The perspective of DH2i CEO and co-founder, Don Boxley, about two key developments he foresees in 2019 regarding IoT and Hybrid Cloud, are as follows.
Enterprises will replace VPNs with micro-perimeters - to secure IoT gateway communications
Making smart products, IoT devices, is the new product differentiator - even ovens have IP addresses now. Companies that have been investing in IoT initiatives understand that the IoT gateway layer is the key that unlocks a high return on those IoT investments.
IoT gateways manage device connectivity, protocol translation, updating, management, predictive and streaming data analytics, and data flow between devices and the cloud. Improving the security of that high data flow with a Zero Trust security model will drive enterprises to replace VPNs with micro-perimeters. Micro-perimeters remove an IoT device's network presence eliminating any potential attack surfaces created by using a VPN.
Organizations will replace VPNs with micro-perimeters - for Zero Trust hybrid cloud security
Many organizations are pursuing a hybrid strategy involving integrated on-premises systems and off-premises cloud/hosted resources. But traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud. They weren't designed for them. They're complex to configure, and they give users get a "slice of the network," creating a lateral network attack surface.
A new class of purpose-built security software will emerge to eliminate these issues and disrupt the cloud VPN market. This new security software will enable organizations to build lightweight dynamic micro-perimeters to secure application- and workload-centric connections between on-premises and cloud/hosted environments, with virtually no attack surface.
"In 2019, every hybrid cloud security strategy should be updated to replace VPNs with micro-perimeters." In 2019, every VPN used for a PCI application should/will be replaced with a micro-perimeter. And, in 2019, if a company's hybrid cloud network security strategy relies on VPNs, the CEO should fire their head of network security."