Five Network and Security Trends You Can Expect this Year

Network and Security Trends

As we came to the beginning of 2018, it can be useful to take a look at trends in networking and security that we may see in the coming year. This way, your organization can compare itself to the industry and benchmark itself against its peers and others in the industry. Here are five trends I predict will carry the IT narrative this year.

1. We will see more organizations treating all endpoints and networks as untrusted.

Instead of treating the firewall as a network security boundary, with the wild west of the Internet sitting out there completely untrusted, while treating all of the devices inside the firewall as totally trusted and secure and believing nothing bad can happen inside the private network, I believe we will see a gradual yet consistent move toward the endpoint being the security boundary and all networks, regardless of firewall status, becoming untrusted. While this makes network administration a little more difficult and less transparent at the start, over time I believe one will find it provides numerous security dividends, such as – in principle – limiting the spread of malware that has already overtaken one system and making centralized management much more powerful, as policy engines understand how to touch systems that were previously considered remote and thus unmanageable with traditional tools.

2. Cybersecurity budgets will continue their rapid rise

While simply throwing money at shiny security objects does not (sadly) make you any safer from threats, there is no denying that improving your security profile in any meaningful way usually does involve spending some budget money on devices and services. Much of the low hanging security fruit has already been plucked; what remains requires forking over cash, either to upgrade operating systems, move workloads to more secure locations, purchase better edge protection and threat modeling devices, or third party software to manage disaster recovery. J. P. Morgan Chase, the large financial institution, recently boasted of their billion-with-a-B cybersecurity budget. Few of us can afford that level of investment, but new technologies, edge devices, and value added services from Internet providers can make a significant difference in your organization’s overall security posture, and I firmly believe we will see, in aggregate, much more spending on security than in years past.

3. Cutting costs elsewhere in IT will find a renewed importance in 2018

To pay, either in part or fully, for the increase in cybersecurity budgets, the new mantra in IT in 2018 will be to do more with less. Whether that means decommissioning legacy servers that are expensive to run and maintain in favor of less expensive cloud services that come out of an operating expense budget as opposed to a capital expense budget, or finding new ways to consolidate operations and remove duplicative or unnecessary applications and services, delivering the same or better results for less money will be one of the fundamental charges for IT directors across the globe in the new year. This could come in the form of increased network virtualization, prioritizing projects that have a more immediate business payoff or return of or on investment, and cutting down on wasteful IT spend, particularly with consultants and Service Providers.

4. Wide area network (WAN) bandwidth demand will increase

As more services move to the public or hybrid cloud, more data gets synchronized and transmitted to and from different locations around the globe, and more devices and services come online and consume bandwidth (see: Things, the Internet of), your organization’s links to the global Internet will become more saturated. In 2018 demand for more WAN capacity will grow to satisfy this increased need for network capacity and headroom. There are solutions like software defined wide area networking (SD-WAN) which can bring together multiple WAN links of different mediums and providers and intelligently route traffic among those pipes, and I believe these WAN management solutions will enjoy increased popularity in the new year to come. Other services like increased availability of fiber optic service to the premises and direct links to cloud service providers like Microsoft’s Azure ExpressRoute also fall under this category.

5. Ransomware will continue to be a pernicious threat

I predict ransomware will evolve to become even more brazen and attempt to take advantage of serious vulnerabilities in network protocols and software. We may even see ransomware that attacks software bugs without requiring a user to open an e-mail attachment to deliver its payload. Administrators and IT directors everywhere will need to take stock of their current backup and recovery procedures and make sure that they can restore individual files as well as application servers and web services in as minimal amount of time as possible. Perhaps finding new backup software and services are in order: these vendors find themselves fighting against ransomware as well.

Wrapping it up: I see security (and the attendant backup and disaster recovery tools) and bandwidth as the main themes of 2018 while IT continues to try to deliver more value and return on investment at less cost. 

By Doug Hazelman

Gary Bernstein
Most Dangerous Botnets While it’s no secret that the technical sophistication of cyber-attacks grows exponentially, adversaries often need widespread networks to make it happen. One of the ways to do that is to infect legitimate ...
Stacey Farrar
Document Migrations Require More Diligence Data creation has risen dramatically in recent years and shows no signs of slowing. According to analyst firm IDC, widespread remote work led to a spike of new data in ...
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...
James Corbishly
Teams Sprawl in the Remote Workspace As working from home has become the new everyday norm, with more employers embracing the remote-work model as a new and likely permanent fixture of the employment world, there ...
Jen
VoIP and PBX Phone Systems The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.