I have been in the computer field for 25 years, and it is only been in the past six years or so that security has become the major issue it has, said Rainer Mueller, IT analyst for the City of Encinitas in California. We are forced to spend much more money, time, and effort than we ever have to keep our facility and information secure. And unfortunately, I believe that this will continue for the foreseeable future.
Is the Mac Really More Secure than Windows?
Web 2.0 Security: Application Scanners
Spam Bust: The Lessons of Yesmail
Pirated Vista, Office 2007 Already on The 'Net
Like those pioneers who always packed a six-gun, IT staff are forced to take a vigilante approach rather than waiting for the sheriff to arrive. So, as security threats continue to grow, so do the number of companies turning to security appliances.
These days it is standard-practice to install many things on an appliance, said Paul Stamp, senior analyst for Forrester Research. An appliance can use custom hardware to accelerate functions more quickly and efficiently than just using multipurpose hardware with some software installed on it.
Consequently, we are witnessing a steady rise in the use of security appliances. According to IDC, the market for threat management hardware will pass the $5 billion threshold by 2009, due to the distributed nature of security duties throughout the IT organization.
We are starting to find a lot of functions that were being done by security are being offloaded to different teams, such as the networking staff, he explained. Network teams are not used to dealing with software, but they are accustomed to appliances.
This blossoming security appliance market breaks down into several categories. The largest group is the firewall and VPN appliances that come from a wide array of networking and security vendors.
Then there are specialized security appliances to address specific activities. Decru, now part of Network Appliance, has something called the DataFort, a dedicated appliance for encrypting and decrypting network traffic.
Bluesocket of Burlington, Mass., makes appliances for controlling the interface between wired and wireless segments of a network. ConSentry Networks makes appliances that sit between the access and distribution layers on a network fabric and use algorithms to detect network anomalies, and the list goes on and on.
Further, there are perimeter security devices from vendors which have their roots in the antivirus space. Although security vendor Symantec laid off its security appliance staff last year in order to concentrate on managed services, both McAfee and Panda Software have unified threat management appliances which address a range of security issues.