[wp_tech_share]

In the new year, the time is ripe to reflect on our 2022 predictions and look to a fresh batch of 2023 predictions. A year ago, we made the following predictions for 2022:

  1. Only a minority of enterprises will fully deploy SASE in 2022, but all will force SASE of their vendors
  2. The physical Firewall market rebound will modulate, while cloud-centric security will continue to grow faster
  3. Firewall-as-a-Service will begin to cannibalize carrier-class Firewall physical appliances

On our first prediction, we believe we were right. SASE, an architectural IT direction to transform and unify WAN-centric networking and security for branches and remote users, continued to gain interest and traction. However, how the enterprises deployed SASE networking versus security technologies remained extremely disaggregated and on different timelines due to the difficulty of changing too many parts simultaneously. The implications for the technology vendors were that irrespective of whether disaggregated or unified–or even whether single-vendor or multi-vendor SASE–they had to demonstrate to customers that they could help them on their SASE journey today and into the future. In other words, vendors were forced to show SASE capability even if customers didn’t yet take advantage.

Our second prediction was a split decision. We were right that cloud-centric security–the SaaS- and virtual-based variants of network security solutions–would grow faster than traditional network security solutions. While there will always be a role for hardware, the ongoing shift to the cloud limits the role that hardware can play in the enterprise, particularly in the data center. However, as corporate networks–or even cloud service provider networks–footprint expands in size, hardware firewalls play a role. We are wrong about how much appetite the market still had in 2022 after robust 2021. 4Q22 numbers haven’t come in, but if current trends hold, the full-year 2022 revenue growth of the hardware firewall market will match the 2021 rates.

Our third and last prediction was the boldest, and we were wrong. We still believe that cloud-based firewalling can and will eventually put pressure on the highest tiers of firewalls (carrier class), but 2022 was a different year. However, at the branch or even small data center level, we did some start on displacing lower-end firewalls.

Gazing in our crystal ball, we have the following three predictions for 2023:

1 – Security spending to remain stable in looming economic storms

Most economists predict that in 2023 the worldwide GDP growth rate will be weaker at 2.1% compared to the actual 6.0% and expected 3.0% growth in 2021 and 2022, respectively.  Put in perspective, 2.1% growth would be the third weakest rate of growth in the last 20 years and only overshadowed by the Great Recession in 2009 and the Covid-19 drop in 2020.

While it would be folly to say security spend will break records in 2023, we expect it to remain stable against increasing economic storminess. Of late, security has and is expected to continue a board-level discussion and hence be a top investment priority. Attacks aren’t stopping even if the economy does. No CEO wants their mugshot on the nightly news because of a security breach.

2 – SASE to keep growing, but a split decision between networking and security components

SASE is the amalgamation of networking (SD-WAN) and security (security service edge [SSE]) technologies. Most enterprises have and will continue to purchase separate SD-WAN and SSE solutions to (eventually) integrate them to achieve the disaggregated form of SASE. We expect enterprises to continue to prioritize the security side of SASE but slow down the networking side as the economic pressure increases. As a result, we foresee the SSE-side of SASE to post another year of solid growth in 2023, but we anticipate that SD-WAN will see a marked deceleration in its growth.

3 – Increased cloud breaches to cause spending on cloud workload security to be over $6 B in 2023, which is over 4x higher than in 2020

This past Fall, we issued our first Advanced Research Report on the cloud workload security market, which goes by various names, including CNAPP, CWPP, and CSPM. We delved into this space because network security vendors have entered cloud workload security as a natural adjacency. We found a market in hypergrowth as enterprises that have or embrace the cloud find many new, thorny security problems. As a result, we expect that enterprises will have to spend the money and lead the cloud workload security market past the $6 B mark, which is 4x higher than in 2020.

A year from now, we’ll reevaluate and see what came true. Until then, all the best in the new year.


Watch This Video:

What’s next for SD-WAN, SASE, and network security in 2023?

[wp_tech_share]

There’s nothing like starting the New Year armed with the latest information and insights; so I thought I would share some of Dell’Oro Group’s key predictions for the Wireless LAN market in 2023.

Supply chain acrobatics was the name of the game for Wireless LAN in 2022.  Manufacturers demonstrated some impressive flexibility by redesigning products, expediting components, and paying for air freight in a bid to fulfill their accumulating orders. Just as the lockdowns were underlining the importance of Wi-Fi to the hybrid work model, WLAN equipment became a scarce commodity.

In 2023, the WLAN market will be all about growth. It’s not that the supply constraints have gone away, but they are lessening, and the solutions put in place by the manufacturers are bearing fruit. Meanwhile, enterprises are still clamoring for connectivity.

