SlideShare ist ein Scribd-Unternehmen logo
1 von 13
IT Security Market Overview
September 2012

Prepared by Lee Mashburn
Marketing & Product Management Executive




        Check out my personal
      website. Recently launched.



                                           Lee Mashburn and Elijah
The IT Security Market and Competitive Landscape



 • This PowerPoint presentation overviews the IT Security
    market. It has been developed as a result of over 100
                hours of research and analysis.

  • It provides a snapshot of the various IT Security sub-
       markets; size, projected growth, and competitive
                          landscape.

      • If you wish to see more detail, contact me at
                   lee.mashburn@aol.com


                                                             2
IT Market Overview 2012 Estimated

                   Computing
                   Hardware
                     11%
                           Software
                             7%                $3.8 trillion market, $1.6 trillion excluding Telecom
   Telecom                                     6% annual growth rate expected excluding Telecom
   Services
     46%                                       IT security represents only 1.5% of total
                            IT Services
                                23%
                                               IT security market expected to grow 12% through 2016
                                               Cloud IT security will grow from 17% to 24% by 2016
                 Telecom
                Equipment
                   13%


                                                                        CY       CY       CY       CY       CY
                                                    CY 2010 CY 2011   2012E    2013E    2014E    2015E    2016E    CAGR
                            Computing Hardware        $375    $404     $421     $457     $496     $553     $592    7.9%
                            Software                  $244    $267     $280     $299     $319     $339     $362    6.3%
                            IT Services               $793    $845     $856     $886     $920     $956     $995    3.3%
                            Telecom Equipment         $412    $442     $473     $508     $538     $567     $593    6.0%
                            Telecom Services         $1,603  $1,704   $1,721   $1,767   $1,816   $1,861   $1,898   2.2%
                            All IT                   $3,427  $3,662   $3,751   $3,917   $4,089   $4,276   $4,440   3.9%

                            HW, SW, Svcs            $1,412   $1,516   $1,557   $1,642   $1,735   $1,848   $1,949
                            IT Security               $19      $22      $24
                            Percent of Total         1.3%     1.5%     1.5%                                        12.0%




Copyright, Cogniti, Inc.,                                                                                                  3
                                                                                                                           3
The 2012 Top Priorities of the CIO

•   CIOs are increasingly in step with CEO top
    priorities
•   Top CIO priorities:
     –   Business intelligence and analytics
     –   Mobility
     –   Virtualization
     –   Cloud computing
     –   Business process management
•   Must derive insight, competitive advantage, and
    tangible business benefit from the huge volumes of
    data available across an enterprise – how?
     –   Master data management, customer analytics, data
         warehousing, and visual information dashboards
•   Must deliver information technology securely and
    reliably
•   Must help simplify operations, business
    processes, products, and services
•   Leverage cloud computing and outsourcing to
    reallocate internal resources from routine system
    maintenance toward more valuable tasks
                                                            4
IT Security Sub-Markets
                           $25,000




                           $20,000

                                                                         Network access control
                                                                         Identity & Access Management
 Sales in USD (millions)




                                                                         Mobile device management
                           $15,000
                                                                         Content aware data loss prevention
                                                                         Secure web gateway
                                                                         SIEM
                                                                         Unified threat management
                           $10,000
                                                                         Secure email gateways
                                                                         Endpoint protection platforms
                                                                         MSSP
                                                                         Enterprise network firewalls
                            $5,000




                               $0
                                FY 2009   FY 2010   FY 2011   FY 2012E


                                                                                                              5
                                                                                                              5
IT Security – Most Google-Searched Terms, 2012

 Managed security services

 Unified threat management

       Data loss prevention

          Database security

              Email security

                  SSL VPN

          Endpoint security

        Endpoint protection

        Computer forensics

       Identity management

  Intrusion detection system

           Fraud prevention

                               0   500,000   1,000,000     1,500,000   2,000,000     2,500,000   3,000,000   3,500,000
                                                         No. of Google Search URLs



