Network Security What is Network Security? Network security controls are responsible for the maintenance of authorized access to internal and external connectivity between systems, protection against denial-of-service to network functions that support interconnectivity, seemlessly secure Hybrid and complex network architectures where traditional network boundaries are eroding with cloud acceleration, edge integration and 5G adoption. Why it matters Most network security controls are a combination of hardware appliance purpose-built for high throughput of traffic and advanced software that are essential to identify malicious activity and respond in near real-time. Blue ball Green ball Yellow ball Red ball Purple ball Diagonal straight lines curves outlines X-labels-Years 0-2 Years 2-5 Years 5+ Years Y-labels-Areas Network Security © Eviden SAS 2024. All rights reserved. Maturity 0-2 years 2-5 years 5+ years 0-2 years 2-5 years 5+ years The landscape On the road to Zero trust With corporate networks, infrastructures, applications and data moving quickly beyond traditional on-premise profiles (e.g. to the cloud, Edge, mobile devices, value-chain partners, etc.), the increasing adoption of Zero Trust architectures and solutions to secure networks is expected. The end of traditional security perimeters Traditional perimeter controls are being redefined (e.g., Firewalls, VPNs), or virtualized and optimally delivered as a Service from the cloud. Functional consolidation and virtualization of core capabilities (SASE, FWaaS) is taking place. The uptake of preventive technologies Preventive network security technologies that are highly agile and compatible with a wide spectrum of enterprises’ IT infrastructures will have an increasing adoption rate. Key figures 41% of those technologies are either already adopted by most organizations or will be in the next two years. 41% of those technologies are expected to be adopted in the next 2 to 5 years cycle. 18% of those technologies are transformational and wide spread adoption will take over 5 years. Explore the top 8 cyber domains’ tech trends Advanced Detection & Response Cyber Incident Response Identity & Access Management Endpoint & Mobile Security Network Security Application Security Cloud Security Data Security