Gigamon’s Top 10 IT Predictions for 2016

With the New Year on the horizon, we asked Johnnie Konstantas, director of security solutions marketing and business development at Gigamon, to peer into her crystal ball to bring you the leading predictions on what to expect in 2016. Check it out—exciting changes are imminent.iStock_000072546017_Small

  1. SDN (software-defined networks) will continue to be discussed, debated, and highly regarded, but it will still not be broadly implemented. In fact, the same traditional network hardware that worked in 2015 will continue to work in 2016.
  2. Server virtualization will become a major driver of security sales. While SDN and NFV (network-function virtualization) dominate network virtualization conversations, they haven’t yet been broadly implemented. It is clear, however, that server virtualization of security-intensive workloads is at critical mass, with the vast majority of applications and data being served from virtual machines (VMs). Organizations are looking at VM provisioning with new eyes, so we expect virtualized versions of security products and visibility platforms to be deployed in record numbers.
  3. Machine learning in security apps will have another year in relative obscurity. While start-ups abound that can predict bad user behaviors from big data inputs, the era of predictive analytics remains in its infancy, both from a development and an adoption standpoint. It is, however, a very promising technology.
  4. To improve security, look for more collaboration across organizations’ security, IT operations, and network operations teams. The changes in network architecture required to accommodate machine-to-machine traffic and new detection-based defense initiatives will require teams to work together.
  5. Security tools’ contention for traffic will reach an all-time high. This trend will require more organizations to deploy pervasive visibility and security delivery tools to make monitoring continuous and pervasive.
  6. Data encryption, both at rest and in transit, will increase as a major issue as governments grapple with providing law enforcement access to encrypted traffic. Start-ups seeking to provide answers to this problem will emerge, and traditional infrastructure providers will look to use their established network positions to solve the problem.
  7. The tide will turn on cyber attacks among the best-protected companies. Breaches won’t be eliminated, but sophisticated attackers will find it more difficult to make gains. The reasons: A mixture of 1) increased scrutiny of hackers from both businesses and law enforcement, and 2) better adoption of security postures by organizations.
  8. By the end of 2016, username and password security will be on the way out and multi-factor authentication (MFA) will become the norm. MFA will arrive with the need to make risk-based decisions about who or what has access to assets, and organizations will assign end users reputational scores to compute authorization.
  9. Governments and standards bodies will have a renewed and increased focus on what is acceptable in security. They will address key issues of privacy, information sharing, and associated issues.
  10. Service providers will focus more on subscriber intelligence to better monetize their networks and ensure better performance.

Johnnie KonstantasJohnnie-Konstantas

Johnnie is Gigamon’s director of security solutions marketing and business development. With 20+ years in telecommunications, as well as data and cyber security, she has done a little bit of everything, including engineering, product management, and marketing for large firms and fledglings. She thrives on helping firms of all sizes establish and sustain category leadership.

Most recently, she was the vice president of marketing at Dato, a company pioneering large-scale machine learning. She was also vice president of marketing at Altor Networks (acquired by Juniper), an early leader in virtualization security, and at Varonis Systems (VRNS).

Johnnie started her career at Motorola, designing and implementing large-scale cellular infrastructures. A frequent industry speaker and blogger, Johnnie holds a bachelor’s degree in electrical engineering from the University of Maryland.

Comments are currently closed.