Monday, Jan 16, 2017
HomeTopicsCloudExecutive Viewpoint 2016 Prediction: Bushel – Major Security Breaches Will Change How Small Businesses Protect Data in the Cloud and Beyond

Executive Viewpoint 2016 Prediction: Bushel – Major Security Breaches Will Change How Small Businesses Protect Data in the Cloud and Beyond

The past year saw several large, high profile security breaches. This trend is significantly impacting the global IT industry, and is set to have a noteworthy effect on small and medium businesses especially.

This is because if smaller shops like advertising agencies, call centers, and software vendors want to keep their biggest customers during the era of security breaches, they are tasked with trying to run enterprise-grade security requirements with less employees for each product – ultimately, providing a recipe for bankruptcy disaster.

In turn, 2016 will see small businesses begin to outsource select security requirements to Security-as-a-Service (SECaaS) organizations. These security vendors will range in size and scope, with most charging monthly. Here are the top tools we expect small businesses to look into as a means to fill in the voids of enterprise security requirements:

Centralized, Cloud-managed Antivirus

These are still the same players that have been in the antivirus industry forever including McAfee, Kaspersky, Symantec, Microsoft, and many, many more. However, companies are seeing little reason to have a big, complicated antivirus infrastructure around. Instead, we will see companies pay for a cloud service for a monthly rate, annual rate, or license.

Network Security

There are a number of products on the market that help secure networks but the best security is often a good firewall. Small businesses will start investing in inexpensive appliances from companies like Cisco Meraki and Dell SonicWALL that often come with pretty advanced threat detection.

Proxy Services

A proxy keeps an organization’s devices from connecting directly to the Internet. In 2016, there will be more vendors that provide access to transparent network proxies in a SaaS form for small businesses to take advantage of. Some solutions will simply be open source proxies stored in a cloud environment, while others will be more in depth, such as Virtela – depending on whether companies will use proxy for outgoing traffic and/or incoming traffic or hosted sites.

Device Management

Microsoft, Google, and other device and operating system manufacturers have developed rich APIs that allow customers to manage their devices. Since many of these APIs can be complicated for a smaller business, we will see a rise in features from the third-party ecosystem that integrate device management with other systems to ease the burden of building out infrastructure for device management.

Authentication Services

Once upon a time, all of the assets companies needed to secure were inside the organization’s network. With the prolific nature of cloud solutions that don’t put assets inside a network, new security standards will continue to develop. Small businesses will leverage technologies like Okta, Centrify and OneLogin to provide controlled access and single sign on to a large number of these types of environments. From company Facebook accounts to Office 365 to HRIS solutions, there will be no need for someone to login to 10 different accounts a day just to do their job.

Data Backup

With the rise of SMB-friendly backup solutions like CrashPlan, Carbonite, Mozy, and Backblaze, small businesses will choose to back up their systems with alternatives to expensive tape libraries, software to drive those libraries, and countless hours spent restoring files. As more cloud-based security attacks happen, businesses will realize that having a solid backup is one of the most important aspects to device security.

Endpoint Security In-Depth

Bit9 + Carbon Black is a great example of a solution that scans what is happening on a device in real time and then provides good controls for denying malicious traffic. Companies will start utilizing these solutions, tailored to their organization’s size, to manage and monitor all work devices.

The recent string of breaches doesn’t seem to be slowing. Expect requirements in 2016 to continue to include newer, more advanced security techniques on small businesses. And rather than hiring security experts, expect people at those smaller organizations to look to software vendors and Managed Security Service Providers (MSSPs) to assist with staying secure.

For those in the managed security space, you can expect to have a number of small businesses calling you in the year ahead without being able to communicate exactly what they need, but being able to forward you whatever requirements they have. When it happens, try to spend their money wisely. They are the next generation of big clients.

Bushel

NO COMMENTS

LEAVE A COMMENT

X
})(jQuery)