                                                                                                                         6
Mobile Device
                                                                                                               Management

                                                                                                    IAM



                                                                                              DLP



                                                                 UTM                  Secure Web
                           MSSP                                               SIEM     Gateway




                                        NAC                                                               Enterprise
                                                                                                           Network
                                                                                                          Firewalls
                                                    Endpoint
                                                    Protection
                                                    Platforms




Key:                                                                   Secure Email
Size of circle reflects relative 2012 market size                       Gateways
Vertical placement reflects relative growth rate                                                                               7
Network, Data, & Endpoint
Security and Unified Threat
       Management

                              MSSP




                                     8
Managed Security Service Provider, MSSP
                                                                                                    Gartner Magic Quadrant, Nov ‘11
Market Definition
Enterprises that optimize their use of managed security service providers
(MSSPs) can free up internal staff time for dealing with more business-
critical security functions if they select. Gartner sees continued strong, if
                                                                                                                            Verizon AT&T          Dell SecureWorks
not spectacular, growth for managed security services in North America.
                                                                                                                                                  Symantec
                                                                                                                                    IBM
An MSS portfolio can include unified threat management, data loss                                     Bell Canada




                                                                                        Execution
prevention, security information and event management, log management,                                 SAIC           CSC
                                                                                                                      Integralis    Solutionary
vulnerability scanning, and email security. Web-based portals typically serve                         HP
                                                                                                         HCL        CompuCom       Savvis
as the primary means of communication about monitoring and management                                 Perimeter
                                                                                                                       Wipro
                                                                                                                                     Trustwave
services performed for customers.

Drivers: evolving compliance reporting requirements (PCI and FISMA), IT
staffing and budget constraints, increased availability and adoption of IT-
as-a-Service, expansion of Internet connection endpoints, the SMB                                              North America Market
market, applications to prevent data loss, and SaaS for remotely-monitored
CPE.
                                                                                                                           Vision

                                 Market Size, Worldwide           Market Share
                      $8,000                                                                                   Market Growth 3-Yr CAGR
Sales ($US million)




                      $6,000                                                22%
                                                                                                             IT Security
                      $4,000                                      78%

                      $2,000                                                                                   MSSP

                                                                   MSSP Market
                         $0
                                                                                                          0%          5%           10%       15%             20%
                               FY 2009 FY 2010 FY 2011 FY 2012E    IT Security Market

                                                                                                                                                             9
Content-Aware Data Loss Prevention (DLP)
                                                                                                               Gartner Magic Quadrant, Aug ‘11
         Market Definition
         Content-aware DLP tools enable the dynamic application of policy
         based on the classification of content determined at the time of an
         operation. These technologies and inspection techniques are used to                                                                              Symantec
         classify information content contained within an object – such as a file,                                                                  McAfee
         email, packet, application, or data store - while at rest (in storage), in use
                                                                                                                                          CA    RSA
         (during an operation), or in transit (across a network); and the ability




                                                                                                   Execution
                                                                                                                                                  Websense
         to dynamically apply a policy – such as log, report, classify, tag, and                                    Trustwave                          Verdasys
         encrypt – and/or apply enterprise data rights management protections.                                           Code Green
         They can execute responses ranging from simple notification to active
          blocking – based on policy settings.                                                                       Trend Micro                      Fidelis
                                                                                                                                           GTB Technologies
                                                                                                                                 Safend
         DLP technologies help organizations develop, educate, and enforce                                           Pallisade
         better business practices concerning the handling and transmission
         of sensitive data. Used to its full capability, DLP is a nontransparent
         control, which means it is intentionally visible to an end user with a
         primary value proposition of changing user behavior.                                                                       Vision



                                       Market Size                            Market Share
                      $600                                                                                              Market Growth 3-Yr CAGR
                                                                                    2%
Sales ($US million)




