Mobile devices. Public cloud. Cloud infrastructure. User behavior. Security professionals who participated in Cisco’s third annual Security Capabilities Benchmark Study cited all those elements as top sources of concern when they think about their organization’s risk of exposure to a cyberattack (
Figure 1). This is understandable: The proliferation of mobile devices creates more endpoints to protect. The cloud is expanding the security perimeter. And users are, and always will be, a weak link in the security chain.
As businesses embrace digitization—and the Internet of Everything (IoE)¹ begins to take shape—defenders will have even more to worry about. The attack surface will only expand, giving adversaries more space to operate.
For more than a decade, the
Cisco® Visual Networking Index (VNI) has provided global IP traffic forecasts and analyzed the dynamic factors that facilitate network growth.
Consider these statistics from the most recent report,
The Zettabyte Era—Trends and Analysis:²
- Annual global IP traffic will pass the zettabyte (ZB)threshold by the end of 2016 and reach 2.3 ZB per year by2020. (A zettabyte is 1000 exabytes, or 1 billion terabytes.)That represents a threefold increase in global IP traffic inthe next 5 years.
- Traffic from wireless and mobile devices will account fortwo-thirds (66 percent) of total IP traffic by 2020. Wireddevices will account for only 34 percent.
- From 2015 to 2020, average broadband speeds will nearly double.
- By 2020, 82 percent of all consumer Internet traffic globally will be IP video traffic, up from 70 percent in 2015.
In addition, the Cisco
VNI™ Forecast and Methodology, 2015–2020 white paper³ predicts that the volume of global Internet traffic in 2020 will be 95 times as great as it was in 2005.
Of course, opportunistic cybercriminals pay close attention to these trends, too. We are already seeing operators in the shadow economy taking steps to become more agile in this changing environment. They are creating highly targeted and varied attacks designed to succeed across the expanding attack surface.
Meanwhile, security teams are in a constant firefighting mode, overwhelmed by alerts. They’re having to rely on an array of security products in the network environment that only add more complexity and can even increase an organization’s susceptibility to threats.
Organizations must:
- Integrate their security technology
- Simplify their security operations
- Rely more on automation
This approach will help reduce operational expenses, ease the burden on security personnel, and deliver better security outcomes. Most important, it will give defenders the ability to focus more of their time on eliminating the unconstrained space in which adversaries currently operate.