Network Security

2014: The year network security operations become orchestrated

The pastfew years have set the stage for some disruptive shifts in network securityoperations. These shifts are driven in great part by the rise of virtualizationand the cloud, which have enabled organizations to deploy applications much faster.Occurring in tandem, the proliferation of network and next-gen firewalls insidethe perimeter has made them essential for successful application deployment becausefirewalls literally connect applications to the network. These convergingtrends have fused application and network layer functions, causing a fundamentalreset of the security operations function.

I was anticipatingseveral key outcomes to catch fire in a big way in 2014, but in light ofthe major 2013 announcements by Cisco, VMWare, Palo Alto Networks and F5Networks around network automation and application-centric abstraction, I thinkit is safe to say the spark has already caught. With that being the case, I am now willing to double down on my2014 predictions:

  • Orchestrated management of network infrastructure will be embraced as the next big thing with change management being the catalyzing use case.

  •  This will drive a convergence between security and IT operations (fueled concurrently by the rise of DevOps). As a result of this fusion, many organizations will merge these functions into one unit. This new and improved, security-aware IT operations team will have a very clear charter: to deploy applications faster, better and more securely. This will not only align security with the business, but enable security to help drive the business forward. 

  • These next gen IT ops teams will give rise to a new role– the application-infrastructure manager, a role that will blend networking, security, storage, virtualization and application expertise into a single position.  These folks will be require a broad cross section of technical expertise, but the effort spent to developing such a well rounded, diverse skill set will be rewarded with job security.  Plus, they will have specialized tools to help ensure seamless and secure application delivery. 

So if we look at my first prediction let's begin by lookingat the definition of orchestration. According to Wikipedia, orchestration“describes the automated arrangement, coordination, andmanagement of complex computer systems, middleware, and services.” Traditionally,the concept of Orchestration has been primarily used in the context of theCloud, SOA and virtualization, however, it has caught on in network securitycircles in a big way because firewalls – which fall under the purview ofsecurity operations teams – have become the lynch pin between applications andthe network.  The need to deploy,decommission and maintain more applications faster has caused the volume andfrequency of firewall (aka Security Policy) changes to increase exponentially.  Managing those changes in a fast, secure andcompliant way is essential to keep applications up and running on the network.

As such, firewalls have become the natural focal point fornetwork layer orchestration.  Orchestrationsignificantly automates painful manual security policy change processes whilepreserving governance and control over the process, which is absolutely crucialfor security-related changes.  Inaddition, orchestration provides the capacity to automatically provisionchanges to relevant devices and systems such as applications and servers that requirecurrent and accurate security policies. 

Additionally, if you look at the broad orchestration-relatedannouncements made in 2013, it's safe to assume that my prediction will play out,as these platforms become embraced and validated in production environments in2014.  This will create a healthy balancebetween business units, some of which may have already been automated.  So when I predict that orchestration will“drive the business forward,” that is not lip service.  In fact, the benefits have already beenidentified and are clearlyquantifiable.  

This segues into my second prediction: that in 2014, security ops will converge with IT opsto the point where they no longer exist as separate entities. This convergenceis already underway. A recent survey of 502 IT executives revealed that71 percent had to adopt new processes, learn new technologies and interact withnew people because of trends like Cloud, IPv6, DevOps and virtualization.  Fifty-fivepercent reported that new business initiatives now require security's input,and almost one third reported that they require data from new stakeholders inorder to design proper security policies. As a result, security teamsare engaging IT Ops teams earlier and much more often.  As organizations continue to virtualize theirinfrastructure, these groups do more then engage – they will merge. I expect tosee that happen en masse in 2014.

As thisoccurs, my third prediction will then come into play – the rise of application infrastructuremanagers. This role will be the face of the evolved IT Ops teams thatwill emerge in 2014.  Application infrastructuremanagers will need to possess a well-rounded skill set and are as likely tocome up through the security and networking side as they are to come from the applicationand/or virtualization side.

While I mightbe a bit early on this last one, I'm still placing my bet on 2014 for us tostart hearing about application infrastructure managers.  I'm willing to bet that I'll see the title ona business card before the end of the year.  Time will tell.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.
Reuven Harrison

Reuven Harrison is CTO and Co-Founder of Tufin. He led all development efforts during the company’s initial fast-paced growth period, and is focused on Tufin’s product leadership. Reuven is responsible for the company’s future vision, product innovation and market strategy. Under Reuven’s leadership, Tufin’s products have received numerous technology awards and wide industry recognition. Reuven brings more than 20 years of software development experience, holding two key senior developer positions at Check Point Software, as well as other key positions at Capsule Technologies and ECS. He received a Bachelor’s degree in Mathematics and Philosophy from Tel Aviv University.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds