Now that security breaches are constantly in the headlines, boards of directors are becoming more involved in advocating for preventative security. 2016 will be the year organizations seriously invest in preventing enterprise security risks and managing critical infrastructure.
As critical data travels across networks to, from, and within cloud-based resources are most valuable corporate secrets are more vulnerable to attack. In 2016 ensuring the security of our data in any network will be vital to our survival. As proprietary enterprise data moves outside of the traditional, protected data center and the IT silo, organizations will focus on new ways to secure critical data in any location.
The article Executive Viewpoint 2016 Prediction: Cohesive Networks – The Year of Serious Investments in Enterprise Security Risk Prevention across Virtualized Environments first appeared in Virtual Strategy Magazine
By Ryan Koop
IoT Security will Follow Network Security Trends… Only after Many Trials and Errors
The digital life of our “things” is just beginning. Our things will soon spread out into the infinite interior of the Internet and its information and social spaces. The refrigerator will soon connect to our smartphones while we grocery shop. Fluffy’s activity tracker will alert the cat door to open.
Both makers and consumers of “things” will begin to see the importance of a secure network when they look at what happened to Sony, Ashley Madison, OPM, TalkTalk and read about more recent network vulnerabilities.
In 2016, IoT security professionals will find a way to deliver the promise of IoT without giving away the details of our personal life and our transactions to media, brands, or governments.
Smart IoT security professionals will take a page from cloud computing IaaS providers’ current playbooks and secure networks that information travels on/across. In order to attract enterprise and serious users, security must be an essential part of connectivity.
As soon as corporations had mobile employees the VPN, or virtual private network, emerged and became a mainstay for millions of people on the go to connect back to headquarters. Then, as corporations’ servers began moving to the cloud the VPC, or virtual private cloud, appeared and has become a mainstay for 10’s of millions of virtual machines in motion. Look for 2016 to deliver a way to connect the personal, family, and community equivalent of IoT networks into federated, encrypted secure ways similar to a VPN.
With the most intimate parts of our selves – our things – potentially exposed through IoT networks, we will need to work quickly to find a way to consolidate how we connect and secure all of our things into a network we control.
As Cloud Economics Take Hold in 2016, we will Focus Next on Data Ownership Economics
Goldman Sachs projects that spending on cloud computing will grow at a 30% CAGR through 2018. Finally, in 2016, businesses of all industries and sizes will increase their use of servers, networking and applications in public cloud.
Proof of the economic viability of cloud computing can be found in a UC Berkeley RAD Lab report. The study estimates that the data center costs for cloud providers are 80% lower than the costs to run a private enterprise cloud. As organizations see the value of “rented” services in cloud computing, the realization will spread to all types of “rented” and “shared” services – security must come first.
With the emergence of services on demand, many aspects of our lives are more temporary and ad-hoc than ever before. Apple’s new iPhone “upgrade plan” is really a leasing model similar to most luxury cars. We now stream entertainment rather than buy CDs and DVDs. Freelance “gig” work is on the rise over traditional lifetime careers.
Not only will the economics of compute ownership change, in 2016 the concept data ownership will shift as well. For example, who owns the data that is collected by a Nest thermostat? Do you own your data or only the hardware? Does Google have a right to the data it creates? And who controls its interactions, connections, and data transfers?
Public cloud users have already trudged through this territory of a shared security responsibility model. Hopefully we can learn from past discoveries and see the benefits and inherent risks of shared data ownership models in 2016.
2016 will be a big year for sorting out the details of a new data ownership model. Will it require lawsuits to win our data back? Government investigations? Watch and see.
Software-based Security will Save the Data Center
The average time it takes for a company to detect breaches is 229 days; an unfortunate 4% slower than reported in 2012. In the December 2013 Target breach, the security team reportedly did not react to network alerts until federal investigators warned the organization a full two weeks after the initial breach. The hackers had ample time to access other critical applications and extract data once inside the network.
In the past, a “private cloud” and a virtualized on-premise data center were essentially the same thing. Very soon will see how the underlying software will change the way we differentiate between a data center and a cloud environment.
In 2016 a difference will be who manages the data, not where the servers are. It’s not where but who. Who really manages the digital infrastructure: you or a third party? Who controls the hardware, licenses, middleware, physical security, and the data center network?
Part of the allure of managed infrastructure, private clouds, and distributed resources is the cost savings and ease of software-only solution. 2016 will see more virtualized environments leverage the benefits of software to deliver networking capabilities – primarily security services – that were previously too complicated or too expensive to implement.
The article Executive Viewpoint 2016 Prediction: Cohesive Networks – The Year of Serious Investments in Enterprise Security Risk Prevention across Virtualized Environments first appeared in Virtual Strategy Magazine on December 8, 2015
By: Margaret Valtierra