Not an exploit was stirring, till one launched anyway.
The IDSs were stung by packet malware,
Knowing the hacker's tracks wouldn't be there.
Apologies for the injustice to the public domain's 'Twas the Night Before Christmas from 1822, once the intellectual property of Clement Clarke Moore, who never had to secure a network from malicious intent with visions of sugarplums dancing in his head.
The rest of us involved with information security have things aplenty to worry and to cheer about in 2005. The new year will ring in a host of new security technologies, a blitz of devious malware and exploits, and a virtual pudding of new security operational and management processes.
The following are some your stockings may be stuffed with:
Successful vendors have a good telescope to see and interpret marketplace demands both subtle and not. In 2005, the security marketplace will see some big new product trends hit their stride.
The most visible one will be the merging of security and manageability. The relationship among configurations for computers and networks and security has long been like the chicken and the egg -- strong security requires a multitude of specific configuration attributes. Meanwhile, more sophisticated exploits, the explosion in wireless LANs, voice over IP and the emergence of utility computing are creating new vulnerabilities every day. All of this added security and infrastructure complexity must be simplified as much as possible to be implemented and managed at an affordable cost.
Enter the multifunction security appliance. You will find, under your tree, a shiny, new Swiss Army Knife-like security management system. Users want a common security architecture for both wired and wireless networks, so firewall, antivirus software, intrusion-detection systems, authentication, virtual private networks, access and authorization will be integrated with management tasks for bandwidth, devices and users (my apologies for innovations inadvertently left out of this list). In the wireless world, switch, access point and software vendors are piling on a smorgasbord of functionality. Next, storage will find a way to be added to the stew.
Two more trends were spawned by the growth in federated identities that hit prime time in 2004. The first is a product to automate the authentication bottleneck created as federated identity deployments scale to thousands of users. We're headed for any-to-any authentication complexity that will take the jolly away from Old St. Nick.
The interoperability framework being created by the Open Authentication Initiative (OATH) is producing a host of new functionality to simplify strong authentication. You will even see -- finally!
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts