SHARE
Facebook X Pinterest WhatsApp

Interest in Network and Security Services Grows

Networking Interest in Network and Security Services Grows Managed global WAN connectivity platforms and firewall-as-a-service offerings are high on the list of approaches being considered by IT organizations. Network Upgrade Plans Among IT pros that plan to upgrade their networks in the next 12 months, 26% said a shift to a managed global WAN connectivity […]

Written By
thumbnail Michael Vizard
Michael Vizard
Dec 23, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Networking

1 - Interest in Network and Security Services GrowsInterest in Network and Security Services Grows

Managed global WAN connectivity platforms and firewall-as-a-service offerings are high on the list of approaches being considered by IT organizations.

2 - Network Upgrade PlansNetwork Upgrade Plans

Among IT pros that plan to upgrade their networks in the next 12 months, 26% said a shift to a managed global WAN connectivity platform is the highest priority. 39% said they plan to eliminate some hardware, with servers (62%) and storage (52%) topping the list.

3 - Most Promising Network TechMost Promising Network Tech

Firewall-as-a-service leads the list at 41%, followed by cloud access broker software at 24% and SD-WANs at 20%.

4 - Types of WAN EmployedTypes of WAN Employed

•72% use tunnels to establish network connections.

•38% use MPLs connections.

•31% use software-defined WANs.

5 - Securing Branch Office TrafficSecuring Branch Office Traffic

•41% are splitting traffic at the branch office where they deployed a firewall.

•25% backhaul traffic over an MPLS connection where they use a firewall in the data center to protect data.

•13% split traffic at a branch office using a cloud gateway to protect data.

6 - Protecting the CloudProtecting the Cloud

24% of respondents use the same firewalls they have in their local data centers in the cloud, and 23% use the firewalls made available by the cloud service provider.

7 - Securing the Cloud for Mobile UsersSecuring the Cloud for Mobile Users

48% require mobile users to make use of a virtual private network (VPN) to access cloud services. Only 15% use cloud access broker software.

8 - Security Technologies UsedSecurity Technologies Used

Almost two-thirds of the respondents are relying on between two and five security solutions, and 26% have five or more in place.

9 - Areas of RiskAreas of Risk

Networks tops the list of risks at 58%, followed by mobile tech at 44%.

10 - Top Network Security ChallengesTop Network Security Challenges

•Cost of acquiring and managing appliances and software: 49%

•Enforcing endpoint security policies: 48%

•Integrating cloud and local data centers: 35%.

11 - Biggest WAN ChallengesBiggest WAN Challenges

•Network latency: 43%

•Cost of buying and managing appliances: 43%

•Cost of MPLS: 37%

•Mobile VPN access: 35%

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Avaya Transforms Contact Centers with New Infinity Platform
Allison Francis
Apr 25, 2025
Celona Extending Service to AT&T Customers
Jordan Smith
Apr 2, 2025
TNS to Expand Calling Solutions for Channel Partners
Jordan Smith
Mar 24, 2025
Mitel Files Chapter 11: UC Giant Seeks Fresh Start
Allison Francis
Mar 12, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.