Application security

Industry views: Look for more spending on convergence, insider threats

,

The speed of change in IT security is intense and often seemingly chaotic. Security solutions today must constantly morph to reflect not only the shifting needs of customers, but also the advancing capabilities of security threats. The proliferation and progression of DoS attacks and phishing sites, to name a few, demand new means to detect and block criminals. Senior executives, meanwhile, want simplicity and better command and control over the many security solutions they implement. Despite this ever-changing landscape, there are, however, a number of general trends that, from our view as investors, are likely to organize and drive development of IT security products and services over the near and intermediate term.

One broad theme is that the internal threat to the organization has come to be seen as every bit as serious as threats from outside. IT security may be able to create the greatest perimeter in the world, but if it's compromised by an embittered ex-employee, a financially motivated identity thief or a current employee falling victim to carelessness, security officials must be able to deal with these realities.

Thus, activity is increasing "behind the firewall." Security administrators want to control and monitor all users' digital communications (not just email), as much as they want to detect and block intruders. Tools and technologies that help set up policies to protect and ensure proper internal data usage, constrain users from certain areas and audit activity to enforce security are currently areas for potential growth and investment.

The perimeter itself is also changing, with the current static firewall evolving into an active, next generation firewall solution. This new firewall ultimately will resemble an intrusion prevention system in the way it detects and blocks undesirable users and activities. We see firewalls and intrusion prevention systems merging together as vendors seek to deliver on the promise of unified threat management (UTM).

Convergence of this kind is an often touted theme. And consolidation of security from end-point solutions into a more central product, particularly the router, continues to take hold. This long-developing trend, we believe, is finally reaching market readiness, as vendors are beginning to promote UTM solutions. However, the challenge of maintaining necessary throughput is still an issue, which perhaps highlights another area of opportunity. Whether routers and switches will produce best-in-class security is, at this time, unknown. But routers with significantly centralized security features will have a role in the IT security market.

Another trend that is likely to continue to unfold is the integration of network and security systems. Today, senior managers outside the IT function want to be able to view and use network security data to evaluate risk and make decisions. Common APIs and standard data interfaces will make possible security management reporting systems that allow senior managers to act on security data with greater ease than ever. In this fashion, the evolution of security data management may resemble systems management applications, and should integrate with these applications and vendors over time, as well.

One final early market idea, and thus perhaps area of investment, that we see today is for security to be provided in the network cloud. In this scenario, large ISPs such as AT&T and BT that provide core trafficking of data and network activity, may look to provide security as a service. Security applied in this fashion before the application level may not be able to handle all threats. But for globe-roaming viruses, node-to-node security provided in the cloud will be a significant and useful addition to a "defense in depth" strategy.

In identifying these trends, we've done more than focus on individual new threats or specific emerging technologies. Instead, we've discussed the places where two or more developments may be juxtaposed and reinforce each other. There's no way to know precisely what tomorrow's data bandits will conceive, or what tomorrow's enterprise executives will demand. But security vendors and customers who look for and incorporate the next wave of significant developments from these sectors will be well positioned to withstand the major changes in IT security for some time to come.

Peter Bollier has been a partner and financial executive with 3i since 1984.

David Shapiro, director, has been with 3i since 2001. He can be reached at [email protected].

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.