SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
VENDOR PROFILE

                                                               Websense Vendor Profile: Securing Web 2.0
                                                               Brian E. Burke


                                                               IDC OPINION
                                                               Social networking sites such as Facebook, which were once considered to be only
                                                               consumer applications, are quickly moving into the enterprise environment. Many
                                                               organizations are struggling with allowing their employees to use Web 2.0 tools
www.idc.com




                                                               responsibly without sacrificing security and regulatory compliance requirements.
                                                               These environments have created a risk of both data leaks and new channels for
                                                               malware. However, IDC believes Web 2.0 technologies, if used securely, can help
                                                               organizations increase collaboration and productivity and drive revenue. This is
F.508.935.4015




                                                               especially important in today's tough economic climate. Organizations need to
                                                               balance the business value of Web 2.0 technologies with the risks and security
                                                               implications of many nonsecure and uncontrolled Web 2.0 environments. The
                                                               advances in Web 2.0 technologies require a new generation of Web security tools
                                                               that go well beyond traditional URL filtering. Key trends in the Web security market
P.508.872.8200




                                                               include:

                                                                The high volume of user-generated content in the Web 2.0 environment requires
                                                                 that effective Web security solutions have real-time deep content analysis and
                                                                 classification.
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA




                                                                Web 2.0 presents a significant data loss prevention (DLP) challenge for many
                                                                 enterprises. Message boards, blogs, tweets, and other types of social networking
                                                                 sites are becoming a pipeline for information leakages and compliance violations.

                                                                The boundaries between consumer and corporate Web 2.0 environments are
                                                                 blurring. IDC believes a growing number of consumer-oriented Web 2.0
                                                                 technologies will continue to saturate the corporate environment.

                                                                Many Web 2.0 applications leverage evasive techniques to communicate and
                                                                 share information. The challenge of identifying these applications and applying
                                                                 appropriate policies is a burden many organizations are facing today.

                                                                The growing number of mobile and remote users is creating a complex
                                                                 distributed workplace. Many corporate applications are being moved to the Web
                                                                 2.0 environment to allow remote employees to work more efficiently.




                                                               Filing Information: September 2009, IDC #220048, Volume: 1, Tab: Vendors
                                                               Security Products: Vendor Profile
IN THIS VENDOR PROFILE
This IDC Vendor Profile features Websense Inc., the worldwide leader in the Web
security market (see Worldwide Web Security 2009–2013 Forecast and 2008 Vendor
Shares: It's All About Web 2.0 YouTwitFace, IDC #219502, August 2009). This
Vendor Profile analyzes Websense's range of Web security services, company
strategy, and developments in the market. Finally, this Vendor Profile discusses the
challenges and opportunities that Websense will face in an increasingly competitive
market.



SITUATION OVERVIEW

Company Overview

The Web Security Market in 2008

Performance of Leading Vendors in 2008

The worldwide Web security market reached $1.4 billion in 2008, representing 16%       Websense was the
                                                                                       worldwide Web
growth over 2007. Figures 1 and 2 and Table 1 display the 2008 worldwide revenue       security leader in
share for Web security vendors. Websense was the worldwide Web security leader in      2007, and it once
                                                                                       again leads the pack
2007, and it once again leads the pack in 2008 in the total Web security market as     in 2008.
well as the Web security software market. Websense is the second-largest vendor in
the fast-growing Web security software-as-a-service (SaaS) market.




FIGURE 1

Worldwide Web Security Revenue Share by Vendor, 2008

                                                    Websense
                                                     (19.5%)




                                                           Trend Micro
                    Other (52.7%)                            (11.4%)



                                                         Microsoft (7.0%)
                                                      McAfee (6.6%)
                                                Blue Coat (2.8%)


                                    Total = $1,409M

Source: IDC, 2009




2                                           #220048                                       ©2009 IDC
FIGURE 2

Worldwide Web Security Software Revenue Share by
Vendor, 2008

                                                                 Websense
                                                                  (26.2%)


                     Other (40.5%)




                                                                   Trend Micro
                                                                     (15.3%)
                               Check Point
                                 (3.5%)
                                                       Microsoft (9.6%)
                                McAfee (4.9%)


                                         Total = $1,032M

Source: IDC, 2009




 TABLE 1

 Worldwide Web Security SaaS Revenue by Vendor, 2007–2008 ($M)

                                                                                  2007–2008
                         2007                   2008             2007 Share (%)   Growth (%)   2008 Share (%)

 ScanSafe                 17                    23                    34.5           35.3          30.3

 Websense                  3                     5                        5.5        96.3            7.0

 Symantec                  3                     4                        5.1        60.0            5.3

 Trend Micro               2                     3                        4.5        36.4            3.9

 Google                    2                     3                        4.1        50.0            3.9

 MX Logic                  2                     3                        3.9        57.9            3.9

 Webroot                   1                     3                        2.0      150.0             3.3