                      $500
                      $400                                                                                                                12%
                                                                                                                       IT Security
                      $300
                      $200                                                         98%
                      $100                                                                                             DLP                              22%
                        $0
                                                                              DLP Market
                             FY 2009   FY 2010   FY 2011   FY 2012E
                                                                              IT Security Market
                                                                                                                                                                10
                                                                                                                                                                10
Security Information & Event Management (SIEM)
     Market Definition                                                                                  Gartner Magic Quadrant, May ‘12

     SIEM technology aggregates the event data produced by security
     devices, network devices, systems, and applications. The primary data
     source is log data but SIEM technology can also process other forms of
                                                                                                                                    HP ArcSight
     data. Event data is combined with contextual information about users,
                                                                                                                                        IBM Q1 Labs
     data, and assets. The data is normalized so that events from disparate                                                                McAfee Nitro
     sources can be correlated and analyzed for specific purposes such as                                       RSA (EMC)                  Security
                                                                                                                   Splunk
     network security event monitoring, user activity monitoring, or compliance




                                                                                            Execution
                                                                                                                                NetIQ
                                                                                                                  Symantec
                                                                                                                                     LogRhythm
     reporting. This technology combines real-time security monitoring,                                        LogLogic
                                                                                                                                   SolarWinds
     historical analysis, and other support for incident investigation and
                                                                                                                                Trustwave
     compliance reporting. Deployment and support simplicity is an important
                                                                                                                                elQnetworks
     attribute for all use cases because of the resource constraints of most IT                                  Sensage
     security organizations.

     Features: behavior profiling, anomaly detection, threat intelligence, and
     advanced analytics – to support the early detection of targeted attacks.
     Drivers include real-time security monitoring and compliance reporting.
                                                                                                                           Vision


                                                                      Market Share
                                          Market Size
                      $1,400                                                                                   Market Growth 3-Yr CAGR
                                                                              5%
Sales ($US million)




                      $1,200
                      $1,000
                       $800                                                                                     IT Security                       12%
                                                                        95%
                       $600
                       $400
                       $200                                                                                       SIEM                             14%
                                                                       SIEM Market
                         $0
                                                                       IT Security Market
                               FY 2009   FY 2010   FY 2011 FY 2012E                                                                                11
                                                                                                                                                   11
Threat
         Intelligence



      Incident & Access
        Management



         Data Loss
         Prevention
                                                   SIEM




        File Integrity
         Monitoring



     Enterprise Resource
        Management
                                                                                           Security Information & Event Management (SIEM)




         Application
         Monitoring
                                                            • Analytics
                                              • Reporting
                                                                          • Ad hoc query




          Behavior
                           • Log management




          Profiling



      Database Activity
         Monitoring
12
Cloud is the Future


Cloud computing is a style of computing where scalable and elastic IT-related
capabilities are provided “as a service” to customers using Internet technologies



         Benefits                        Risks

 • Increased agility        • Security

 • Reduced cost             • Transparency

 • Less complexity          • Assurance

 • Better focus on the      • Lock-in
   priorities
                            • Integration                          Cloud Computing Hype Cycle
                                                                   By Gartner
 • Enhanced collaboration
                            • Financial sustainability
 • Easier to innovate




                                                                                          13

Weitere ähnliche Inhalte

Andere mochten auch

Cloud IT Managed Services Market Summary
Cloud IT Managed Services Market SummaryCloud IT Managed Services Market Summary
Cloud IT Managed Services Market SummaryCharles Bedard
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Knowledge Group
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 
Cloud Computing - SWOT Analysis
Cloud Computing - SWOT AnalysisCloud Computing - SWOT Analysis
Cloud Computing - SWOT Analysistechieguy85
 
Emerging trends in it technology
Emerging trends in it technologyEmerging trends in it technology
Emerging trends in it technologyChetan Sagar
 

Andere mochten auch (7)

Cloud IT Managed Services Market Summary
Cloud IT Managed Services Market SummaryCloud IT Managed Services Market Summary
Cloud IT Managed Services Market Summary
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Apresenta Siem
Apresenta SiemApresenta Siem
Apresenta Siem
 
