{"id":52304,"date":"2023-06-12T15:05:00","date_gmt":"2023-06-12T15:05:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3699253\/3-things-it-pros-are-willing-to-spend-more-on-in-h2-2023.html#tk.rss_security"},"modified":"2023-06-12T15:05:00","modified_gmt":"2023-06-12T15:05:00","slug":"network-spending-priorities-for-second-half-2023","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/","title":{"rendered":"Network spending priorities for second-half 2023"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/03\/ben-franklin_hundred-dollars-in-a-vice_budget_tight-budget-spending_by-modernlife-getty-100835239-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>OK, it\u2019s not been a great first half for many companies, from end users to vendors and providers. The good news is that users sort of believe that many of the economic and political issues that have contributed to the problem have been at least held at bay.<\/p>\n<p>There\u2019s still uncertainty in the tech world, but it&#8217;s a bit less than before. Most of the companies I\u2019ve talked with this year have stayed guardedly optimistic that things were going to improve. Over the last month, of the nearly 200 companies I\u2019ve emailed with, only 21 were \u201cpessimistic\u201d about the outlook for their tech spending in the second half.<\/p>\n<p>Lack of pessimism doesn\u2019t translate to optimism, though, and optimism is a bit non-specific for network and IT planners to build on. What are the user priorities for tech for the rest of the year? Do they think their budgets will shift, and if so from what to what? Are they looking to make major changes in their networks, change their vendors, be more or less open? I thought I knew some of the answers to these questions, but for some I was wrong.<\/p>\n<p>Let\u2019s start with the first question, which is budget patterns. Two thirds of companies I heard from say they are actually expecting to spend more on networking in 2023 than they did last year, even though most of them admitted that their spending has been curtailed. It\u2019s not likely to be a huge increase, but their expected spending growth roughly matches the historical average of the last 10 years.<\/p>\n<p>That doesn\u2019t mean they\u2019re not trying to cut costs. The average company on my list that predicted just over 4% higher spending on networking this year is now looking for almost exactly the same amount of cost reduction. Spend more, spend less. Does that seem contradictory? No, what it means is that they want to cut the cost of sustaining what they have in order to help fund new initiatives, and that they\u2019re prepared to increase spending to fund the remainder.&nbsp;<\/p>\n<p>What new initiatives? What cost-cutting? Almost 100% of the users want to reduce the cost of network services more than the cost of network equipment. While about a third say they would stretch refreshing of old gear from this year into next, everyone wants to spend less on network services.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>The new initiatives they hope to fund are focused on three specific areas. First, improved security. Second, improved operational stability and availability. Third, improved application-delivery performance.<\/p>\n<p>One beneficiary of this combination of goals is <a href=\"https:\/\/www.networkworld.com\/article\/3031279\/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html\">SD-WAN<\/a>. About a quarter of companies on my list had some SD-WAN exposure, but almost all of them adopted it to extend <a href=\"https:\/\/www.networkworld.com\/article\/3268744\/understanding-virtual-private-networks-and-why-vpns-are-important-to-sd-wan.html\">VPN<\/a> access to sites they couldn\u2019t justify connecting directly to their VPNs. A bit over half the companies are now saying they\u2019ll consider SD-WAN to replace the VPN, where the cost of connection per empowered worker is too high. This group is roughly equally divided on whether to buy SD-WAN gear themselves, get it from a managed service provider (MSP), or get it from a network operator or communications service provider (CSP). The MSP route is most popular when the target sites are multi-national, and the CSP route when the sites are all currently on VPNs from one operator. Rolling your own SD-WAN is the choice when neither of these is true.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>Despite the fact that many SD-WAN products\/services offer enhanced security, this feature isn\u2019t highlighted by prospective SD-WAN adopters. Most say that this is because the focus of SD-WAN consideration is cost management and not security enhancement. But most also say that vendors\/providers of SD-WAN aren\u2019t pushing them toward considering security as another justification for adoption. Instead, their security focus is usually another layer.<\/p>\n<p>Security is the area where most users expect to spend more, but at the same time an area where they believe their spending is most likely to be sub-optimal. Three-quarters of buyers think they already spend too much on security because they\u2019ve layered things on without considering the whole picture. You hear terms like \u201cholistic approach\u201d or \u201crethinking\u201d a lot in their comments, but at the same time, less than an eighth of the users expect to redo their security strategies in any way. They recognize that to undertake any major change is to risk creating a hole in products or practices that could hurt them badly. They hope for new features, even at a cost, from current vendors, and that their current vendors would somehow rationalize the whole security stack and approach.<\/p>\n<p>That stay-the-course view carries on to network equipment overall. While well over 80% of users say that open technologies like white boxes and open-source software could \u201csignificantly\u201d lower costs, and while about a sixth say they are \u201clooking at\u201d open-model networking, the number that actually has budgeted for a change to an open strategy in the second half is in the statistical noise level. In fact, two companies that had planned to increase their open-model investment in 2023 say they are now going to stay with their dominant vendor.<\/p>\n<p>That\u2019s another interesting shift in itself. Even among network operators, I\u2019m seeing a desire not to broaden vendor choices in their networks but to narrow it. Three companies say they would be \u201cconsolidating\u201d vendors for every one company that says it would be expanding the number they bought from. There is even a desire among end users to reduce the number of service providers (and, by the way, cloud providers). They\u2019re talking \u201cmore leverage\u201d and \u201cless integration\u201d instead of \u201cbest of breed\u201d or \u201clock-in\u201d.