SEATTLE--(BUSINESS WIRE)--ExtraHop, the leader in cloud-native network detection and response, today announced its top predictions for the cybersecurity and technology industries in 2020. Informed by insight from customers, partners, and industry analysts and insiders, ExtraHop leaders predict a year of tool consolidation, headline-grabbing breaches, and a shifting industry focus on what makes a successful tech start-up.
The Year of Deeper Scrutiny for Fast-Growth Companies: “2019 was a tough year for heavily hyped, fast-growth companies going public in Silicon Valley. Several companies that raised huge rounds ultimately failed to deliver expected results or even approach profitability after they went public, and Wall Street was not amused. In 2020, we expect the investment community to more deeply scrutinize companies' financials and business fundamentals, ultimately leading to the support of companies who deliver on their promises, are capital-efficient with sound vision and innovation, and have truly sustainable business results and models to back them up.” —Arif Kareem, CEO
Antiquated Threat Detection Methods like File Hashing and Signature-Based IDS Waste Time: “Since the 1990s, file hashing has been the default mechanism for detecting malicious threat activity, despite the fact that it's ineffective against modern attacks that use polymorphic or fileless methods to go undetected. The same goes for signature-based IDS, which is extremely noisy while providing very little actual alert context. Security teams will continue to rely on these antiquated methods of detection because they are expected to, regardless of how well they work in today's threat landscape.” —Jesse Rothstein, CTO and co-founder
Accountability for the Ethical Use of Users’ Data: “Recent headlines tell of giant data corporations like Google and Facebook monetizing users' data and lacking sufficient transparency in these activities. There’s already been significant social backlash, but in 2020 we predict that users will demand companies not just follow the often-dated laws, but that they also do what’s right. Regulations like GDPR and CCPA are helping to bring more clarity around what’s appropriate, but 2020 will be the year that the industry is held accountable for the ethical — in addition to regulatory-compliant — use of personal data.” —Raja Mukerji, CCO and co-founder
A Slowing Economy Will Force Tool Consolidation: “In security programs, it's been very difficult to turn tools off. What gaps will I create? What unintended consequences will I see? As the economy has rolled along over the last decade, most security programs have had the necessary funding to add new tools and retain legacy tools under the guise of risk management. Economic slowdown is likely to change all of that, as investments in new technology will require cost savings elsewhere. A tighter economy will finally cause us to pull the plug on legacy security tools.” —Bill Ruckelshaus, CFO
"Observability" Will Gain Ground as Both a Concept and a Vocabulary Term in Security and DevOps: “Observability is a term that several companies are using to describe the practice of capturing metrics, logs, and wire telemetry (or sometimes other data sources, mostly in the DevOps space). The value of correlating insights from these data sources has gained enough ground that vendors need a word for it. Observability, The SOC Visibility Triad, and other terms have been spotted in marketing materials and on big screens and main stages at security and analytics conferences. In 2020, we'll see heated competition to control the vocabulary and mental models that enterprises and vendors use to discuss and market security best practices regarding gathering multiple data sources and correlating insights between them.” —John Matthews, CIO
A Major Information Leak from a Cloud Provider is Coming: “In 2020, we are likely to see a major information leak from a cloud provider. While at the same time the cloud providers are providing many useful built-in tools, it's not clear that they are using their own tools to secure themselves. As a further prediction, the leak will not effectively diminish migration to the cloud. As we have noticed with other breaches, they do not significantly erode confidence in the services.” —Jeff Costlow, CISO
Cybersecurity Will Finally Become a Top Priority in the 2020 Election: “The 2020 election is right around the corner, and so far there’s been little focus on the importance of cybersecurity on the campaign trail. Sure, there’s been an ongoing discussion about Russia’s involvement in our 2016 election, but no candidate (Democrat or Republican) has elevated cybersecurity to be a central theme in his or her campaign. That will change in 2020. That must change in 2020! Technology innovation and business transformation fuel the American economy, but security and trust are at the heart of it all. National defense is a priority for all Americans, but it won’t happen without security innovation. As we move into the heart of the 2020 election season, one of our candidates will wake up and elevate cybersecurity to the national discussion, where it should be.” —Bryce Hein, SVP Marketing
The Wave Begins Towards Security Tool Consolidation: “Organizations will take a strong look at the number of security vendors within their ecosystem in 2020 to determine overlap and begin a move towards consolidation of tools. The winners will include those that have proven their API superiority and ability to work together within an organization’s ecosystem. The losers will be those who have not proven their ability to strengthen core security.” —Chris Lehman, SVP of Worldwide Sales
A Vendor Will Be Responsible for a Major Breach of Data Due to Phoning Home: “In 2019, ExtraHop issued a security advisory about the vendor practice of phoning data home and how this is happening without the knowledge of customers. The problem with this practice is that it expands the attack surface via which that data can be breached, exposing it to threats within the vendor’s environment. 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers. Regulations like GDPR have imagined exactly this type of scenario and laid out specific requirements for data controllers and data processors. But when such a breach occurs, it will have broad impact and implications.” —Matt Cauthorn, VP Security
The Big IoT Breach is Coming: “In 2017, major ransomware attacks crippled the networks — and operations — of major global organizations. While those attacks did billions in damage, for the most part, IoT devices were left unscathed. But sooner or later (and probably sooner) the big IoT breach is coming, and it could have global implications. Whether it happens in the US or abroad, in healthcare, shipping and logistics, or manufacturing, IoT devices around the globe are fertile hunting grounds for attackers. Taking down every connected device — from telemetry sensors to infusion pumps to mobile points-of-sale — could easily grind operations to a halt.” —Mike Campfield, VP of Global Security Programs
To learn more about the company's industry-leading cyber analytics platform, visit https://www.extrahop.com/solutions/security/ and explore the Reveal(x) live interactive online demo: https://www.extrahop.com/demo/
About ExtraHop
ExtraHop provides enterprise cyber analytics that delivers security and performance from the inside out. Our breakthrough approach analyzes all network interactions in real time and applies advanced machine learning to help you investigate threats, ensure the delivery of critical applications, and protect your investment in the cloud. With this approach, we help the world's leading enterprises including Credit Suisse, The Home Depot, Caesars Entertainment, and Liberty Global rise above the noise of alerts, organizational silos, and runaway technology with complete visibility, real-time detection, and guided investigation. To experience the power of ExtraHop, explore our interactive online demo or connect with us on LinkedIn and Twitter.
© 2019 ExtraHop Networks, Inc., Reveal(x), and ExtraHop are registered trademarks or marks of ExtraHop Networks, Inc.