Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies


These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Top IT trends in 2017: cybersecurity

Matthew Gyde, Group Executive ─ Security and Guido Crucq, Group Security Principal Director, share their thoughts on what will be the top cybersecurity trends to watch in the year ahead.

Trend 1: Security is accelerating digitalisation

In 2016 we saw organisations across many industries recognising the potential of cybersecurity to enable their move to become digital businesses. We see this trend continuing in 2017.

Fintech businesses have been leading the charge. As cloud-born organisations, they’re extremely asset-light. But they still need to ensure that the transactions they perform are secure. So security needs to be pushed beyond the physical perimeter into a cloud environment.

We expect to see next-generation digital businesses increasingly sharing their data with one another

The advantages of this model are significant: you don’t need to wait eight weeks for security equipment to be delivered. You can simply ‘turn it on’ and start deploying it across multiple cloud platforms.

Being able to provision and deploy security into the cloud quickly is also appealing to financial institutions that are entering into mergers and acquisitions, or right- or down-sizing their operations. It allows them to quickly discontinue services to branches or burst capacity to set up temporary operations.

Sharing data – securely

In the year ahead, we expect to see next-generation digital businesses increasingly sharing their data with one another.

But these won’t necessarily be long-term engagements. One day you might be partnering with another business to take a new product to market, a few weeks later you’ll be competing.

We foresee a need for more decentralised computing and security architectures

So, the ability to make information available to your partners quickly and securely, for short periods of time, will become critical.

Trend 2: The sensor is becoming the perimeter

We believe that 2017 will be the year that the security industry steps up to the challenge of enabling the Internet of Things (IoT) and operating technology (OT).

OT environments have inherently open designs that typically lack appropriate security controls – all the effort has been focused on ensuring that devices are able to communicate effectively with one another.

Given the omnipresent threat of cyberattacks, it won’t be sufficient to apply traditional perimeter defence strategies to these environments. As an industry, we need to find ways to segment and secure OT and IoT environments in a more sophisticated manner, and ensure that security is embedded very close to individual configuration items.

Predictive intelligence

If sensors are becoming the perimeter, we’ll also need to consider how to go about gathering the data they collect and turning it into intelligence. This will enable us to become much more predictive about cybersecurity.

This won’t be easy. According to Forbes, there’ll be 80 billion connected devices by 2020. The number of distributed, connected devices that will be acting as sensors and feeding information back to the security platform are going to place huge demands on the central processing power.

So we foresee a need for more decentralised computing and security architectures in order to cope with the increased volume of data being generated.

We also see security being built into the fabric of the network: either by activating the security features that new networking devices come with, or combining them with specialist security devices and software – or both. And through earlier collaboration between network architects and the security team.

Updating security patches on thousands of networking devices is very labour intensive. That’s why software-defining those devices, and automating services are so potentially beneficial.

Trend 3: Identity makes a comeback

Modern workspaces are redefining how users, their devices, and data interact. And as our workspaces change, identity is becoming more important. Millennials are a driving force behind this trend. They have very different expectations of how and from where they access their data.

However, what hasn’t changed is the fact that users are the weakest link in the security chain.

We believe that identity can help solve end point control challenges. But not in the traditional manner. Bulky identity engines that take multiple years to deploy are being replaced by light-weight, agile identity technologies that make use of sophisticated cryptographic algorithms.

Bulky identity engines that take multiple years to deploy are being replaced by light-weight, agile identity technologies

49% of employees use consumer telephony applications such as Skype in the workplace – Frost and Sullivan Securing workspaces for tomorrow white paper.

Identity will evolve to include geo-location and geo-sensing and start to leverage existing technologies such as GPS that are already built into users’ devices. Next-generation approaches to identity will need to be device independent because they’ll need to access user information that’s been generated by multiple devices and is stored primarily in the cloud.

The new face of multi-factor authentication

We anticipate some exciting advances in multi-factor authentication in the year ahead. For example, we believe that the days of using one-time passwords to perform basic bank transactions, will soon be gone.

We can expect to see the emergence of very dynamic ways of authenticating identities: Identity will increasingly leverage advanced technologies such as biometrics. Fraud protection will evolve to include the collection and analysis of metadata.

