Feeds

The security appliance is dead – report

Long live the security services switch

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Yankee Group is advising clients to stop buying security appliances and to consider investing in security switches instead.

Two Yankee Group reports, Security Services Switches Mark the End of Security Appliances, and Security Service Switches to Rule the Day: Security Appliances are Dead!, declare the end of the security appliance market and the ushering in of security service switches. The US analyst firm predicts 25 per cent of Fortune 100 companies by the end of this year will have deployed SS switches to protect their critical communications assets.

So what the heck is a security services switch? We'll let Yankee provide a definition.

Security services switch have three basic components: performance, security services, and management. "The components are part of a switching architecture that can be located on separate blades, but must be provided in a single rack-mountable configuration collapsed into the same network-based chassis," Yankee explains.

"The combination of these three components distinguishes SS switches from rudimentary security appliances and positions them as the intrusion-prevention platforms of choice for enterprises over the next three to five years," said Matthew Kovar, Yankee Group Security Solutions & Services director.

"SS switches are significantly superior to security appliances because they are designed to enhance security performance, whereas security appliances are optimised for network performance, specific to a particular host and application."

According to Kovar, incumbent network equipment vendors, "including Cisco, Alcatel, Nokia, Siemens, and Ericsson, will acquire SS switch vendors by the end of 2004".

This prediction seems reasonable in the case of Cisco but less likely for, say, Alcatel and Ericsson, two firms in the throes of Permanent Reorganisation. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.