"Inconceivable!" Or, How the Network Became Interesting Again.

“You keep using that word. I do not think it means what you think it means.” -Inigo Montoya in The Princess Bride (1987).

It’s time to reconsider what we mean when we say NGFWs (Next Gen Firewalls) and Secure Web Gateways.

When is a thing no longer the thing it was originally? 

If that sounds too squishy for you, hang on, I promise I’m going somewhere concrete.

We all have cognitive biases: a tendency for our brain to see patterns where none exist, to trade speed for accuracy, and to help us gain agreement as social animals. 

There’s a bias in psychology called functional fixedness in which we are unable to think of how else to use a tool other than the way it’s most commonly used. I suggest that one of the impacts of this bias is our inability to see new use cases or outcomes for a technology, even as it changes significantly. 

The term smartphone was utilized in various formats for at least 10 years before the launch of the iPhone.

Ten. Years.

We went through iterations of the way to describe this emergent concept: two words, capitalized, competing ideas like PDAs (Personal Digital Assistants), and so on. But why? Because vendors were inventing or modifying devices and trying to differentiate the use cases (outcomes) from existing mobile phones. Now we’ve come full circle and simply say “phone”. It’s implied that any mobile phone is ‘smart’.

I hear the engineers and security practitioners thinking loudly, “Who cares what it’s called?” 

Answer: We all should. 

What you call something shapes what you think it can be used for. 

We are at the confluence of competing ideas and approaches around the dynamic edge of our networks. How do we flexibly secure them? Cloud to the Edge, Secure Enterprise SD-WAN, NGFW, SIG (Secure Internet Gateway), Edge Computing, SWG (Secure Web Gateway), and the list goes on.

Don’t get bogged down in old terminology and let a bias creep into your planning assumptions. Consider the outcomes you want and map out the technology services you need to support those outcomes. Then, go take a fresh look at vendors and the novel solutions that are emerging.

NGFW? “You keep using that word. I do not think it means what you think it means.”

Any article that starts with an Inigo Montoya quote must be excellent, and this one proves the point.? Well done,

Jon Calalang

Sr. Global Partner Technical Advisor

6 年

Excellent article Dutch (Brian) Schwartz! Conventional naming, roles and responsibilities are in a transitional reimagined space, totally agree!

Alex McQuirter

Digital Transformation Consultant

6 年

I really like your articles, and the same goes for this one!

Patrick Pille

Revenue Operations - Business Analysis - Project Management - Product Management - Problem Management - Leadership

6 年

Good Article Dutch! I wholeheartedly agree that, in the words of Albert Einstein, "We cannot solve our problems with the same thinking we used when we created them." One should always be learning, especially with cyber security.? I look forward to hearing more of your thoughts on this topic!

要查看或添加评论,请登录

Dutch Schwartz的更多文章

  • Cybersecurity strategy is about people

    Cybersecurity strategy is about people

    I'm reflecting on the RSA Conference and this analogy came to mind: What if you threw a birthday party and nobody came?…

    12 条评论
  • What CISOs Really Want

    What CISOs Really Want

    “You don’t get it.” And I say, “That’s right, I don’t get you and you don’t get me.

    23 条评论
  • Here's How to Develop Trust in Cyber Security

    Here's How to Develop Trust in Cyber Security

    “Can I trust you? Are you competent? Do I still trust you?” This was the succinct response given by a customer of mine…

    9 条评论
  • Cutting Costs Is Not a Strategy

    Cutting Costs Is Not a Strategy

    As has been widely reported, Berkshire Hathaway took a $3 billion non-cash loss related to its investment in Kraft…

    6 条评论
  • Three Tips for Cybersecurity Collaboration

    Three Tips for Cybersecurity Collaboration

    Collaboration in this context means two or more people working together to achieve an outcome that benefits them…

    15 条评论
  • 2019: The year we finally get serious about collaboration in cybersecurity.

    2019: The year we finally get serious about collaboration in cybersecurity.

    If you were expecting something edgier, I apologize. But I truly think collaboration is emergent in several of the…

    28 条评论
  • The 'S' in SD-WAN Doesn't Stand for Security

    The 'S' in SD-WAN Doesn't Stand for Security

    In a previous post, I suggested that a useful way to think about designing for SD-WAN is to consider it the…

    2 条评论
  • Can We Learn From The #Army? How To Raise Employee #Cybersecurity Awareness.

    Can We Learn From The #Army? How To Raise Employee #Cybersecurity Awareness.

    “Listen up! I have Three True Stories for you.” This is how my sergeant major in the Army started every Safety…

  • "Maybe true. Maybe Not. But better if you believe." -Buddhist Monk

    "Maybe true. Maybe Not. But better if you believe." -Buddhist Monk

    Technology vendors spend millions of dollars annually to brand themselves and market their products and solutions. One…

    1 条评论
  • What is the Human Point?

    What is the Human Point?

    If your high school English teacher made you read a Greek tragedy (thanks Ms. Turner) then you know that human…

    1 条评论

社区洞察

其他会员也浏览了