During the first industrial revolution, the steam engine helped to transform rural to industrial economies. In the second, the United States gained a lead thanks to mass production and the internal combustion engine. The third industrial revolution was that of computers, the Internet, and information technology. The fourth industrial revolution will be marked by technologies such as artificial intelligence, robotics, biotechnology, and quantum computing.
During the World Economic Forum in Davos in 2019, leaders from the financial sector presented the challenge that the world will face by 2040. The low level of technological innovation in the infrastructure of systems was the cause of a deficit of 15 trillion euros, causing great concern in European countries about the future of their infrastructure. To address this gap, security has been established as a strategic contributor and a key component of digital transformation.
We are in the midst of a technological revolution that is changing the threat landscape. This hyperconnected world aggregates data and computation from billions of devices, distributed across a global security network. This network will consist of fully connected intelligent sensors and devices that have no borders. A third generation of security that is based on content and applications will be integrated into the entire infrastructure, covering the above need. The third generation of security will come through a security fabric that provides protection from end to end and across the entire surface where digital attacks take place.
Already, Forninet is creating the Third Generation of Security – Security Fabric to more effectively address complex cybersecurity threats. IoT, software-defined networks and Multicloud are the key components of a hybrid world. The rapid evolution of this hybrid world has increased the “range” of digital attacks, while also increasing the complexity brought about by the implementation of too many independent security solutions. This new generation of security aims to address these challenges with security functions that are fully automated through a single management console, which limits complexity while increasing the possibilities for a more effective response to threats.
The next step in the security sector listens to today’s needs for control of corporate information during its movement, storage and use and helps in the formulation of rules and in the selection of appropriate technical security controls that also cover the use of corporate information outside the perimeter.