The Top 3 Tech Trends Shaping 2011
Three overarching, interrelated trends -- cloud consumption, virtualization and mobility -- present themselves as key industry themes for 2011. All have been increasing in importance over several years, and this year, all will reach a tipping point for businesses and information security providers alike.
To prepare your organization for the cumulative impact of these trends, you will need to consider new and better solutions for next-generation firewalls, application control and visualization, bandwidth management, secure remote access, clean VPN and wireless, and data leakage prevention.
Trend 1: Cloud Consumption
Taking applications to the cloud remains one of the big trends in 2011. Organizations will spend 30 percent more on public IT cloud services, with 33 percent of midsize U.S. firms embracing cloud resources, according to IDC. However, at the same time, non-business-related websites now consume up to 15 percent of available corporate bandwidth, and that figure is rising sharply. As your organization relies more on the cloud to drive lower capital expenditures and improve efficiencies, you will need to deal with two potentially unforeseen impacts.
First, the on-premises bandwidth used to access the cloud from the WAN is limited. Therefore, you need to prioritize bandwidth for -- and user access to -- critical applications over lesser-prioritized traffic that is not paramount to the business. To accomplish this, your bandwidth management policy must be able to make increasingly sophisticated distinctions between mission critical cloud-based applications (e.g., Salesforce.com, Oracle, etc.), streaming and latency-sensitive applications (e.g., teleconferencing and VoIP), and business- and personal-use social media and peer-to-peer applications (e.g., Facebook, BitTorrent, etc.).
Next-generation firewalls with application intelligence, control and visualization capabilities can help you identify and control exactly what applications are in use and who uses them -- regardless of port or protocol. Moreover, to control network use properly, you can deploy advanced visualization solutions to view application traffic in real-time and adjust network policy based on critical observations.
Second, by putting critical applications in the cloud, your organization encourages employees to spend more time on the Internet. Unfortunately, they will likely access non-business sites as well as business-related sites, exposing your organization to lost productivity and more malware, botnets, and other forms of malicious attacks.
As your organization relies more on cloud-based applications for productivity and business success, you must be increasingly vigilant against Web-borne attacks. As sensitive data now migrates between corporate data centers and cloud data centers beyond your network perimeter, you can no longer think only in terms of network security, but instead must shift focus to information security: achieving security for all your corporate data and applications, regardless of where they are located.
Over the next year, firewall solutions will increasingly augment and enhance traditional on-box malware signature defenses with advanced cloud-based logic to provide comprehensive protection. Security technologies will continue to evolve, presenting tighter and more manageable security solutions for the borderless network. The scope, scale and performance demands of securing a borderless environment will spur the development of massively scalable security architecture solutions.
Trend 2: Virtualization
Virtualization has grown beyond its early hype and has seen much broader deployment. Businesses have consolidated multiple servers and appliances onto fewer physical machines, enhancing both cost-savings and inter-application performance. By next year, organizations will have virtualized nearly half of all server workloads. At least 14 percent of the infrastructure and operations architecture of Fortune 1000 companies will be managed and delivered internally in a virtualized environment.
Consolidating servers and appliances from physical to virtual environments often runs the risk of undermining implicit security and access barriers that previously existed between isolated applications. You can help preserve this legacy security by deploying next-generation firewalls using deep packet inspection and application control between virtualized server environments.
As your organization pursues on-premise virtualization of mission-critical applications, you will need to scan and secure higher volumes of inbound and outbound traffic at high-speed rates of 10 GB and more. To this end, businesses will require higher performance firewall technologies that feature real-time reassembly-free deep packet inspection, multicore processing platforms, and performance-optimized architecture.
Moreover, as with cloud-based resources, some application traffic will inherently have a greater business value. You can prioritize and control application and user traffic using application-intelligent Next-Generation Firewalls that allow implementation of a granular policy over bandwidth allocation based on application type.
Trend 3: Mobility
Smartphones and tablets such as Apple's iPhone 4 and iPad, or the many devices running Google's Android OS, have been widely adopted by employees as standard business tools. Much in the way that laptops eclipsed desktops in the workplace a decade ago, mobile devices are now the business tools of choice, and there is no going back. Shipments of mobile devices will outstrip PCs in the next year and a half, according to IDC. However, less than a third of enterprises have a multiplatform policy in place, according to the iPass Mobile Workforce Report. As the market for mobile devices will continue to evolve and shake out, you should take a platform-agnostic approach.
In scenarios where mobile devices are accessing corporate resources from outside the company's perimeter, you need platform-agnostic secure remote access to mission-critical resources. Web-based SSL VPN portals can provide platform-agnostic access from virtually any mobile endpoint, including laptops, PDAs and smartphones.
By filtering SSL VPN traffic through a high-performance next-generation firewall, you can establish a clean VPN to secure both VPN access and traffic. The multilayered protection of a clean VPN enables you to decrypt and decontaminate all authorized SSL VPN traffic before it enters your network environment. In addition, you effectively control data leakage by integrating deep packet inspection, email security, and application intelligence and control to identify sensitive data and prevent it from leaving your network.
Alternately, for scenarios where mobile devices are accessing the Internet from within your perimeter, users can deploy solutions that integrate a wireless switch directly into their next-generation firewall to subject all wireless traffic to clean VPN scanning and application intelligence, control and visualization, thereby maintaining both security and application usage efficiency.
It's clear that the year ahead will significantly transform the way you interact with -- and secure -- corporate information resources. Cloud computing, virtualization and mobility will become standard features of this year's business computing, and you will need to be prepared.
Patrick Sweeney is VP of product management at SonicWALL, a provider of next-generation firewalls with reassembly-free deep packet inspection, application intelligence and control with visualization, secure remote access, clean VPN, clean wireless and email security.