Virtualization Technology News and Information
Ixia 2018 Predictions: Tackling The Challenges of an Increasingly Connected World

VMblog Predictions 2018

Industry executives and experts share their predictions for 2018.  Read them in this 10th annual series exclusive.

Contributed by Jeff Harris, CMO at Ixia, a Keysight Business

Tackling The Challenges of an Increasingly Connected World

It was no doubt an interesting year in the ever-changing and fast-paced world of technology. And if you're a betting person, you can expect more of the same in 2018. But what exactly does the new year hold? With the growing presence of connected cars, the fact that IoT risks are more prevalent than ever, and the massive reliance on the cloud, 2018 will be just as interesting -- if not more.

The Connected Car isn't Just a Car Anymore

IHS Markit forecasts that by 2023, worldwide sales of connected cars will reach 72.5 million units, up from 24 million units in 2015. That means, in just over eight years, almost 69% of passenger vehicles sold will be exchanging data with external sources turning the automobile into an advanced network. In 2018, the car will transition from a mode of transportation to a connected information hub.

In 2018, the phrase attack surface will be applied to the vehicle as connected car system attack fears rise. Catastrophic attack fears of the entire vehicle being taking over will evolve to more basic fears of account attacks like tolls systems, navigation history, and vehicle monitoring system breaches. Continual performance monitoring and system validation will take on new meaning in 2018 as auto vendors clamber to address these mounting risks.

IoT Risks Are Here to Stay

As the reliance on the IoT grows, so will the strain and ultimately the potential danger associated with hundreds or even thousands of connected devices having the potential to be compromised and turned into bots. These growing risks, and a general lack of Wi-Fi protection will create a constant stream of vulnerabilities, which are more likely to be repurposed.

The expansion of the attack surface enables new risks to your enterprise network. If you're working remotely and on an unprotected, public network you put your entire organization at risk from hackers whether it's from your data or unknowingly roping your device to be part of a botnet.

Data Privacy is the New Tech Emergency

The panic is setting in as today's data-oriented companies fear non-compliance with Europe's upcoming GDPR (General Data Protection Regulation), which will go into effect on May 25, 2018. With this, the focus on data privacy will reach new heights.

It is a complex task to protect personal data when the network is everywhere as a result of the push to the cloud. Using the public cloud takes the data out of your on-premises data center and puts it into the hands of your provider. Breaches and government tampering have brought the consequences of a carefree approach to personal data to light. Years of bad passwords and freehandedness with personal information has guaranteed that we have lost all control over our data. Awareness of this problem has finally reached critical mass. While it is too late to stop our data from leaving our hands, we can still make sure the ones who control it (looking at you, Equifax) do more to keep it safe. 2018 will be the year that we finally make data privacy a serious part of our lives.

Billy in Sales is Your Biggest Risk

When it comes to security, today's technology tools are not the issue. Significant advancements in firewalls, web application security, and network protection solutions have taken the industry pretty far, but employee behaviors have not.   The assumption still exists that ‘IT will take care of things' if I click on a bad link or leave my computer access open on unattended devices. 

Cyber criminals are quick to gain access to your network thanks to Billy's lack of attention to the topic of security. Billy still believes the responsibility to recognize and resist cyberattacks and phishing expedition's lies in the hands of back-office security teams. Breaches will continue to rise in 2018 as a result.

Edge Computing is the Icing on the Cloud Cake

As we close out 2017, the cloud is now a mainstream IT model and organizations are realizing they need better cloud security and performance management solutions. Cloud-washed solutions that were originally designed for the data center just do not cut it. A modern form of distributed, decentralized computing is needed to add value to the cloud and that new model is called edge computing.

Edge computing improves the overall efficiency of the cloud by keeping technology resources like compute, storage, and networking, closer to users. We will see more enterprises use edge design patterns in their infrastructure architectures to better leverage the benefits of the cloud, without sacrificing speed or reliability. Adding the edge computing element will put processing power back in the corporate network for faster results that work, even if the cloud doesn't.