In this context of accelerating supply meeting backlogged demand, here are a few predictions for the year to come.

1) The Enterprise Class WLAN market will surpass $10B in 2023

Last year, we projected that the WLAN market would break the $10B mark in 2025. However, the last couple of quarters of 2022 showed us how high prices can combine with rising unit volumes to bring record-level revenues. We’ve brought our $10B prediction forward an astonishing two years.

After one of the most prolonged periods of year-over-year price increases, it may seem bold to predict that they will keep rising into 2023. However, there are a couple of unfolding trends backing up this prognosis.

First, prices over the past few quarters have been driven up by the adoption of Wi-Fi 6 (802.11ax) – and there is still room for Wi-Fi 6 to grow. Its adoption curve has been altered by the supply constraints but we are still expecting several more months of gain in share of shipments.

The second trend buoying prices is the rise of manufacturers’ costs, which has been passed on in the form of WLAN price increases. With a backlog worth two quarters of revenues for most manufacturers outside China, it takes at least six months for the higher-priced WLAN orders to flow through to delivery. This means a boost to manufacturers’ revenues in the first half of 2023. Eventually, the basic laws of economics will prevail and price erosion will kick in.  We are predicting that prices will peak and start to come down in the second half of the year.

 

2) Unit shipments will defy the usual seasonality

History tells us that the Enterprise Class Wireless LAN market is back-end loaded. That is, the majority of units are shipped in the second half of the year.  But 2023 will be a year like no other. The industry’s unprecedented backlogs are coinciding with a period of slowing economic growth.

In 2023, we predict that the market won’t follow its usual seasonality, and half of the year’s units will be shipped in the first two quarters of the year – six points above the five-year average.

 

3) The WLAN industry will gain clarity around Campus Network As A Service offers, and the NaaS business model will be put to the test

The term “Network As A Service” was bandied around quite a bit in the context of Campus IT services in 2022, although the industry lacks a common definition for the term.

On one hand, we saw new companies, like Meter, Nile, and Shasta promising to change the way enterprises consume Wireless LAN, building their brand on both technological and pricing innovation. The latter involves moving Wireless LAN from an upfront purchase to a recurring monthly expense, often based on a simplified metric, such as office area or number of employees – a metric that is more intuitive than the number of access points or switches.

On the other hand, we heard incumbent HPE Aruba announce some mega-NaaS deals, with large retailers and educational institutions. These companies bought the As A Service offer in part because it included “Day-2 Operations”; that is, professional services such as network design, monitoring, and troubleshooting. This definition of NaaS is similar to Managed Wi-Fi offerings already being delivered by service providers and systems integrators.

As we peel the onion of the different Campus NaaS offers, we find important dimensions such as consumption-based pricing; a mix of self-managed, co-managed, or fully-managed equipment; value-added network services, service-level guarantees; evergreen technology offers;  and AI-enhanced operations.

Which market segments will be attracted to which definition of Campus NaaS? How will the service impact manufacturers’ revenues?  We will start to get some answers in 2023, and Dell’Oro Group will be front and center in defining and sizing the opportunity.

 


Watch This Video:

What’s next for Enterprise Class Wireless LAN market spending in 2023? 

[wp_tech_share]

In this blog, Sameh Boujelbene, Senior Research Director for Data Center Switch Ethernet, will share two key takeaways from the OCP Global Summit’22 event related to SONIC adoption and high-speed optics.

[wp_tech_share]

In this new blog, exclusively contributing to RCR Wireless, Siân Morgan, Research Director for Wireless LAN market, will explore whether these are the reasons that Wi-Fi 6E adoption has lagged, or whether other factors could be preventing access to the 1200 MHz of spectrum that was supposed to bring us better-performing Wi-Fi.

[wp_tech_share]

 

After being canceled in 2021 and postponed numerous months this year, the 2022 edition of the RSA Conference (RSAC) finally went into the books last week. Perhaps throwing a bit of caution to the wind–we are still in a pandemic after all–I met with nearly 40 vendors, 23 of them consisting of at least a 30-minute conversation and sometimes a couple of hours. In this blog, I summarize three takeaways from my week at RSAC 2022.

  1. Buzzwords starting with ‘S’ keep coming: SWG, SD-WAN, SASE, and now SSE

The industry likes buzzwords that start with ‘S’ for whatever reason. The first ‘S’ came some twenty years ago with the arrival of SWG (Secure Web Gateway). Then came the second, SD-WAN, around a dozen years ago. After that, things were quiet until three years ago, when the third, SASE (Secure Access Service Edge), arrived. And the most recent, SSE (Security Service Edge), emerged last year and was in full view at RSAC 2022.