For example, your location, the type of information you’re trying to access, and whether the device you’re using has been previously used to perform such transactions, will all be taken into account.

Trend 4: Intelligence is driving the predictive cybersecurity posture

Today, organisations can’t afford to settle for a ‘best effort’ approach to cybersecurity. Cybercrime is big business. Over the last few years, cybercriminals have been re-investing much of the ill-gotten gains into developing more sophisticated capabilities, using more advanced technologies.

Despite ongoing innovation in the cybersecurity industry, much of the effort remains reactive. We believe that security needs to more than ‘proactive’ ─ it needs to be ‘predictive’.

Through our partnership with NTT Security, we’re using advanced machine learning and artificial intelligence to identify threats before they happen. We then either shut them down or place them into ‘wormholes’ or ‘honey pots’ so we can study the way they behave.

Today, 40% of the world’s Internet traffic passes through the network of NTT, our parent company. By analysing this traffic we’re able to capture the criminals’ IP addresses, and ─ with the help of policing agencies ─ confirm their identities. Next, we start monitoring who they’re communicating with.

We’re using advanced machine learning and artificial intelligence to identify threats before they happen

As part of our efforts to become more predictive we also analyse large sets of unstructured data. If we detect suspicious activity we’ll ‘crunch’ the data to draw conclusions about their source and who might be behind them. And we’ll use artificial intelligence to predict what the next step in the attack sequence could be.

See how Sentient is solving the world’s most complex problems using massively distributed artificial intelligence.

Staying a step ahead

To maintain a solid cyber defence you need advanced skills in threat intelligence, virtual engineers, and, ideally, ‘hunting teams’ that can scour the Dark Web. But these skills are scarce and expensive. According to ISC, by 2020 there’s expected to be a global shortfall of 1.5 million cybersecurity experts. As a result, many organisations will be looking to outsource these activities to external specialists in the year ahead.

Many of these cybersecurity businesses are making great strides in advanced data analytics, but we foresee that in 2017 they’ll see the wisdom in collaborating and sharing their information, rather than competing with one another for market share. This is a positive development, as collective insights will always be more powerful in the fight against cybercrime than any individual effort.

Trend 5: Secure hybrid IT is becoming the building block for hyper-virtualised security

Many businesses are bound by strict compliance regulations as to where their data may reside, and, as a result, aren’t able to move everything to the cloud. Others simply feel more comfortable retaining their business-critical assets on-premise. So today, most organisations operate hybrid IT environments.

However, we do see a growing acceptance in the market that the public cloud is secure, provided that the appropriate controls are put in place. We expect to see an increase in the use of virtualised technology to extend security controls into the public cloud in the year ahead.

In hybrid IT environments, technology becomes increasingly programmable

In hybrid IT environments, technology becomes increasingly programmable and data is moving across multiple environments. So it’s important to ensure that security is built in from the start.

New skills sets

You need to consider how to ensure that hardware is communicating with software correctly, and that software is operating consistently across multiple different platforms and into different clouds. You also need to consider how to embed security controls in your applications and in the data that’s leaving your organisation.

Maintaining a strong security posture in a hybrid IT environment is complex, and calls for skills that most businesses don’t have, or can’t afford, in-house. Increasingly, organisations are seeing the value in engaging with specialist consultants and architects that can assess their environments and help them to evolve their physical networks to a software-defined model. Managed security services can also ease the burden on internal resources.

We believe technology is the key that unlocks potential for businesses, and for the world, in ways we’re only beginning to comprehend. By applying our capabilities in cybersecurity, digital infrastructure, hybrid cloud, and workspaces for tomorrow, we look forward to continuing to help our clients accelerate their journeys to become digital businesses in 2017.

Find out more about other top trends in 2017

Digital business

Digital infrastructure

Hybrid cloud

Workspaces for tomorrow

Comments/What do you think?


You may also be interested in

Cybersecurity for the digital age

The future of cybersecurity as an enabler for digital business

Read more
Global Threat Intelligence Report

Insights to protect your organisation against cybercrime in the digital era

Read more
Inside security

Practical steps for safeguarding your people and your organisation

Read more
Secure workspaces

Be prepared for cyber threats in a hyper-connected digital era

Read more