Cloud Computing - SWOT Analysis
Cloud Computing - SWOT AnalysisCloud Computing - SWOT Analysis
Cloud Computing - SWOT Analysis
 
Emerging trends in it technology
Emerging trends in it technologyEmerging trends in it technology
Emerging trends in it technology
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

IT Security Market Overview Sept 2012

  • 1. IT Security Market Overview September 2012 Prepared by Lee Mashburn Marketing & Product Management Executive Check out my personal website. Recently launched. Lee Mashburn and Elijah
  • 2. The IT Security Market and Competitive Landscape • This PowerPoint presentation overviews the IT Security market. It has been developed as a result of over 100 hours of research and analysis. • It provides a snapshot of the various IT Security sub- markets; size, projected growth, and competitive landscape. • If you wish to see more detail, contact me at lee.mashburn@aol.com 2
  • 3. IT Market Overview 2012 Estimated Computing Hardware 11% Software 7% $3.8 trillion market, $1.6 trillion excluding Telecom Telecom 6% annual growth rate expected excluding Telecom Services 46% IT security represents only 1.5% of total IT Services 23% IT security market expected to grow 12% through 2016 Cloud IT security will grow from 17% to 24% by 2016 Telecom Equipment 13% CY CY CY CY CY CY 2010 CY 2011 2012E 2013E 2014E 2015E 2016E CAGR Computing Hardware $375 $404 $421 $457 $496 $553 $592 7.9% Software $244 $267 $280 $299 $319 $339 $362 6.3% IT Services $793 $845 $856 $886 $920 $956 $995 3.3% Telecom Equipment $412 $442 $473 $508 $538 $567 $593 6.0% Telecom Services $1,603 $1,704 $1,721 $1,767 $1,816 $1,861 $1,898 2.2% All IT $3,427 $3,662 $3,751 $3,917 $4,089 $4,276 $4,440 3.9% HW, SW, Svcs $1,412 $1,516 $1,557 $1,642 $1,735 $1,848 $1,949 IT Security $19 $22 $24 Percent of Total 1.3% 1.5% 1.5% 12.0% Copyright, Cogniti, Inc., 3 3
  • 4. The 2012 Top Priorities of the CIO • CIOs are increasingly in step with CEO top priorities • Top CIO priorities: – Business intelligence and analytics – Mobility – Virtualization – Cloud computing – Business process management • Must derive insight, competitive advantage, and tangible business benefit from the huge volumes of data available across an enterprise – how? – Master data management, customer analytics, data warehousing, and visual information dashboards • Must deliver information technology securely and reliably • Must help simplify operations, business processes, products, and services • Leverage cloud computing and outsourcing to reallocate internal resources from routine system maintenance toward more valuable tasks 4
  • 5. IT Security Sub-Markets $25,000 $20,000 Network access control Identity & Access Management Sales in USD (millions) Mobile device management $15,000 Content aware data loss prevention Secure web gateway SIEM Unified threat management $10,000 Secure email gateways Endpoint protection platforms MSSP Enterprise network firewalls $5,000 $0 FY 2009 FY 2010 FY 2011 FY 2012E 5 5
  • 6. IT Security – Most Google-Searched Terms, 2012 Managed security services Unified threat management Data loss prevention Database security Email security SSL VPN Endpoint security Endpoint protection Computer forensics Identity management Intrusion detection system Fraud prevention 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 No. of Google Search URLs 6
  • 7. Mobile Device Management IAM DLP UTM Secure Web MSSP SIEM Gateway NAC Enterprise Network Firewalls Endpoint Protection Platforms Key: Secure Email Size of circle reflects relative 2012 market size Gateways Vertical placement reflects relative growth rate 7
  • 8. Network, Data, & Endpoint Security and Unified Threat Management MSSP 8
  • 9. Managed Security Service Provider, MSSP Gartner Magic Quadrant, Nov ‘11 Market Definition Enterprises that optimize their use of managed security service providers (MSSPs) can free up internal staff time for dealing with more business- critical security functions if they select. Gartner sees continued strong, if Verizon AT&T Dell SecureWorks not spectacular, growth for managed security services in North America. Symantec IBM An MSS portfolio can include unified threat management, data loss Bell Canada Execution prevention, security information and event management, log management, SAIC CSC Integralis Solutionary vulnerability scanning, and email security. Web-based portals