Security virtualization rising in demand

India has become a hotspot for security attacks. The fraud industry is so advanced that newer standards are set by breaches each day, literally keeping the security solution providers on their toes. Leaving behind the traditional signature based detection techniques, there is a demand to develop behavioral and statistical anomaly based techniques to provide protection against blended threats,” Rajeev Goel, vice president, iPolicy Networks, security products division of Tech Mahindra Ltd. He speaks at length about the security demands, vulnerabilities and trends in network industry. The prevailing trends in the network security sector.

The emergence of a plethora of Internet applications, social networking sites and proliferation of web-2.0 are paving the way for several security vulnerabilities and attack vectors. In the present scenario, there is a need to develop deep understanding of applications behavior of security products. This is leading to a deeper packet inspection for application management and control that has more processing power, in addition to integration of more security services in the UTM space. Leaving behind the traditional signature based detection techniques, there is a demand to develop behavioral and statistical anomaly based techniques to provide protection against blended threats. Security technologists continue to find ways to perform deeper content inspection for application and state identification in addition to anomalous behavior of protocol without compromising on performance.

Some of the other network security trends are business trends: Today, businesses are shifting toward integrated threat protection based solutions in the enterprise segment. Moreover, SaaS based models and mobile security solutions are being looked upon as major growth drivers. Technology trends: Rollout of higher capacity appliances and solutions that are capable of deeper inspection. Security virtualization solutions are coming up in a big way. Prevention technologies against blended threats are also on the rise. Architectural trends Virtualization support at processor and hardware level, deep inspection for application identification and content inspection, virtual execution to understand malware behavior and faster anti-virus and anti-spam technologies. Virtualization technologies are rapidly being developed to protect security contexts and isolate one from the other. Plenty of work is also being done on the integration of different types of defense mechanisms so that feedback from one into the other can be used to pose a comprehensive defense posture against the emerging attacks

India at the focus of security attacks. What are the major security challenges that enterprises and service providers face today. Emergence of social networking sites and plethora of Internet applications, which powers you to do almost ‘whatever you desire for’, has lead to the explosive growth of the Internet in India. Interest levels, in trying out newer applications, are so high today that often users blissfully forget the security aspects while clicking on an attractively presented phishing link or opening a site, which can jeopardize one's privacy. This elevated state of vulnerability, combined with the attacks from latest threats like botnets, spam, phishing and malware, poses a serious challenge to enterprise security state.