5G will create new market opportunities, new capabilities, and new businesses

5G will come faster than predicted and it will cause big disruptions as it becomes the beginning of a new era for connectivity. Even in its early stages, there has been heavy and widespread investment into 5G, with many providers and organizations already committing resources to test the new equipment, technology, and uses for 5G. In fact, in a recent survey conducted by Ixia, it was revealed that 96 percent of large technology companies plan to leverage 5G and 83 percent will have 5G solutions deployed within the next 24 months.

The transition from 4G to 5G will present numerous business opportunities across multiple verticals. It will ultimately make connectivity much easier and will usher in a new wave of technology and growth for many organizations that otherwise would not be possible.

I, For One, Welcome Our New Bot Overlords

Apps used to be king. From mobile to web apps, every task had a corresponding "There's an App for that!" Now we have Apple, Amazon, Google and Facebook among the number of companies who have placed their bets on a Bot-driven future.

The underappreciated benefit of this course is that it will make networking simpler. No longer will tasks be sent to hundreds of different apps for simple microtasks. Instead everything will be sent to the Bot. Points of failure for outside connection will be easier to find and IT will better be able to keep their companies online.

Public IT Infrastructure is going to Become Your Job

Data centers do not live in the office closet anymore; they may not even be within 100 miles of the nearest major office, let alone the remote branch offices. At home workers and road warriors make up an increasingly large percentage of the workforce - meaning daily tasks depend on servers and networks that do not belong to you.

We have seen the consequences of that with major incidents like the AWS outage in March 2017, where an outage in a single Amazon cloud data center shut down several major online services including Quora, Business Insider and parts of Slack. Many organizations have bought into the hyperscale cloud model and will be at the mercy of these providers to maintain the availability they need. IT teams need to establish more control over their cloud data traffic to prevent any breach in their security and protect customer experience and employee productivity. They will need to establish greater visibility into their clouds as clouds become the dominant mode of communications and processing.

AI finally releases the value of software-defined everything

Artificial intelligence (AI) is definitely a contender for the top tech buzzword of the year, and for good reason. It has enabled great strides in how businesses handle data everywhere from their security teams to their HR departments. Adoption and innovation in this space is not going to slow down anytime soon.

The next big area where we will see investment in AI is the networking space. SD-everything, cloud, and globalization have sidelined the hands-on operating practices IT teams have traditionally used to maintain their networks. Innovative providers are now building machine learning and AI into their network platforms, effectively tailoring network performance as needed, to meet the requirements of the services and applications the network carries. As this trend continues, enterprises will need to maintain the same level of visibility into packet-level data they had with hardware-based networking to take advantage of the possibilities.


About the Author

Jeff Harris 

Jeff Harris is chief marketing officer (CMO) responsible for Ixia's brand and global marketing efforts, including product and solutions marketing, corporate marketing, field marketing, corporate communications and partner marketing. He drives Ixia's corporate positioning, messaging and communications to both internal and external audiences. Jeff has more than 20 years of marketing leadership experience spanning security, wireless networking and semiconductor markets.

Before joining Ixia, Jeff was a senior consultant at Check Point Software Technologies where he led the solution marketing team creating thought leadership campaigns that positioned Check Point for significant growth. He also consulted at Cisco driving go-to-market programs for the networking and security business units. Prior to that, he was Vice President at TrellisWare Technologies, a ViaSat Company, where he led the company's entrance and leadership in the mobile ad hoc networked communications market. Jeff also worked at General Atomics, Lockheed Martin, and UUNET in senior product management and product marketing capacities. 

Jeff received his Bachelor's in Electrical Engineering and Master's degree in Electrical Engineering from George Mason University.

Published Monday, December 18, 2017 7:44 AM by David Marshall
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<December 2017>