about their business when 'on the inside'.

The end user is King
In acknowledging that the user is King, organisations realise that they need to protect their vital resources, and the data users will want to access. The most logical and effective way to guard the 'crown jewels' is by enforcing policy compliance – and implementing proactive policy management.

Policy compliance brings three major advantages to the organisation. First, control. Second, compliance with legislation. Organisations must comply or die. Third, resource provisioning. Using the fundamental ethos of policy compliance, blue chip end user companies may effectively deliver IT resources to a multi-faceted and diverse community.

In 2003, policy compliance will form the true backbone of most organisations' IT security strategy, and will be driven from the Boardroom right down through the enterprise.