• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is Secure Access Service Edge (SASE)
      • What is Security Service Edge (SSE)
      • What is a Cloud Access Security Broker (CASB)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

Top 10 networking and security trends and challenges

Author avatar of Lorraine BellonLorraine Bellon
July 23, 2020 • 5 minute read
View blog >

You’ve heard it so many times that it probably sounds like a cliché at this point: the way we work has changed. But how, exactly, has it changed?

Your employees need the same level of network performance and security they would get if they worked in a central office, but they don’t work in the office. They work from kitchen tables, in airport lounges, and on public transit. Your IT team is tasked with protecting those users and delivering the reliability and productivity they’ve come to expect from a traditional network, but with a wildly different network topology and expanded perimeter. And – they must do it with limited time and strained resources, while still leveraging your existing investments.

Sounds easy, right? Spoiler alert – it’s not.

Even before the unprecedented shift to remote working in the first half of 2020, several key trends emerged over the past decade that have reshaped working styles. These changes led to changes in the networking and security landscape needed to support workers.

In this post, we’ve identified 10 key trends and challenges that have changed the game for networking and cybersecurity professionals.

1. Increased cloud adoption

Over the past decade, public cloud usage has exploded in popularity. Every year, enterprises produce more data, and increasingly this data is being stored in software as a service (SaaS) applications in the public cloud. In 2019, Enterprise Strategy Group projected that 60 percent of organizations will use SaaS applications for greater than half of their business needs by 2021, and that number is only expected to increase.1 It’s essential to have strong security in place to protect that data no matter where it resides.

2. More network traffic

There’s been an explosion in the sheer amount of business data transferred over the corporate network – for example, just look at how much video content is created and shared today. Data-intensive applications require large amounts of network traffic, which creates demand for more bandwidth that strains existing network infrastructure and centralized security processes.

3. More remote and roaming workers

The new normal includes thousands of employees working from home, either temporarily or indefinitely. These users need to be protected as well as their counterparts at main office locations, even if their network traffic is going directly to the Internet. Most companies have VPN policies in place for employees working from home, but 85% of companies believe their employees regularly violate those policies.2

A roaming worker is any employee that works from a home office or from another non-office location (like a client site or hotel room) at least one day a week. Though some workers are full-time roaming users (like traveling consultants), many other employees take on a “roaming user” role whenever they travel for business or work in a public place like a café. Roaming users need secure access to corporate resources even though they are outside the traditional network boundary.

4. More branch offices

When employees do work in an office, chances are good that they don’t all work in a single headquarters location. The days of all employees working together in one place are long gone for all except the smallest companies. As organizations expand into new markets, often by acquiring smaller companies and their office footprints, their number of branch offices grows too.

5. More network inefficiency

Traditionally, an organization would backhaul network traffic from branch offices and remote workers to headquarters to apply security policies, often using MPLS links. But as more data and devices join the network, that model leads to efficiency problems. Traffic destined for the Internet gets funneled to a headend (such as a corporate headquarters or data center) that directs it through a set of security checks and then provides Internet access — which creates a bottleneck.

6. Higher networking costs

Along with the increase in data and traffic, there’s been an increase in the cost of providing reliable network bandwidth to users. A traditional WAN connects users at branch or satellite locations and applications hosted on servers in a centralized data center. These connections are usually created with dedicated MPLS circuits. However, these dedicated circuits are costly to provision and maintain, and they don’t scale or adjust quickly as business needs change.

To combat this problem, 79% of organizations are either investigating, or already using, broadband direct internet access (DIA) at branch locations instead of backhauling traffic over MPLS.3 But DIA introduces new security challenges.

7. Performance issues with SaaS apps

Many businesses today use SaaS apps to conduct critical business functions, like sales operations, human resources, and general administrative work. But if those SaaS apps are set up to backhaul traffic using existing network links or VPN tunnels, users can experience latency, lost productivity, and frustration. When users experience performance issues with corporate-approved apps, they often turn to unauthorized and potentially risky apps to get their jobs done. More than 1,200 cloud services are used in the average large enterprise today, and as many as 98 percent of them are not approved by IT.4

8. Security talent shortage

3.5 million cybersecurity jobs worldwide will not be filled by 2021.5 With unemployment on the rise, what’s the reason for this shortage? Qualified security professionals are difficult to find, expensive to hire, and tough to retain. Even when you do find a security rock star, your teams require significant investments in costly training to stay ahead of the latest security threats and networking challenges. The skills shortage leads to security blind spots, which can have a huge impact on organizations.

9. Too many security tools

Knowledge is power, but sometimes too much information is just that – too much! Remember those security professionals you just hired? They’re tasked with analyzing data from many different standalone security products that don’t integrate with each other. These different products all require different knowledge levels and skill sets to operate and maintain, and each one takes time. A recent Cisco CISO benchmark study indicates that most organizations find it challenging to orchestrate alerts from different tools, which affects their ability to monitor and correlate information quickly enough to respond to threats before they cause serious damage.6

10. New cyberthreats taking advantage of security gaps

Advanced cyberthreats like ransomware and remote access trojans (RATs) take advantage of a lack of visibility and control in a distributed network. Remote and roaming users are particularly susceptible because the traditional centralized security model doesn’t protect them effectively. That’s why 68% of organizations experienced attacks in which a branch location or roaming user was the source of compromise.7

Top 10 networking and security trends and challenges - Cisco Umbrella blog SASE For Dummies ebook cover

Putting it all together

Your organization needs to consider innovative new networking and security options to address today’s challenges successfully. It might feel overwhelming, but we’re here to help you get started on the journey. Read our ebook Secure Access Service Edge (SASE) for Dummies to learn how cloud-delivered networking and security can transform your organization for the better. In just five short chapters, you’ll be well on your way to a better experience for your users and less stress for your IT team.

1 Enterprise Strategy Group, The Rise of Direct Internet Access, 2019
2 Enterprise Strategy Group, The Rise of Direct Internet Access, 2019
3 Enterprise Strategy Group, The Rise of Direct Internet Access, 2019
4 Enterprise Strategy Group, The Rise of Direct Internet Access, 2019
5 Cybersecurity Ventures, Annual Cybersecurity Jobs Report, 2019
6 Cisco, Securing What’s Now and Next: 20 Cybersecurity Trends for 2020, 2020
7 Enterprise Strategy Group, The Rise of Direct Internet Access, 2019

Suggested Blogs

  • Cisco Umbrella Delivered Better Cybersecurity and 231% ROI February 21, 2023 2 minute read
  • Cisco Listed as a Representative Vendor in Gartner® Market Guide for Single-Vendor SASE January 26, 2023 3 minute read
  • How to Evaluate SSE Vendors: Questions to Ask, Pitfalls to Avoid June 23, 2022 5 minute read

Share this blog

FacebookTweetLinkedIn

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella