Connect with us
Image by Google Gemini Image creator, based on a prompt by Gadget.

Cybersecurity

Top 5 network security trends for 2024 uncovered

With the first quarter of 2024 closed, we can predict fairly accurately what the key security trends will be, writes NIRAV SHAH, vice president of products at Fortinet.

With the first quarter of 2024 now closed, we can predict with a fair amount of accuracy what the key secure access service edge (SASE) trends of the year will be.

Before discussing trends, let’s set the stage so we’re all working with the same understanding of the cybersecurity market today. According to a recent Forbes survey, 84% of companies now have a hybrid workforce and need to secure those work-from-anywhere (WFA) employees’ access to the network, often from multiple locations.

In addition to supporting their WFA staff, IT security teams have to handle many IoT devices connected to their networks. An IDC research document estimates that 42-billion IoT devices are now in use. Industry experts believe the average number of applications an organisation uses, including its remote workforce, is well over a hundred.

Now add the latest cyberthreats, which are becoming more sophisticated and numerous, to the mix, and you have a realistic picture of the current state of cybersecurity worldwide.

Nirav Shah, vice president of products at Fortinet.

SASE Trends for 2024

Given this background, together with what we are hearing from industry analysts, there are five clear SASE trends we foresee becoming a reality over the next 9 to 12 months:

1) Single-vendor SASE will become even more popular

Single-vendor SASE has reached “the tipping point” in the evolution of SASE solutions. Single-vendor SASE ensures the same company delivers all necessary SASE components, simplifying deployment, management, and operations. This contrasts with the traditional process of purchasing SASE components like SD-WAN and firewall services from different vendors. Having products from multiple providers almost always results in complications, preventing smooth integration and creating efficiency issues.

This single-vendor SASE approach also results in a predictable ROI due to fewer point products and clear cost savings due to integration. We estimate that a single-vendor SASE can lead to a 40% or 50% reduction in existing costs.

2) Unified SASE will help fast-track the zero-trust journey

SASE enables the adoption of zero-trust technology. Zero trust is about real-time validation and verification based on user and device behaviour. It’s not enough to verify users, devices, and connections every 30 or even every 15 minutes. Verification must be measured in seconds to ensure you can trust a connection, agent, user, and device whenever they access an application.

A true single-vendor SASE solution also includes unified agent capabilities to help simplify operations. A unified agent allows organisations with a small IT team to troubleshoot and manage everything through a central platform. Consolidation reduces the number of products being employed, and this is enhanced even further by using a single agent for everything.

3) SASE will be supercharged by AI

Integrated SASE solutions must be AI-powered and use machine learning to help detect zero-day threats and protect users from malware, including ransomware. This is a critical requirement because SASE vendors often talk about the simplification their solutions offer. Still, when you look “under the hood” at their security, it is usually an OEM component that isn’t integrated with the rest of their solution. And often, these incomplete SASE solutions do not include threat intelligence, making it difficult to keep them tuned to the latest threats and exploits.

Given the vulnerable nature of remote workers and devices, your number one consideration should be security when selecting a SASE solution. We foresee the most successful SASE solutions will be those that:

  • Are capable of detecting zero-day threats and protecting users from ransomware, which is growing, as per our latest threat landscape predictions.
  • Are not siloed. As a SASE solution is configured and gathers threat intelligence, that data needs to be shared. That means SASE must also be part of the overall security platform strategy and integrated with your security operations centre (SOC).
  • Can be part of the broad product platform so policies, enforcement, and AI-powered capabilities can be applied consistently.

4) SSE will extend connectivity to OT, wired, and wireless LAN devices

We foresee SASE having full flexibility in connecting and securing locations of all sizes, whether large offices, home offices, or even microbranches that don’t have firewalls or SD-WANs.

Because SASE must adapt to any device and location, it will also enable more “coffee shop networking,” which will feature bring-your-own-device (BYOD) and agent-less secure access capabilities. SASE also aims to secure critical infrastructure through operational technology (OT) security integration and its SSE components.

5) End-to-end DEM will be a core part of the SASE solution

Digital experience monitoring (DEM) provides end-to-end visibility. In the market today, DEM is considered by many to be a premium feature, but we predict it will soon become a core component of SASE solutions. Including DEM will result in improved user experience and application performance reports as well as simplification, resulting in faster mean time to detection and remediation. IT teams will feel empowered using this tool. And with DEM integrated into the SASE agent, you will also see reduced operational costs.

In conclusion, organisations are actively transitioning from legacy solutions like VPN to zero trust and SASE, and we foresee an acceleration in that evolution. The key benefits will be consistent security, unified management, reduced overhead, and better user experiences.

Subscribe to our free newsletter
To Top