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>What technology has them the most excited? AI is the answer, but even here there are a bunch of contradictions. Very few companies (maybe one in six) have even tried to use AI in networking in any way. Nearly all of them say that they expect their AI use to increase, and yet nearly all also say that AI is overhyped and that \u201cmost vendor AI claims are exaggerated.\u201d<\/p>\n<p>The reasons for the seemingly mindless AI enthusiasm is a simple reversal of an old saying: \u201cWhere there\u2019s hope, there\u2019s life.\u201d AI could (theoretically) reduce operator errors. It could (hopefully) improve network capacity planning. It could (presumably) help secure applications and data and spot malefactors. All these things are recurring problems that seem to defy solution, and AI offers a hope that a solution might be near at hand. What\u2019s not to love, provisionally of course.<\/p>\n<p>\u201cProvisionally\u201d means not right now. Users cite only two network AI tools (three AI tools overall) that they think are really delivering good value today. On average, they think that AI will mature enough to deliver on some promises by late in the second half of 2023. If it does, they\u2019re prepared to go off-budget to get the stuff that proves out.<\/p>\n<p>Overall, network buyers are hopeful for the second half, but they\u2019re also still, in their hearts, a little afraid. Uncertainty is the enemy of investment, and it wouldn\u2019t take much to tip things over to the cautious side. Like the users themselves, I remain (theoretically, hopefully, presumably, provisionally) confident&#8230;for now. It could still be a cold winter.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3699253\/3-things-it-pros-are-willing-to-spend-more-on-in-h2-2023.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nOK, it\u2019s not been a great first half for many companies, from end users to vendors and providers. The good news is that users sort of believe that many of the economic and political issues that have contributed to the problem have been at least held at bay.There\u2019s still uncertainty in the tech world, but it&#8217;s a bit less than before. Most of the companies I\u2019ve talked with this year have stayed guardedly optimistic that things were going to improve. Over the last month, of the nearly 200 companies I\u2019ve emailed with, only 21 were \u201cpessimistic\u201d about the outlook for their tech spending in the second half.Lack of pessimism doesn\u2019t translate to optimism, though, and optimism is a bit non-specific for network and IT planners to build on. What are the user priorities for tech for the rest of the year? Do they think their budgets will shift, and if so from what to what? Are they looking to make major changes in their networks, change their vendors, be more or less open? I thought I knew some of the answers to these questions, but for some I was wrong.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52305,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9193,1341,307],"class_list":["post-52304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-application-performance-management","tag-sd-wan","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network spending priorities for second-half 2023 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network spending priorities for second-half 2023 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-12T15:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2020\/03\/ben-franklin_hundred-dollars-in-a-vice_budget_tight-budget-spending_by-modernlife-getty-100835239-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Network spending priorities for second-half 2023\",\"datePublished\":\"2023-06-12T15:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/\"},\"wordCount\":1224,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/network-spending-priorities-for-second-half-2023.jpg\",\"keywords\":[\"Application Performance Management\",\"SD-WAN\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/\",\"name\":\"Network spending priorities for second-half 2023 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/network-spending-priorities-for-second-half-2023.jpg\",\"datePublished\":\"2023-06-12T15:05:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/network-spending-priorities-for-second-half-2023.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/network-spending-priorities-for-second-half-2023.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-spending-priorities-for-second-half-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Performance Management\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/application-performance-management\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network spending priorities for second-half 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network spending priorities for second-half 2023 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/","og_locale":"en_US","og_type":"article","og_title":"Network spending priorities for second-half 2023 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-12T15:05:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2020\/03\/ben-franklin_hundred-dollars-in-a-vice_budget_tight-budget-spending_by-modernlife-getty-100835239-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Network spending priorities for second-half 2023","datePublished":"2023-06-12T15:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/"},"wordCount":1224,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/network-spending-priorities-for-second-half-2023.jpg","keywords":["Application Performance Management","SD-WAN","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/","url":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/","name":"Network spending priorities for second-half 2023 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/network-spending-priorities-for-second-half-2023.jpg","datePublished":"2023-06-12T15:05:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/network-spending-priorities-for-second-half-2023.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/network-spending-priorities-for-second-half-2023.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/network-spending-priorities-for-second-half-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Application Performance Management","item":"https:\/\/www.threatshub.org\/blog\/tag\/application-performance-management\/"},{"@type":"ListItem","position":3,"name":"Network spending priorities for second-half 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52304"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52304\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52305"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}