typically serve HP HCL CompuCom Savvis as the primary means of communication about monitoring and management Perimeter Wipro Trustwave services performed for customers. Drivers: evolving compliance reporting requirements (PCI and FISMA), IT staffing and budget constraints, increased availability and adoption of IT- as-a-Service, expansion of Internet connection endpoints, the SMB North America Market market, applications to prevent data loss, and SaaS for remotely-monitored CPE. Vision Market Size, Worldwide Market Share $8,000 Market Growth 3-Yr CAGR Sales ($US million) $6,000 22% IT Security $4,000 78% $2,000 MSSP MSSP Market $0 0% 5% 10% 15% 20% FY 2009 FY 2010 FY 2011 FY 2012E IT Security Market 9
  • 10. Content-Aware Data Loss Prevention (DLP) Gartner Magic Quadrant, Aug ‘11 Market Definition Content-aware DLP tools enable the dynamic application of policy based on the classification of content determined at the time of an operation. These technologies and inspection techniques are used to Symantec classify information content contained within an object – such as a file, McAfee email, packet, application, or data store - while at rest (in storage), in use CA RSA (during an operation), or in transit (across a network); and the ability Execution Websense to dynamically apply a policy – such as log, report, classify, tag, and Trustwave Verdasys encrypt – and/or apply enterprise data rights management protections. Code Green They can execute responses ranging from simple notification to active blocking – based on policy settings. Trend Micro Fidelis GTB Technologies Safend DLP technologies help organizations develop, educate, and enforce Pallisade better business practices concerning the handling and transmission of sensitive data. Used to its full capability, DLP is a nontransparent control, which means it is intentionally visible to an end user with a primary value proposition of changing user behavior. Vision Market Size Market Share $600 Market Growth 3-Yr CAGR 2% Sales ($US million) $500 $400 12% IT Security $300 $200 98% $100 DLP 22% $0 DLP Market FY 2009 FY 2010 FY 2011 FY 2012E IT Security Market 10 10
  • 11. Security Information & Event Management (SIEM) Market Definition Gartner Magic Quadrant, May ‘12 SIEM technology aggregates the event data produced by security devices, network devices, systems, and applications. The primary data source is log data but SIEM technology can also process other forms of HP ArcSight data. Event data is combined with contextual information about users, IBM Q1 Labs data, and assets. The data is normalized so that events from disparate McAfee Nitro sources can be correlated and analyzed for specific purposes such as RSA (EMC) Security Splunk network security event monitoring, user activity monitoring, or compliance Execution NetIQ Symantec LogRhythm reporting. This technology combines real-time security monitoring, LogLogic SolarWinds historical analysis, and other support for incident investigation and Trustwave compliance reporting. Deployment and support simplicity is an important elQnetworks attribute for all use cases because of the resource constraints of most IT Sensage security organizations. Features: behavior profiling, anomaly detection, threat intelligence, and advanced analytics – to support the early detection of targeted attacks. Drivers include real-time security monitoring and compliance reporting. Vision Market Share Market Size $1,400 Market Growth 3-Yr CAGR 5% Sales ($US million) $1,200 $1,000 $800 IT Security 12% 95% $600 $400 $200 SIEM 14% SIEM Market $0 IT Security Market FY 2009 FY 2010 FY 2011 FY 2012E 11 11
  • 12. Threat Intelligence Incident & Access Management Data Loss Prevention SIEM File Integrity Monitoring Enterprise Resource Management Security Information & Event Management (SIEM) Application Monitoring • Analytics • Reporting • Ad hoc query Behavior • Log management Profiling Database Activity Monitoring 12
  • 13. Cloud is the Future Cloud computing is a style of computing where scalable and elastic IT-related capabilities are provided “as a service” to customers using Internet technologies Benefits Risks • Increased agility • Security • Reduced cost • Transparency • Less complexity • Assurance • Better focus on the • Lock-in priorities • Integration Cloud Computing Hype Cycle By Gartner • Enhanced collaboration • Financial sustainability • Easier to innovate 13

