Five Network and Security Trends You Can Expect this Year

Doug Hazelman

Network and Security Trends

As we came to the beginning of 2018, it can be useful to take a look at trends in networking and security that we may see in the coming year. This way, your organization can compare itself to the industry and benchmark itself against its peers and others in the industry. Here are five trends I predict will carry the IT narrative this year.

1. We will see more organizations treating all endpoints and networks as untrusted.

Instead of treating the firewall as a network security boundary, with the wild west of the Internet sitting out there completely untrusted, while treating all of the devices inside the firewall as totally trusted and secure and believing nothing bad can happen inside the private network, I believe we will see a gradual yet consistent move toward the endpoint being the security boundary and all networks, regardless of firewall status, becoming untrusted. While this makes network administration a little more difficult and less transparent at the start, over time I believe one will find it provides numerous security dividends, such as – in principle – limiting the spread of malware that has already overtaken one system and making centralized management much more powerful, as policy engines understand how to touch systems that were previously considered remote and thus unmanageable with traditional tools.

2. Cybersecurity budgets will continue their rapid rise

While simply throwing money at shiny security objects does not (sadly) make you any safer from threats, there is no denying that improving your security profile in any meaningful way usually does involve spending some budget money on devices and services. Much of the low hanging security fruit has already been plucked; what remains requires forking over cash, either to upgrade operating systems, move workloads to more secure locations, purchase better edge protection and threat modeling devices, or third party software to manage disaster recovery. J. P. Morgan Chase, the large financial institution, recently boasted of their billion-with-a-B cybersecurity budget. Few of us can afford that level of investment, but new technologies, edge devices, and value added services from Internet providers can make a significant difference in your organization’s overall security posture, and I firmly believe we will see, in aggregate, much more spending on security than in years past.

3. Cutting costs elsewhere in IT will find a renewed importance in 2018

To pay, either in part or fully, for the increase in cybersecurity budgets, the new mantra in IT in 2018 will be to do more with less. Whether that means decommissioning legacy servers that are expensive to run and maintain in favor of less expensive cloud services that come out of an operating expense budget as opposed to a capital expense budget, or finding new ways to consolidate operations and remove duplicative or unnecessary applications and services, delivering the same or better results for less money will be one of the fundamental charges for IT directors across the globe in the new year. This could come in the form of increased network virtualization, prioritizing projects that have a more immediate business payoff or return of or on investment, and cutting down on wasteful IT spend, particularly with consultants and Service Providers.

4. Wide area network (WAN) bandwidth demand will increase

As more services move to the public or hybrid cloud, more data gets synchronized and transmitted to and from different locations around the globe, and more devices and services come online and consume bandwidth (see: Things, the Internet of), your organization’s links to the global Internet will become more saturated. In 2018 demand for more WAN capacity will grow to satisfy this increased need for network capacity and headroom. There are solutions like software defined wide area networking (SD-WAN) which can bring together multiple WAN links of different mediums and providers and intelligently route traffic among those pipes, and I believe these WAN management solutions will enjoy increased popularity in the new year to come. Other services like increased availability of fiber optic service to the premises and direct links to cloud service providers like Microsoft’s Azure ExpressRoute also fall under this category.

5. Ransomware will continue to be a pernicious threat

I predict ransomware will evolve to become even more brazen and attempt to take advantage of serious vulnerabilities in network protocols and software. We may even see ransomware that attacks software bugs without requiring a user to open an e-mail attachment to deliver its payload. Administrators and IT directors everywhere will need to take stock of their current backup and recovery procedures and make sure that they can restore individual files as well as application servers and web services in as minimal amount of time as possible. Perhaps finding new backup software and services are in order: these vendors find themselves fighting against ransomware as well.

Wrapping it up: I see security (and the attendant backup and disaster recovery tools) and bandwidth as the main themes of 2018 while IT continues to try to deliver more value and return on investment at less cost. 

By Doug Hazelman

Sebastian Grady

Digital Transformation – Updated Metrics for the Cloud Era

Cloud Era Metrics Undertaking digital transformation means also transforming how IT success is defined, including metrics that address business in the cloud.  With up to ...
Kaylamatthews

What Amazon’s Kendra Means for the AI and Machine Learning Future

Amazon's Kendra Learning Future Most people feel a bit astounded when they type a query into Google and get relevant results in milliseconds. They're probably ...
Google Prog

Working with security researchers to make the web safer for everyone

Working with security researchers What do a 19-year-old researcher from Uruguay, a restaurant owner from Cluj, Romania and a Cambridge professor have in common? They’re ...
Or Lenchner

Using an IPPN to fight ad fraud: your questions, answered

Using an IPPN to fight ad fraud It’s a well-known fact: the internet is a marketer’s dream, offering brands the chance to engage with consumers ...
Robert Van Der Meulen

Focusing on Online Gaming Security During Development

Online Gaming Security Infrastructure Updated article: June 2nd, 2020 There are millions of gamers around the globe and as of 2018, video games generated sales ...
Dan Saks 1

How to Transform to Succeed in the Digital Economy

Succeed in the Digital Economy In today’s increasingly competitive business climate, companies must put digital technologies at the core of their operations. In order to ...
It’s Magic.png