Optisis
dsc
Beenius
CLOSE+

ICT trends for 2020

We are faced with new challenges but also new opportunities

We present nine technology trends that will bring new challenges for 2020 in the field of network and cybersecurity. While we only concentrate on the most interesting ones, the list is far from exhaustive. The year 2020 will definitely be extremely exciting.

avtomatizacija_procesov

The automation and orchestration increase cybersecurity

SOAR guarantees shorter threat response times

The emergence and implementation of the SOAR solution will allow shorter response times to security incidents.

It will increase productivity and improve the ability to prioritise threats faster than a human.

Albeit it will never replace the human factor, it does add an additional layer of security to prevent the worst threats to the information system.

avtomatizacija_v-omrezjih

Concepts and solutions for a simplified network and infrastructure management

Automation is penetrating networks as well

Due to the many functionalities, use of different protocols, and availability of data, conventional work at the CLI level has become inefficient.

The future lies in the automation-based solutions that provide high efficiency and readiness as well as a 24/7/365 service availability. This is achieved by implementing the next-generation network technologies, such as Fabric and Fabric Connect.

varnost-v-oblaku

Increased trust in cloud computing

Tighter security measures for service providers

The performance of regular security controls and verification of security features lead to greater trust when it comes to the use of cloud services.

The wide range of security solutions that can be deployed in the cloud also contributes to it. This is all the more important since the end-user services will also be increasingly targeted in the future.

umetna-inteligenca_icon

The use of artificial intelligence and machine learning in network technologies

With artificial intelligence to autonomous networks

Modern networks generate large volumes of traffic data. Combined with the use of artificial intelligence and machine learning, this will allow us to respond quickly and efficiently to problems emerging in the network management and maintenance processes, even when limited by human resources, experience, and specialist knowledge.

Artificial intelligence can be introduced into different network layers, thus additionally protecting the network.

varnost-v-OT

Security in OT environments is being transformed into an IT science

The data will become the basis of security analyses

Thousands of devices with legacy OS or software, which can be found in OT environments, will soon be placed on the End of Life lists. An attacker can use the vulnerability of devices such as controllers, control systems, and PLCs to reach their target.

The security and protection of OT environments with solutions that ``speak the OT language``, i.e. know and understand OT protocols, and can quickly detect and prevent incidents will therefore become the top priority.

omrezja_krog

SD-WAN – software-defined wide area network

Intelligent modern WAN networks

Through the SD-WAN concept, we will centralise control functions and application control in the data centre. In terms of connectivity, however, technology allows the combining of different types of WAN technologies.

The driving force of the SD-WAN migration, i.e. the transition from WAN ``legacy``, is to reduce costs as well as increase network and service availability and security.

phishing

Increasingly sophisticated impersonation or phishing methods

Scams are about to become more frequent

E-mails will continue to dominate as the most common form of phishing.

Even in the mobile world, we can already observe an increase in phishing attacks occurring through SMS (smishing) and voice messages (vishing).

Machine-based security will help us better identify and prevent such attacks.

network-virtualization

Network Building Virtualisation (NFV)

On a standard server infrastructure

With the concept of network devices virtualisation, we will gradually increase the system's capability and, above all, easily and quickly introduce new services. Virtualised and dedicated devices are mutually compatible, since they use standard protocols.

This concept makes it easy to chain services between the network and server infrastructure.

omrezna_varnost

A secure and controlled access to ICT networks

Safety concerns at the very edge of the network

This is becoming an important area because of the increasingly complex and demanding threats, as well as the demands for high availability on networks.

Through the introduction of automated NAC (Network Access Control) solutions, we will effectively provide security, minimise the need for additional resources in the network implementation and operation, and reduce the possibility of human error.

Most read in 2019

CONTACT US
Arrow

I agree that you may permanently store personal data in the notification list of:

We will store and process your information in order to occasionally notify you of any specialist content and send you invitations to specialised events by e-mail. We will use your personal information confidentially and will not share it with any third parties. We address your privacy in accordance with the provisions of the GDPR and the Personal Data Protection Act.

You can withdraw your consent at any time upon receipt of the email or by sending an e-mail with the subject line "Cancelling my subscription" to marketing@smart-com.si. After processing the subscription cancellation request, Smart Com will stop sending you the content you have unsubscribed from.

For details on subscription cancellation, processing, and protecting personal information, see Legal notices.

x
Close
CLOSE+