{"id":4252,"date":"2013-12-10T15:30:05","date_gmt":"2013-12-10T23:30:05","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4252"},"modified":"2016-12-09T11:27:42","modified_gmt":"2016-12-09T19:27:42","slug":"2014-predictions-industry-trends","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-industry-trends\/","title":{"rendered":"2014 Predictions: Industry Trends"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4209 lozad\" alt=\"PAN_PredictionsCyberSecurityLogo-01\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-500x295.jpg\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-500x295.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-510x300.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Here are my 2014 predictions on what I think will be the trendsetters in cyber security.<!--more--><\/p>\n<p><b>1. Securing the mobile device will be inextricably linked to securing the network<\/b><\/p>\n<p>With freedom of choice comes risk.\u00a0 Megatrends like BYOD and the rise of the mobile workforce are providing fertile ground for cyber criminals and nation states looking to capitalize on devices operating over unprotected networks.\u00a0 The scales have historically been tipped against us, leaving enterprises vulnerable to a new breed of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/08\/mobile-devices-new-malware-and-new-vectors\/\" target=\"_blank\">advanced threats targeting mobile devices<\/a>.\u00a0 In 2014, threat intelligence gained within the enterprise network will offer new defense capabilities for mobile devices operating outside protected networks.\u00a0 And intelligence gained by mobile devices will offer new signature capabilities to further strengthen enterprise networks.<\/p>\n<p><b>2. Cloud will get a security makeover<\/b><\/p>\n<p>Innovations in network virtualization are enabling automation and transparent network insertion of next-generation security services into the cloud, and this is an <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/11\/palo-alto-networks-vmware-milestone-software-defined-data-center-security\/\" target=\"_blank\">area where Palo Alto Networks leads<\/a>.\u00a0 Security has remained one of the greatest barriers preventing cloud computing from reaching its full potential, and in our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/11\/said-need-secure-cloud-environment\/\" target=\"_blank\">recent Cloud Computing &amp; Security survey,<\/a> about 60 percent of respondents told us that delays in applying security have a negative impact on their operational efficiency. In 2014 next-generation network security and network virtualization will come together to form a new paradigm for cloud security.<\/p>\n<p><b>3. Detection times will <span style=\"text-decoration: underline;\">decrease<\/span> in 2014<\/b><\/p>\n<p>This may be a controversial prediction amongst those who prefer to prey on fear, but expect breach detection times to decrease in 2014.\u00a0 Enterprise security has undergone a massive transformation since the introduction of the Next-Generation Firewall (NGFW).\u00a0 This has long since moved from an emerging technology to one that\u2019s universally deployed.\u00a0 Newer, advanced security services are enabling enterprises to gain new advantages in detecting unknown threats, and gather that information into a \u00a0threat intelligence cloud that\u2019s developing an impressively high IQ.\u00a0 In other words\u2026the vision is working.\u00a0 The net result will be a measurable reduction in the time it takes to detect a breach.<\/p>\n<p>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<\/p>\n<p><strong>Don't forget to read our other\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2014-predictions\/\" target=\"_blank\">2014 predictions<\/a>:\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/isabelledumont\/\" target=\"_blank\">Isabelle Dumont<\/a>\u00a0on\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-cybersecurity-trends\/\" target=\"_blank\">cybersecurity trends<\/a>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/wade\/\" target=\"_blank\">Wade Williamson<\/a>\u00a0on\u00a0<a href=\"http:\/\/bit.ly\/1dQjgtw\" rel=\"nofollow,noopener\"  \" target=\"_blank\">APTs and the threat landscape<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/matt\/\" target=\"_blank\">Matt Keil<\/a>\u00a0on\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-firewall\/\" target=\"_blank\">firewalls<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/palo-alto-networks-staff\/\" target=\"_blank\">Palo Alto Networks experts<\/a> on <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-mobile-security\/\" target=\"_blank\">mobility<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are my 2014 predictions on what I think will be the trendsetters in cyber security.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[229],"tags":[233,109,234,232],"coauthors":[716],"class_list":["post-4252","post","type-post","status-publish","format-standard","hentry","category-predictions","tag-2014-predictions","tag-cloud","tag-mobile","tag-trends"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4252"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4252\/revisions"}],"predecessor-version":[{"id":4288,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4252\/revisions\/4288"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4252"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}