SHARE
Facebook X Pinterest WhatsApp

Securing the network in 2009

Dec 31, 2008

Peering into their crystal balls the other day, the guys at network security vendor SonicWALL came up with a list of predictions for their field in the coming year.

Web 2.0 tops their list of villains, as it should. Sure, Web 2.0 technologies like Web-based apps and social networking promote sharing and user-uploaded content and good stuff like that.

However, they cause bandwidth overload and security threats, SonicWALL says.

Streaming video and Flash gobble up bandwidth. And Flash has become a favorite of the bad guys because it’s so widespread that it gets past just about any security and is a great vector for distributing malware.

Also, Web 2.0 apps are fertile ground for exploits, because they are based on user collaboration and user input and there’s no way of ascertaining how safe users are. That means security admins have no control over what is being uploaded or collaborated on.

Malware authors have become experts in using Web 2.0 technologies such as AJAX, which creates rich Internet applications. These open up your system to security breaches, and it would be wise to implement Web filters and gateways to prevent the bad guys from invading your system through them.

Manage your apps properly to prevent bandwidth overload and maintain security, SonicWALL recommends.

As if that’s not enough, the adoption of software as a service (SaaS), and service oriented architecture (SOA) will, like the Web 2.0 technologies, as well as social networking, let bad guys bring in their toys, and SonicWALL recommends deep packet inspection in these cases. Packet sniffing isn’t going to be enough, SonicWALL says.

The increasing sophistication of hackers and malware authors will add to network security managers’ headaches. Your firewall isn’t going to be enough to protect you, SonicWALL says, because the bad guys will use more techniques to evade it.

And port-hopping, which used to be a term reserved for sailors until the advent of personal computing, will contribute to network security woes.

All these factors will push corporations to increase their adoption of unified threat management (UTM) solutions that take a layered approach to network management and security, SonicWALL says. We’ve known for years that a layered approach is best, but how many enterprises adopt it?

Watch your networks closely — they’re at the heart of your enterprise.

Recommended for you...

Facebook Becomes Meta, But Did It Move Too Soon?
Rob Enderle
Oct 29, 2021
Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing
Rob Enderle
Sep 17, 2021
Why AMD Has Been So Successful: Mark Papermaster
Rob Enderle
Sep 9, 2021
Another Crazy Week in Cybersecurity
Paul Shread
Jul 2, 2021
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.