The continued growth in IT security opportunities correlates with metamorphoses in both the technology sector and the security world. Indeed, during the last two years, just about every aspect of IT security has been utterly transformed.
Not only are there more lethal threats than ever, but the way IT security is deployed and managed has changed fundamentally. A few years ago it was enough to deploy antivirus software and a firewall. A few organizations might have gone the additional step of relying on a service provider to enhance their overall security posture. But by and large, those organizations represented a minority of the overall IT market.
Fast-forward to today, and now the assumption is that more corporate networks have been compromised to one degree or another. Antivirus software and firewalls are still important in preventing even more attacks from penetrating the perimeter.
However, thanks mainly to the rise of sophisticated social engineering techniques, end users are regularly fooled into downloading some form of malware. No amount of IT security will be able to protect end users from themselves.
New IT Security Services Challenges Call for New Solutions
Addressing new IT security services challenges requires new tools and techniques.
IT organizations have begun investing at a rapid clip in advanced analytics applications that help them discover faster where malware is hiding inside the enterprise, for example. Once identified, the focus then quickly moves to isolating the infected systems, removing the malware and remediating the vulnerability that the malware was trying to exploit.
That closed-loop approach to IT security, however, requires access to new tools and the expertise needed to run them. For that reason, interest in all forms of IT security technologies delivered as some type of cloud service is on the rise.
“What’s happening is new layers of security are being implemented between the cloud and the perimeter,” said Gartner analyst Mike Dorosh. “There’s a lot more orchestration now between all the security technologies being put in place.”
Solving Managed Security Services Challenges
Enter managed security services challenges and opportunities.
As IT organizations discover what’s involved in achieving that level of orchestration, it becomes apparent that they don’t have the internal expertise required to implement these technologies, Dorosh said. As a consequence, it’s only a matter of time before they begin to rely more on IT security delivered as a managed service, he said.
The good news is that work on the platforms needed to deliver these closed-loop approaches to IT security is advancing rapidly.
For example, Sophos just launched an IT security management platform that leverages big data analytics to better identify threats, such as ransomware. Once the threat is detected, Sophos Integrity is designed to automatically quarantine the endpoint affected, while in real time making unencrypted copies of any of the data that a piece of malware might be trying to encrypt.
In a similar vein, Splunk has partnered with more than a dozen IT security vendors to create its Adaptive Response framework,which leverages machine data and machine learning algorithms to reduce the amount of time it takes to determine what actions to take when a threat is detected.
Meanwhile, Cloudera, a provider of a distribution of Hadoop, at the recent Strata + Hadoop World 216 conference announced a proposal in collaboration with Intel that would donate Spot to the Apache Software Foundation. Formerly called Open Network Insight, Spot is an open-source project started by Intel that seeks to increase visibility into security threats using big data analytics and machine learning.
Demand for cloud security services provided by both Trend Micro and Symantec is way up, said Daniel Saks, president and co-CEO of AppDirect, a distributor of cloud services.
“Security creates an opportunity for the channel to add value via the cloud,” Saks said.