 Blue Coat                 1                     2                        2.0      100.0             2.6

 Purewire                  –                     1                         –          NA             0.7

 Zscaler                   –                     1                         –          NA             0.7

 Subtotal                 30                    47                    61.5           54.5          61.6

 Other                    19                    29                    38.5           53.7          38.4

 Total                    49                    76                   100.0           54.2         100.0

 Source: IDC, 2009




©2009 IDC                                              #220048                                             3
Company Strategy

Websense (Nasdaq: WBSN) is a global leader in integrated Web, data, and email              Websense (Nasdaq:
                                                                                           WBSN) is a global
security, providing Essential Information Protection for more than 42 million              leader in integrated
employees at more than 50,000 organizations worldwide. Headquartered in San                Web, data, and email
                                                                                           security, providing
Diego, California, Websense distributes its solutions through a global network of          Essential Information
channel partners. Websense software and hosted security solutions help                     Protection for more
organizations block malicious code, prevent the loss of confidential information, and      than 42 million
                                                                                           employees at more
enforce Internet use and security policies. Websense has its roots in Web filtering and    than 50,000
continues to develop its core strength in discovering and classifying content across all   organizations
                                                                                           worldwide.
its product offerings. Websense provides visibility into the internal and external
movement of information in the Web 2.0 world, with extensive management of who is
authorized to access Web sites, content, or applications, as well as what data must
be protected from leaks, where users and data can go online, and how data and
online resources can be communicated and used.

Websense Web Security Gateway allows organizations to secure Web traffic
effectively while still enabling the latest Web-based tools and applications. Through a
multivector traffic-scanning engine, the Websense Web Security Gateway analyzes
Web traffic in real time, instantly categorizing new sites and dynamic content and
proactively discovering security risks and blocking dangerous malware.

Using the Websense ThreatSeeker Network, the Websense Web Security Gateway
provides advanced analytics, including rules, signatures, heuristics, and application
behaviors, to detect and block proxy avoidance, hacking sites, adult content, botnets,
keyloggers, phishing attacks, spyware, and many other types of unsafe content.
Websense Web Security Gateway also closes a common security gap: decrypting
and analyzing SSL-encrypted content before it enters the network.



FUTURE OUTLOOK
The worldwide Web security market is forecast to grow from $1.4 billion in 2008 to
$2.5 billion in 2013, representing a 12% compound annual growth rate (CAGR). Web
security SaaS will be the fastest-growing segment of the Web security market. Web
security SaaS will grow from $76 million in 2008 to $513 million in 2013, representing
a 46.5% CAGR (see Table 2).




4                                             #220048                                         ©2009 IDC
TABLE 2

 Worldwide Web Security Revenue by Platform, 2008–2013 ($M)

                                                                                  2008          2008–2013       2013
                     2008    2009      2010      2011       2012      2013      Share (%)       CAGR (%)      Share (%)

 Software            1,032   1,070     1,115     1,160     1,200     1,239         73.3             3.7           49.3

 Appliance            301     360       449        559       670       760         21.3            20.4           30.3

 SaaS                  76     116       191        295       400       513          5.4            46.5           20.4

 Total               1,409   1,545     1,755     2,014     2,270     2,512        100.0            12.3         100.0

 Source: IDC, 2009




ESSENTIAL GUIDANCE

Advice for Websense

With Web 2.0 applications, the challenge is to imagine a threat where no perceived
threats exist today. As organizations increasingly leverage Web 2.0 for large
enterprise projects that involve sensitive data, security will need to be applied to this
environment. The tolerance for simply smearing on security after a problem will be
seen as increasingly poor, legally deficient, and ignorant of emerging threat
environments.

Still, changing behaviors and perceptions require an incremental approach. The first
step is monitoring so IT understands the issues and can prepare solutions. The next
step is reporting on the findings in such a way that senior executives and business
unit managers can understand the benefits of controlled collaboration where
customer information and intellectual property (IP) are protected from mistaken,
mischievous, and malicious exposure. This phased approach is slow and
cumbersome to implement, but necessary. In concert, technologies must support
gradual migration while also offering the flexibility to deal with monitoring, reporting,
and enforcement. The policy enforcement aspect must be flexible enough to handle
both draconian and laissez-faire attitudes toward these environments.

Instead of rolling up into a ball like an armadillo as an instinctive survival tactic or just             Web 2.0 dramatically
                                                                                                          changes the way
adopting a laissez-faire process where "anything goes," IDC believes successful                           solutions must
organizations should embrace Web 2.0 technologies. Web 2.0 dramatically changes                           classify content for
                                                                                                          data leakage, email,
the way solutions must classify content for data leakage, email, and Web threats.                         and Web threats.
These applications and communities will become a major source of malware
distribution, identity fraud, privacy violations, and corporate data loss. Organizations
must address Web 2.0 technologies with the same security posture as any other
business-critical application.



