Security has always been what keeps organizations up at night, whether large, medium or small. The complexity of attacks, the increased reliance on data-driven decisions, and the increase in attack surfaces have proven to have a profound effect on driving security spending.
Here are some specific trends that will shape the security market in the near future:
As cloud adoption grows, so too will hybrid or multi-cloud environments. Security vendors should be in lockstep with organizations undergoing cloud migrations because as these migrations continue, companies are uncovering traditional solutions that were adopted in silos. This affords opportunities for the security vendor to help them centralize their security management or rip and replace legacy tools. Organizations will be looking for consistency in their security no matter the environment – this means making sure that your security solutions integrate well in a complex hybrid environment and ensuring that the speed and manageability of data stored in the cloud is not inhibited.
With GDPR nearing the one-year mark, we’ve seen nearly $60 million levied on companies who have failed to meet the EU GDPR’s data protection rules with the vast majority imposed on Google. The Google fine proves to be a cautionary tale for organizations that fail to comply, which will only drive security spending, particularly for global organizations.
In the U.S., the California Privacy Law goes into effect in January 2020. Companies who do businesses in California will be required to disclose personal information it collects about a Californian and purposes for which it is used. This law promises to be the first of a wave of similar state data protection regulations. Washington State is reportedly considering their version as well. As these regulations become more popular across the country, expect increased demand for tools that increase data visibility and the ability to retrieve said data, across hybrid environments.
This year will be the year we see 5G really coming online, albeit slowly. The major carriers have all announced launches of wireless networks this year and the phones to run on them. 5G will have ramifications far beyond mobile devices, as the greatly increased connectivity will mean more devices coming on to networks. This will inevitably lead to increased attack surfaces and more vulnerabilities coming from vertical industries. The opportunities landscape for security vendors in the world of 5G is promising, as 5G brings with it an increased ability to implement automation in security, share threat intelligence and detect threats – features that will resonate with organizations who will be at the forefront of 5G in 2019.
While IoT hasn’t taken off as many have predicted over the last several years, we’ll see continued adoption of both network and endpoint security. Over the next year, expect high interest in manufacturing, oil/gas and transportation, particularly as 5G spreads. Expect more interest for PKI management solutions from customers in the above-mentioned vertical industries. As the security impact of IoT grows—both in its sophistication and in the sheer number of potential vectors—organizations will need help from the security vendors to deal with the scope of the threat landscape. Helping your customer identify their vulnerabilities, assess their risks and implement AI into their security posture will be needed.
While it’s important to listen to a customer’s pain points when it comes to security, the major IT trends of today often make it difficult for them to anticipate vulnerabilities. The growing prevalence of IoT, multi-cloud environments and increased connectivity mean security vendors will have to guide the discussion around how their customers can best reduce their risk posture.
Leveraging analytics and AI (in addition to traditional security tools) to tackle these challenges in a way that’s easy to use and non-disruptive to end-users will resonate with them. As the cyber attacks grow in sophistication, so will our ability to protect against the threats. Keeping your customers in lockstep with this evolution will be key.
Questions? Visit ecs.arrow.com/cybersecurity to learn more or request a security evaluation!