A good future for tech in 2021 and beyond

Issue 9 2020 Information Security

It’s been a tough year. But there’s good news on the tech horizon. As we all learned in the tumultuous, often tragic months of 2020, technology is essential to nearly every aspect of our lives – from health and learning to work and entertainment.

But while technology has been a lifeline for millions, it needs to get better. Way better.

That’s why I’m excited about what is to come. The pandemic drove technology adoption in amazing ways – indeed, the future arrived seemingly overnight. Networking, cloud, security, collaboration, and other digital technologies all played a huge role in keeping the world running.

Despite our current struggles, I see a time when we move past the pandemic and into that better world. Here are some of the top technology trends that I believe will lead the way towards a better future in 2021.

A bridge over the digital divide

The COVID-19 pandemic put a glaring spotlight on the biggest inequities in our society and around the world. Today, a lack of connectivity separates half the global population from opportunities in learning, business, and healthcare. In nearly every country, the digital divide affects rural communities and the poor disproportionately.

The next generation of wireless technologies – including 5G and Wi-Fi 6 – can go a long way towards closing the divide.

These technologies will raise the bar on bandwidth, speed, and latency, and reach areas where fibre is prohibitively expensive – including rural communities, from African villages to Native American reservations.

Frontline mobile workers, telehealth, manufacturing, and education will all benefit from next-gen wireless as well. We see pervasive wireless connectivity as the ultimate flattener of the digital divide as these new technologies spur growth, innovation, and opportunity for millions of people who are currently on the wrong side of the divide.

The rise of the sensors

We’ve been hearing about the promise of the Internet of Things (IoT) for years. But lately, a confluence of innovations, including advanced network technologies, next-gen wireless and AI, to name a few, are making it a reality. Add to that cheap, smart, and soon-to-be pervasive sensors and we will be interacting with our world, our machines and one another in exciting new ways.

The workplace is a great example. Data based insights delivered by sensors will help provide a healthier and more productive environment. Combined with Wi-Fi, location technologies, and infused into collaboration platforms like Webex, they will identify underutilised or overcrowded spaces, while monitoring conditions like room temperature, humidity, air quality and light.

But the potential for sensors is even greater. For example, sports sensors will be alert for signs of concussion. And fatigue sensors will monitor alertness in potentially dangerous environments.

All of this data will be collected and turned into actionable, real-time insights, with AI playing an increasing role in keeping us informed for better decisions.

Security that’s simple, solid and password free

Cloud and mobility were critical to the agility that kept the world going in 2020. But with so many far-flung workers and devices spread across multiple clouds, the very concept of a security perimeter has blurred – all in an environment where fast responses to security threats are crucial. This demands security that’s integrated, automated, and simple to use and monitor.

In Cisco’s global 2021 Security Outcomes Study, a well-integrated technology stack was a top driver of success. One of the biggest challenges in security is knowing what’s real and what’s a threat in complex environments.

‘Zero trust’ was developed to ensure that nothing – and no one – gets by without verification. It reacts to a constantly changing environment, ensuring that only the right users or devices get access to your network. In the 2021 Security Outcomes Study, 39 percent of respondents said they were “all in” on zero trust, while another 38 percent were 'moving in that direction'.

At the same time, a password-free future is on the near horizon, as enabling technologies such as biometrics become popular with both consumers and enterprises.

Paying for the tech you actually need

Organisations have long invested in one-size-fits-all tech solutions. That meant paying for features that users might never actually need. Today, software-as-a-service enables organisations to pay for the features and capabilities they currently need, with the option to scale other services with great speed and agility when needed.

Consumption models will continue to shift, especially as more and more features and capabilities are available via software, whether on site or in the cloud. The flexibility and cost savings that pay-as-you-consume models provide are simply too good to resist.

This shift to pay-as-you-consume spending gives organisations more flexibility and cost predictability to manage their IT spend – something that 85 percent of CIOs and IT decision makers in Cisco’s 2021 CIO and ITDM Trends Pulse report agreed is important to their business (43 percent called it very important).

Keys to the future: app-enabled agility and resilience

In the early months of the pandemic, organisations had to adapt quickly to meet highly unpredictable changes. Cloud was the critical enabler of this new agility. For many organisations, it was the only way to meet the rapidly shifting demands of their customers and employees, regardless of costs.

Ten months later, the applications at the heart of our businesses are highly distributed. Our workforces are more mobile than ever before. And the demands on our systems are unprecedented.

Looking ahead, IT teams will need even greater agility. With enhanced observability solutions, teams can shift from monitoring everything to monitoring just the data and insights that matter. Both insights and automation will be essential to future growth, competitiveness, and resilience.


HSS.21.24 Gordon Thomson, global vice president for EMEAR specialist sales, Cisco.

From serving customers to delighting them

Today, mobile apps enable everything from shopping and banking to learning and wellbeing – and they’ve even helped track COVID cases. Mobile apps also enable both public and private sector organisations to connect with and understand users in ways that were unimaginable just a few years ago. Of course, most business processes also run on applications.

The most advanced of these promise more personalised relationships, along with instantaneous responses. That demands the ability to turn masses of real-time information from the network into actionable insights. And to do it fast.

Armed with such capabilities, companies can respond to a customer even before they report an issue or a need. It’s this combination of immersive, intelligence-based personalisation and experience that will transform baseline customer satisfaction into deep customer engagement, excitement and loyalty.

With innovation accelerating at a fast pace, there’s a tremendous opportunity to use new technologies to create organisations that are more flexible, responsive, and resilient. At the same time, I believe our higher mission is to use technology to improve lives across the planet.

Which technology trends do you have on your radar?




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.