iTnews
  • Home
  • Features
  • Technology
  • Security

Industry views: Look for more spending on convergence, insider threats

By David Shapiro on Jul 18, 2006 8:19PM

The speed of change in IT security is intense and often seemingly chaotic. Security solutions today must constantly morph to reflect not only the shifting needs of customers, but also the advancing capabilities of security threats. The proliferation and progression of DoS attacks and phishing sites, to name a few, demand new means to detect and block criminals. Senior executives, meanwhile, want simplicity and better command and control over the many security solutions they implement. Despite this ever-changing landscape, there are, however, a number of general trends that, from our view as investors, are likely to organize and drive development of IT security products and services over the near and intermediate term.

One broad theme is that the internal threat to the organization has come to be seen as every bit as serious as threats from outside. IT security may be able to create the greatest perimeter in the world, but if it's compromised by an embittered ex-employee, a financially motivated identity thief or a current employee falling victim to carelessness, security officials must be able to deal with these realities.

Thus, activity is increasing "behind the firewall." Security administrators want to control and monitor all users' digital communications (not just email), as much as they want to detect and block intruders. Tools and technologies that help set up policies to protect and ensure proper internal data usage, constrain users from certain areas and audit activity to enforce security are currently areas for potential growth and investment.

The perimeter itself is also changing, with the current static firewall evolving into an active, next generation firewall solution. This new firewall ultimately will resemble an intrusion prevention system in the way it detects and blocks undesirable users and activities. We see firewalls and intrusion prevention systems merging together as vendors seek to deliver on the promise of unified threat management (UTM).

Convergence of this kind is an often touted theme. And consolidation of security from end-point solutions into a more central product, particularly the router, continues to take hold. This long-developing trend, we believe, is finally reaching market readiness, as vendors are beginning to promote UTM solutions. However, the challenge of maintaining necessary throughput is still an issue, which perhaps highlights another area of opportunity. Whether routers and switches will produce best-in-class security is, at this time, unknown. But routers with significantly centralized security features will have a role in the IT security market.

Another trend that is likely to continue to unfold is the integration of network and security systems. Today, senior managers outside the IT function want to be able to view and use network security data to evaluate risk and make decisions. Common APIs and standard data interfaces will make possible security management reporting systems that allow senior managers to act on security data with greater ease than ever. In this fashion, the evolution of security data management may resemble systems management applications, and should integrate with these applications and vendors over time, as well.

One final early market idea, and thus perhaps area of investment, that we see today is for security to be provided in the network cloud. In this scenario, large ISPs such as AT&T and BT that provide core trafficking of data and network activity, may look to provide security as a service. Security applied in this fashion before the application level may not be able to handle all threats. But for globe-roaming viruses, node-to-node security provided in the cloud will be a significant and useful addition to a "defense in depth" strategy.

In identifying these trends, we've done more than focus on individual new threats or specific emerging technologies. Instead, we've discussed the places where two or more developments may be juxtaposed and reinforce each other. There's no way to know precisely what tomorrow's data bandits will conceive, or what tomorrow's enterprise executives will demand. But security vendors and customers who look for and incorporate the next wave of significant developments from these sectors will be well positioned to withstand the major changes in IT security for some time to come.

Peter Bollier has been a partner and financial executive with 3i since 1984.

David Shapiro, director, has been with 3i since 2001. He can be reached at david.shapiro@3i.com.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
convergenceforindustryinsiderlookmoreonsecurityspendingthreatsviews

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By David Shapiro
Jul 18 2006
8:19PM
0 Comments

Related Articles

  • Russian businessman made millions in insider trading through hacking, US says
  • ACCC greenlights Google's buy of Mandiant
  • Meraki firewalls blocked Office365 traffic as attempted intrusion
  • Mitsubishi manufacturing controller software inherited OpenSSL bugs
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Australian court finds insurer not liable for ransomware clean-up costs

Australian court finds insurer not liable for ransomware clean-up costs

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

ADHA extends Accenture's My Health Record support deal for $100m

ADHA extends Accenture's My Health Record support deal for $100m

Digital Nation

COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.