Hinweis der Redaktion

  1. This presentation was prepared by Lee Mashburn. Several of the slides and resulting insights will not be found elsewhere. Deep research and analysis spanning over 100 hours is distilled into market nuggets that might be useful to viewers.
  2. We start out with an overview of IT market size, segmentation, and projected growth – which spans a #3.8 trillion market spend that is growing at 6% when we ignore all Telecom. Market data courtesy of Gartner.IT Security comprises just 1.5% of the total IT market – but is growing twice as fast at 12%. Various forms of research utilizing a number of sources were used to quantify the IT security market information.
  3. This slide overviews the top priorities of the CIO; who faces a plethora of challenges to get more from BI tools, drive data to mobile users, transform conventional IT-speak into business language spoken by other C-suite members, to deliver IT securely and reliably, and to push the boundary of outsourcing the right work so internal staff can focus to help drive desired business outcomes.
  4. IT Security is a large, fragmented market that spans 11 sub-markets. This particular view segments and compares these sub-markets by size and growth rate.The largest three markets, Enterprise Network Firewalls, Managed Security Service Providers, and Endpoint Protection Platforms comprise 70% of the total market.MSSP is growing at about 17-18% per year.
  5. Mashburn Google-searched many terms associated with the IT Security space and built this graphic to visualize the most searched phrases occurring during the last 12 months.Information like this is valuable to determine search engine optimization key words and phrases – to increase brand awareness, thought leadership, and to drive traffic to websites and blogs. These are also key words to leverage throughout the sales process to target the right audience and to shorten sales cycles.
  6. An infographic created by Mashburn to help quickly visualize key aspects of the IT Security market.The 11 bubbles each represent a sub-market. The size of each bubble reflects comparative size of a sub-market. The vertical arrangement reflects the relative growth rate of each sub-market – with slower growth areas on the bottom and faster growth rate areas at the top.MSSP is a large market ($6b/year) and is growing well at 17-18% CAGR.
  7. This graphic required a great deal of time investment to research and construct.Mashburn looked at the entire IT Security market leveraging many sources (industry analyst reports, competitor websites, etc.) I was looking for ways to consolidate and simplify the fragmented market and to identify the most dominant or emerging competitors in the space.Leveraging Excel, I segmented each of the 11 submarkets and overlaid key vendors that participate in each submarket. I used color coding to highlight the vendor strength: dark green = very strong, light green = strong, yellow = medium.This exercise allowed me to find patterns and to group submarkets into larger, more primary markets – which are reflected by the bubbles above the Excel cutout. Net, net: seven submarkets have been condensed into a $15 billion market (left bubble) that is dominated by Cisco, McAfee, Symantec, etc. MSSP bubble, with key competitors, is on the right.
  8. This infographic provides an at-a-glance snapshot into the MSSP submarket of IT Security – includes:- market definition and key drivers size, share of IT security, and growth rate key players as portrayed in Gartner magic quadrant
  9. This infographic provides an at-a-glance snapshot into the DLP submarket of IT Security – includes:- market definition and key drivers size, share of IT security, and growth rate key players as portrayed in Gartner magic quadrant
  10. This infographic provides an at-a-glance snapshot into the SIEM submarket of IT Security – includes:- market definition and key drivers size, share of IT security, and growth rate key players as portrayed in Gartner magic quadrant
  11. A high-level visual of SIEM denoting the key data sources that feed it.
  12. Cloud is the future and is emerging as a key deployment technology for IT security software and services. Cloud now comprises 17% of all IT security solution deployments – is projected to increase to 24% of total by 2016.