So why SSE? I blame the pandemic.

The pandemic caused an explosion in remote work that exposed severe inadequacies in enterprise IT networks to handle large numbers of remote workers. Fortunately, a crop of vendors–most with a SWG pedigree–were poised to help with their cloud-based security that was ideal for remote work. But SWG was a twenty-year-old marketing term and no longer cool. So instead, vendors wrapped themselves in the SASE mantel.

Confusion ensued since there were competing narratives by networking vendors, who ironically were primarily SD-WAN vendors and tended to remain more faithful to the original SASE premise of network and security convergence. So instead of picking sides, the industry created a new term, SSE, to let security vendors distinguish themselves. So yes, today’s emerging SSE vendors are, in many instances, yesterday’s SWG vendors. What’s different about SSE than prior SaaS-based SWGs is that now multiple security functions run in the cloud, such as CASB (Cloud Access Security Broker), ZTNA (Zero Trust Network Architecture), and FWaaS (Firewall-as-a-Service).

At RSAC, there wasn’t much talk about SD-WAN, but there was about SASE and SSE. It was humorous to hear certain security vendors sometimes use SASE and SSE in the same sentence as if they were freely interchangeable. On the one hand, they were trying hard to check off all the buzzwords, but on the other, a clear symptom of immature markets.

 

  1. Traditional Network Vendors Double Down and Get More SASE

Two stalwarts of the enterprise networking landscape, Cisco and Juniper, introduced updates to their SASE portfolio.

Cisco has had all the pieces to deploy SASE for some time, but there was no substantive integration. At RSAC, they introduced a new strategy to build a tighter integration between the Cisco SD-WAN and SSE (Umbrella) houses through a new unified manager based on the Meraki cloud management platform. Moreover, Cisco intends to sell everything, whether the cloud service or the hardware, as a subscription.

Meanwhile, Juniper has improved its recently introduced cloud-based security platform, Secure Edge. At RSAC, they announced the addition of CASB and DLP (Data Loss Prevention) services to Secure Edge. Like Cisco’s management approach, they also have a unified manager, Security Director, spanning SRX firewall elements and the cloud-based Secure Edge.

Both Cisco and Juniper are taking an interesting approach to SASE. It’s not all in the cloud since the networking/SD-WAN piece is still effectively on-prem, but nor is it disaggregated bag of parts. They’ve provided me with a lot of food for thought that I plan to infuse into my upcoming SASE research.

 

  1. Cloud Workload Security Remains a Smorgasbord

Over the last half-year, I’ve been meeting with vendors large and small to understand what cloud workload security, i.e., securing apps/workloads moving to a cloud architecture, means to them. From the onset, things have been cloudy (no pun intended).

On the one hand, we can all agree that the enterprise shift to the cloud is a significant change in IT architecture. The challenges, nuances, and caveats that must be dealt with during the journey from a traditional on-prem legacy app enterprise to a cloud-based, cloud-native app enterprise are significant.   It’s a problem-rich environment that has given rise to dozens, if not hundreds, of security vendors.

On the other hand, the marketing most cloud-focused vendors use to describe themselves is on the verge of hyperbole. But it makes some sense why this is. Considering there are so many problems and challenges to solve, there isn’t any one company that solves them all or even close. So in a landscape that still requires many technologies from many vendors to solve most cloud problems, what does an individual vendor need to stand out? That answer is that they lean heavily on marketing and make it seem like they cover more than they do.

At RSAC, I met with a handful of cloud-focused security vendors, which only reinforced my conviction that it is a smorgasbord of products and overly creative marketing and far from being a single product or even a handful of solutions. Some vendors focus on threat detection. Some focus on risk and compliance. Others focus on the identity implications. Others seek to protect container communication. It’s a literal zoo of vendors. However, in this zoo of vendors, there are some emerging delineations.

Give me any cloud-focused vendor, and I’m pretty sure they’ll fit into one of three significant buckets,  code security (coding/build security),  IaaS/PaaS platform security (ensuring the runtime platform is as secure as possible), and app/container security (runtime security). I’ll be delving deeper into cloud workload security in an upcoming advanced research report. Stay tuned.

While not a numbered takeaway, my parting thought is that after two years of working exclusively via video conference, I’ve concluded that it doesn’t replace face-to-face meetings. There’s a quality and richness that face-to-face brings that current video conference technology fails to replicate. As such, I look forward to upcoming opportunities to engage the security community in person and the next RSAC in April 2023.