Top 100 Technology Predictions for 2018 Impacting Channel Partners, MSPs
Welcome to predictions 38 to 21
2018 Technology Predictions from Xerox Corp.
Predictions from Darren Cassidy, president, U.S. Channels Unit at Xerox.
38. Broader demand for managed print services (MPS) among small- and medium-sized businesses (SMBs): MPS will be a great opportunity in 2018 for dealers who put a strategic focus on targeting the underpenetrated SMB market. With MPS, dealers capitalize on a growth opportunity they know—print—while building a point of differentiation from their competitors, more touch points within their client’s businesses to strengthen relationships and customer value by better managing print assets. Partners not only grow—many report their year-over-year growth is largely driven by providing MPS solutions to SMBs—they protect their customer base.
37. Rapid advances in apps-based solutions: A second strong opportunity in 2018 is in meeting client needs for more device integration to streamline workflows unique to their businesses. More and more channel partners will meet this need by building applications for their customer’s multifunction printers, an emerging trend that will grow exponentially in the coming year.
36. Continued growth in production color: Color page volumes continue to grow as offset page migration to digital accelerates, particularly for short runs. Specialized media applications can add true differentiation and deliver high margins.
2018 Technology Predictions From Riverbed Technologies
Predictions from Riverbed’s CTO, GM of Service Providers and CIO,,,
35. The Internet of things and hyper connectivity will fundamentally disrupt traditional security safeguards. Thanks to the our increasingly hyper connected world, I believe that simply having a firewall to protect against your external enemies and threats will become a thing of the past. A security infrastructure that require data to traverse it to do its job will no longer be enough. In fact, the terms “dirty-side” and “clean-side” currently being used to describe network interfaces will have no meaning. Tomorrow, threats will come from what seem like unlikely and trusted sources. It’s going to be second and third connected business partners that you will have to worry about. Someone that is once or twice removed from your infrastructure being hacked makes you just as vulnerable as a nefarious internal actor trying to compromise your data. There used to be only so many ways one could gain entry to a system, but now with the explosion of devices and access points, these traditional defenses are simply not going to work anymore. The cleanly delineated view of your network being secure through the use of a firewall separating trusted and untrusted traffic will be antiquated, and instead security will be better ensured by viewing the network much more holistically as well as having technology safeguards in place that monitor the behavior of users and handle anomaly detection. Source: Hansang Bae, CTO, Riverbed Technology.
34. In the near-term, crowdsourcing will be used more aggressively by IaaS providers as a means of improving their security. The crowdsourcing model works in regard to security because history has shown that the more eyeballs you have on a problem, the faster vulnerabilities will be found. WEP is exhibit A of this model, which was the initial encryption standard which was released as part of the first wireless networking standard. It was found to be riddled with vulnerabilities out the door because it was developed in a closed environment with no inputs from a broader base of people with an interest in identifying and shoring up any weaknesses. The lesson was learned from this example and these standards are now open for broader analysis. Bounty programs at Microsoft, Oracle and others also prove this out. Why? Because they ask for help from many people, numbering in the hundreds and more, who are motivated to find bugs or vulnerabilities in their products and make them better and more secure. Alternatively, if you develop in a silo, your defense against vulnerabilities is only as good as the 5, 10, 20 or so people that work on particular protocols and the one thing the teams miss will lead to vulnerabilities. If you have hundreds or more people working on these problems, then chances of finding and securing vulnerabilities goes up dramatically. Therefore, as counterintuitive as it may seem, the more open you are, the more protected you can be. As more and more companies adopt these bug, or vulnerability bounty programs, this crowdsourcing security model will prove to be one of the most efficient, economical and effective strategies for shoring up the security of the network as well as it has for software and browsers. Source: Hansang Bae, CTO, Riverbed Technology.
33. Network security will ultimately be driven by machine learning and artificial intelligence. Machine learning and artificial intelligence technologies at the security layer are going to be extremely dependable sentinels. Unlike todays network security systems which are largely human administered and maintained, ML and AI will be constantly vigilant against threats and vulnerabilities and will allow us to use the “P” (prevention) in IPS with confidence. The current thinking as a security professional is that if you have an updated database, secure firewall, patched OpenSSL, etc., you’re secure – but this presents a false sense of confidence that can be fatal to the security of the network. Machine learning and AI technology don’t suffer from over confidence and preconceived notions of security. It will simply do the job of identifying anomalies and mitigating threats, but far faster and better than today’s, largely human latency bound, security posture model. Source: Hansang Bae, CTO, Riverbed Technology.
32. Service Providers will be critical to enabling the success of IoT. IoT is quickly becoming a reality with an expected 30 billion IoT devices to be in production globally by 2020*. These devices must all be connected to the internet, managed, and secured while also delivering a high quality of service to end users. Service providers have the most diverse set of communication mechanisms that major enterprises will rely on for this connectivity be it mobility services, broadband, and network infrastructure. How IoT devices connectivity is managed will be a major concern for the enterprise and Service Providers will be leaders in facilitating this. Source: Phil Harris, GM, Service Provider Segment Vertical, Riverbed Technology.
31. Service Providers will become the management layer for enterprises cloud environments. With the various types of cloud environments that enterprises are adopting (Azure, AWS, Google Cloud), each is unique in their complexity in managing and deploying services. If a company wants to put a workload into multiple clouds, it has to treat that workload differently based on each cloud. This is inefficient and time consuming. Service Providers, due to their expertise in infrastructure deployment and maintenance, will be capable of treat different clouds as abstract sets of resources and essentially commoditize the cloud as a service. Organizations will be able to hand their cloud management over to Service Providers who will shield them from the complexities of these cloud environments. Source: Phil Harris, GM, Service Provider Segment Vertical, Riverbed Technology.
Continue to next page for predictions 30 to 21 from Riverbed, Salesforce and Continuum executives…