Digital transformation and regulatory frameworks will increasingly shape the way companies design their IT landscapes in 2025.
Michael Martens, Riedel Networks: "The EU Energy Efficiency Act is becoming an increasingly important factor for companies that want to design their IT operating models sustainably."
(Image: Riedel Networks)
Riedel Networks, a provider of IT security and network services, sees key technologies such as cloud transformation—which increasingly enables scalable and flexible IT infrastructures—and the intelligent use of data as essential drivers for the future.
"To protect their IT infrastructure from increasing threats, the need for companies to establish secure and robust networks is growing," explains Michael Martens, CEO of Riedel Networks. "Additionally, the EU Energy Efficiency Act is becoming increasingly crucial for companies looking to make their IT operating models sustainable." Furthermore, Martens sees the following key technologies for 2025:
1. Cloud transformation in focus
Data centers are experiencing significant growth as companies increasingly rely on cloud solutions to perform more tasks in the cloud rather than on-premise. The use of artificial intelligence (AI) in the cloud plays a crucial role, as data and information systems can be better analyzed and more specifically searched with AI.
The trend towards multi-cloud will also intensify. Companies are increasingly opting to distribute their workloads and resources across multiple cloud platforms. This not only helps to minimize risks by reducing reliance on a single provider but also increases flexibility and resilience. At the same time, the multi-cloud approach allows companies to use the best cloud infrastructure for each task.
2. Trend towards increased data usage
The amount of data and its usage will continue to increase. The information collections from CRM systems, for example, are becoming increasingly extensive, as they capture not only basic customer data but also behavior patterns, preferences, and interactions across different channels. Accordingly, the importance of data networks will also continue to grow.
Companies face the important decision of whether to transmit data over a private MPLS network or a public IP network. The use of public networks places additional demands on IT security. Therefore, choosing the right network will be a crucial aspect to protect sensitive information and ensure data security.
Technologies such as Secure Access Service Edge (SASE) and Software-Defined Wide Area Network (SD-WAN) offer crucial solutions to meet security requirements. At the same time, they reduce dependence on dedicated lines. While such connections will not disappear entirely, their use will largely be limited to scenarios with guaranteed quality or specific security requirements.
3. Impacts of the NIS-2 Directive
A large portion of companies affected by the NIS-2 directive underestimate its scope and impact. Many companies focus primarily on mere compliance without questioning the underlying necessity and preventive nature of the directive. Security incidents can be significantly mitigated if appropriate countermeasures have been taken. Therefore, compliance with the NIS-2 directive should be seen not just as an obligation but as an opportunity to actively minimize future risks and gain a strategic competitive advantage.
A challenge in implementing the directive is the lack of technical expertise in many sectors, especially in industries with few touchpoints to IT and cybersecurity. The topic is often underestimated by executives, as IT security decisions frequently lie with the cost-oriented CFO. It would be more effective to assign IT responsibilities directly to the CEO or COO, who view IT security from a risk management perspective and are willing to allocate resources for long-term corporate security.
4. Secure networks for medium-sized enterprises
A decisive factor is the choice of the right IT security supplier. Particularly small and medium-sized enterprises (SMEs), which often lack the necessary internal expertise, rely on external experts. These experts should not only bring comprehensive technical know-how but also offer personalized, peer-level advice to efficiently develop and implement tailored security solutions.
Many providers are increasingly relying on AI-based support, which in many cases cannot fully replace personal interaction. Therefore, SMEs should pay particular attention when choosing their service providers to ensure they are guaranteed personal, qualified support that meets their individual needs. While AI can bring efficiency gains in many areas, in IT security, the human factor—especially in consulting and problem-solving—is indispensable.
Another important point will be the increased collaboration between service providers and companies within the framework of co-management. Modern management dashboards enable customers to continue handling tasks such as setting firewall rules themselves, while the service provider manages the rest of the network administration.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.