{"id":11596,"date":"2015-12-23T12:00:30","date_gmt":"2015-12-23T20:00:30","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11596"},"modified":"2016-12-09T11:01:58","modified_gmt":"2016-12-09T19:01:58","slug":"2016-predictions-13-security-with-agility-for-firewalls-and-applications","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/2016-predictions-13-security-with-agility-for-firewalls-and-applications\/","title":{"rendered":"2016 Predictions #13: Security with Agility for Firewalls and Applications"},"content":{"rendered":"<p><em>This is the thirteenth in our <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/predictions\/\" target=\"_blank\"><em>series of cybersecurity predictions<\/em><\/a><em> for 2016. Stay tuned for more through the end of the year.<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Addressing the evolving threat landscape is a key factor in security, but organizations also want security that can keep up with the new, distributed and dynamic environments that they are building and adopting. In other words, they want to have their cake and eat it too.<!--more--><\/p>\n<p>In order to accommodate this shift, security will have to go where the applications, users and data are. And that\u2019s not easy because all three are going everywhere. This new, distributed foundation is the basis for more agile and efficient IT \u2013 but it all needs to be secured to deliver benefits at an acceptable level of risk.<\/p>\n<p>In 2016, this need will manifest itself in three key ways:<\/p>\n<h3>Develop Full Situational Awareness<\/h3>\n<p>Security systems that operate on IT-level context (e.g., applications and users) will become all the more relevant, as \u201cdivining\u201d high-level activities based on low-level context (e.g., ports, protocols) is a losing proposition. In other words, higher-level information will drive better security posture.<\/p>\n<h3>Programmable, Adaptable Security<\/h3>\n<p>Security is rarely an end in itself. When we\u2019ve come to think of it that way, it\u2019s because it was applied to overall environments that were static in nature. Now, with on-demand, elastic environments in vogue, securing capability also has to be dynamic.<\/p>\n<h3>Looking Within \u2013 the Need for Segmentation<\/h3>\n<p>Micro-segmentation has made the topic of segmentation \u201ccool again,\u201d but it\u2019s really broader than just a virtualized data center use case. And it\u2019s not segmentation in the sense of barriers or pure isolation. Elements (e.g., computers) between segments need to interact, but it\u2019s more like a membrane where you get to determine what gets through (in a language that you can understand) and, beyond that, how the interaction is inspected for threats.<\/p>\n<p>Securing a static environment from cyberthreats may be easier to achieve, but customers want more. That\u2019s why, even in the face of ever-increasing threats, security platforms must also account for the new, dynamic and distributed models of IT that organizations are deploying.<\/p>\n<p><iframe loading=\"lazy\" width=\"668\" height=\"1000\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/2JkM5I09YJkd2k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><\/p>\n<p><em>Want to explore more of our top 2016 cybersecurity predictions? <\/em><a href=\"https:\/\/boom.weboom.com\/sites\/paloaltonetworks\/ignite2016\/forms\/regform.html\" rel=\"nofollow,noopener\" ><em>Register now<\/em><\/a><em> for Ignite 2016.<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the thirteenth in our series of cybersecurity predictions for 2016. Stay tuned for more through the end of the year. Addressing the evolving threat landscape is a key factor in &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,5,229],"tags":[1631],"coauthors":[716],"class_list":["post-11596","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-firewall","category-predictions","tag-threat-landscape"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11596"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11596\/revisions"}],"predecessor-version":[{"id":11597,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11596\/revisions\/11597"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11596"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}