SHARE
Facebook X Pinterest WhatsApp

IT Security Opportunities: From Cloud to Analytics

The continued growth in IT security opportunities correlates with metamorphoses in both the technology sector and the security world. Indeed, during the last two years, just about every aspect of IT security has been utterly transformed. Not only are there more lethal threats than ever, but the way IT security is deployed and managed has […]

Written By
thumbnail Michael Vizard
Michael Vizard
Sep 30, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The continued growth in IT security opportunities correlates with metamorphoses in both the technology sector and the security world. Indeed, during the last two years, just about every aspect of IT security has been utterly transformed.

Not only are there more lethal threats than ever, but the way IT security is deployed and managed has changed fundamentally. A few years ago it was enough to deploy antivirus software and a firewall. A few organizations might have gone the additional step of relying on a service provider to enhance their overall security posture. But by and large, those organizations represented a minority of the overall IT market.

Fast-forward to today, and now the assumption is that more corporate networks have been compromised to one degree or another. Antivirus software and firewalls are still important in preventing even more attacks from penetrating the perimeter.

However, thanks mainly to the rise of sophisticated social engineering techniques, end users are regularly fooled into downloading some form of malware. No amount of IT security will be able to protect end users from themselves.

New IT Security Services Challenges Call for New Solutions

Addressing new IT security services challenges requires new tools and techniques.

IT organizations have begun investing at a rapid clip in advanced analytics applications that help them discover faster where malware is hiding inside the enterprise, for example. Once identified, the focus then quickly moves to isolating the infected systems, removing the malware and remediating the vulnerability that the malware was trying to exploit.

That closed-loop approach to IT security, however, requires access to new tools and the expertise needed to run them. For that reason, interest in all forms of IT security technologies delivered as some type of cloud service is on the rise.

“What’s happening is new layers of security are being implemented between the cloud and the perimeter,” said Gartner analyst Mike Dorosh. “There’s a lot more orchestration now between all the security technologies being put in place.”

Solving Managed Security Services Challenges

Enter managed security services challenges and opportunities.

As IT organizations discover what’s involved in achieving that level of orchestration, it becomes apparent that they don’t have the internal expertise required to implement these technologies, Dorosh said. As a consequence, it’s only a matter of time before they begin to rely more on IT security delivered as a managed service, he said.

The good news is that work on the platforms needed to deliver these closed-loop approaches to IT security is advancing rapidly.

For example, Sophos just launched an IT security management platform that leverages big data analytics to better identify threats, such as ransomware. Once the threat is detected, Sophos Integrity is designed to automatically quarantine the endpoint affected, while in real time making unencrypted copies of any of the data that a piece of malware might be trying to encrypt.

In a similar vein, Splunk has partnered with more than a dozen IT security vendors to create its Adaptive Response framework,which leverages machine data and machine learning algorithms to reduce the amount of time it takes to determine what actions to take when a threat is detected.

Meanwhile, Cloudera, a provider of a distribution of Hadoop, at the recent Strata + Hadoop World 216 conference announced a proposal in collaboration with Intel that would donate Spot to the Apache Software Foundation. Formerly called Open Network Insight, Spot is an open-source project started by Intel that seeks to increase visibility into security threats using big data analytics and machine learning.

Demand for cloud security services provided by both Trend Micro and Symantec is way up, said Daniel Saks, president and co-CEO of AppDirect, a distributor of cloud services.

“Security creates an opportunity for the channel to add value via the cloud,” Saks said.

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.