Add to Google

Tuesday, May 29, 2012

Forrester Overview: the Rise and Fall of Information Security Technologies

The popularity of the individual technologies for information security sometimes increases and sometimes decreases. Forrester Research in its report TechRadar bets on five technologies that are at the stage of growth, and five of those, that are dying.

Here are five technologies the popularity of which according to analysts from Forrester will grow in the future years.

1. Audit tools

According to a Forrester research the current implementations of audit tools are not changing too much, but in three or five years they will be widely used because of the growing number of data leaks. Mainly the rising popularity of these tools contributes to the emergence of standards for information security. That's why massive introduction of such decisions is expected in the nearest future.

2. Analysis of malicious software (malware)

The fact that such an analysis is used in incident response and vulnerability management, suggests that in the nearest future (3-5 years) the adoption of such tools will increase. In particular, some more thorough analysis of network traffic is needed due to the constant threats.

3. Network Encryption

Although the function of network encryption is present in the IT-infrastructure devices such as routers and switches, Forrester notes that because of the numerous requirements of standards for information security including encryption and data protection, demand for a separate application is now at the stage of growth. In one to three years, we will see a qualitative change in this area (a new stage of development), but without pressure from regulators this technology will be implemented only by large organizations, according to Forrester.

4. Intelligent modeling of threats

This is rather new concept that deals with analyzing the right way to protect sensitive data through proactive threat modeling. After 3-5 years there may be the next stage of technology development, although the cost and complexity of currently available modeling tools creates a barrier to threats adapting this new technology.

5. DDoS mitigation controls

Although the market has an anti-DDoS solutions, Forrester points out that the market is still extremely small recently. However, due to the growth of hacking (hacktivism - in the terminology used by Forrester), the market for solutions that provide protection against DDoS attacks will grow over the 1 - 3 years. Especially rapid growth of this will be in the SaaS model.

And here are the technologies which according to Forrester will face death in the coming years.

1. Network Access Control

According to Forrester the market for individual proposals to control network access will disappear within the next 5-10 years.

2. Applications for secure data transmission

The need for secure data transfer and providing file sharing between business partners, of course, is still high, but in 3-5 years all these services will be implemented through cloud services rather than applications.

3. Solutions for unified threat management (UTM)

Although these solutions are widely implemented in both small offices and branch offices, the technology of integrated threat management faces the fact that the focus of attention is shifting to the new security gateways with more integrated functions and determination of the invasion.

4. The traditional network firewall

The traditional firewall market is stagnating due to the wide adoption of the next-generation firewalls. The research company predicts that in 5-10 years a new generation of firewalls will replace today's traditional firewalls.

5. Preventing network intrusion (some solutions)

Forrester believes that the market of individual intrusion prevention systems (IPS) is at the stage of decline, and it will disappear within 5-10 years) despite its success in the world's largest companies for now. Instead there will be some new multifunction gateways and firewalls (especially the new generation of firewalls), which will include IPS and will be used instead of a separate IPS equipment.

The article was written and provided by Andrew Smith, QArea Company. Read about the company here.
Enhanced by Zemanta

Here Are Some of My Most Popular Posts Since Day One.

If you like my blog Please Subscribes to my RSS Feed for updates and more


↑ Grab this Headline Animator

Subscribe via email

Enter your email address:

Delivered by FeedBurner
Your Email Will never be shared or Made Public

Related Posts Plugin for WordPress, Blogger...