©2009 IDC                                        #220048                                                                 5
LEARN MORE

Related Research

 Worldwide Web Security 2009–2013 Forecast and 2008 Vendor Shares: It's All
  About Web 2.0 YouTwitFace (IDC #219502, August 2009)

 Worldwide Messaging Security 2009–2013 Forecast Update and 2008 Vendor
  Shares: Is Virtual a Reality? (IDC #219270, July 2009)

 IDC's Software Taxonomy, 2009 (IDC #216557, February 2009)

 Worldwide IT Security Software, Hardware, and Services 2009–2012 Forecast
  and 2007 Vendor Shares: The Big Picture (IDC #216224, January 2009)




Copyright Notice

This IDC research document was published as part of an IDC continuous intelligence
service, providing written research, analyst interactions, telebriefings, and
conferences. Visit www.idc.com to learn more about IDC subscription and consulting
services. To view a list of IDC offices worldwide, visit www.idc.com/offices. Please
contact the IDC Hotline at 800.343.4952, ext. 7988 (or +1.508.988.7988) or
sales@idc.com for information on applying the price of this document toward the
purchase of an IDC service or for information on additional copies or Web rights.

Copyright 2009 IDC. Reproduction is forbidden unless authorized. All rights reserved.




6                                            #220048                                    ©2009 IDC

Weitere ähnliche Inhalte

Was ist angesagt?

Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 EnvironmentVinoth Sivasubramanan
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti
 
Fr february 2022 patch tuesday v2 presenters slides
Fr february 2022 patch tuesday v2   presenters slidesFr february 2022 patch tuesday v2   presenters slides
Fr february 2022 patch tuesday v2 presenters slidesIvanti
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch TuesdayIvanti
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
January 2022 patch tuesday
January 2022 patch tuesdayJanuary 2022 patch tuesday
January 2022 patch tuesdayIvanti
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
March 2021 Patch Tuesday
March 2021 Patch TuesdayMarch 2021 Patch Tuesday
March 2021 Patch TuesdayIvanti
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Fr mar 2022 patch tuesday-presenters slides
Fr mar 2022 patch tuesday-presenters slidesFr mar 2022 patch tuesday-presenters slides
Fr mar 2022 patch tuesday-presenters slidesIvanti
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 

Was ist angesagt? (18)

Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020
 
Fr february 2022 patch tuesday v2 presenters slides
Fr february 2022 patch tuesday v2   presenters slidesFr february 2022 patch tuesday v2   presenters slides
Fr february 2022 patch tuesday v2 presenters slides
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch Tuesday
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
January 2022 patch tuesday
January 2022 patch tuesdayJanuary 2022 patch tuesday
January 2022 patch tuesday
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
March 2021 Patch Tuesday
March 2021 Patch TuesdayMarch 2021 Patch Tuesday
March 2021 Patch Tuesday
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Fr mar 2022 patch tuesday-presenters slides
Fr mar 2022 patch tuesday-presenters slidesFr mar 2022 patch tuesday-presenters slides
Fr mar 2022 patch tuesday-presenters slides
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 

Ähnlich wie IDC Report : Web Security

IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009Kim Jensen
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
Public/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessPublic/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessSoftware Park Thailand
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
ztna-2-0-report.pdf
ztna-2-0-report.pdfztna-2-0-report.pdf
ztna-2-0-report.pdfAnto664537
 
The Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicatThe Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicatronnag9bkla
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistanTariq Mustafa
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsSoftware Park Thailand
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprisewhite paper
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Mcafee web20-balancingact
Mcafee web20-balancingactMcafee web20-balancingact
Mcafee web20-balancingactDigital Pymes
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 

Ähnlich wie IDC Report : Web Security (20)

IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
CBS March 11
CBS March 11CBS March 11
CBS March 11
 
The Economist, Serious Business, Web 2.0
The Economist,  Serious Business, Web 2.0The Economist,  Serious Business, Web 2.0
The Economist, Serious Business, Web 2.0
 
Top5 it-predictions-v2
Top5 it-predictions-v2Top5 it-predictions-v2
Top5 it-predictions-v2
 
Public/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessPublic/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & Awareness
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Web02
Web02Web02
Web02
 
ztna-2-0-report.pdf
ztna-2-0-report.pdfztna-2-0-report.pdf
ztna-2-0-report.pdf
 
What is web2.0
What is web2.0What is web2.0
What is web2.0
 
The Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicatThe Web 2.0 phenomenon involves a lot of techniques and applicat
The Web 2.0 phenomenon involves a lot of techniques and applicat
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprise
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
188
188188
188
 
Mcafee web20-balancingact
Mcafee web20-balancingactMcafee web20-balancingact
Mcafee web20-balancingact
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 

Mehr von Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

Mehr von Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

IDC Report : Web Security

  • 1. VENDOR PROFILE Websense Vendor Profile: Securing Web 2.0 Brian E. Burke IDC OPINION Social networking sites such as Facebook, which were once considered to be only consumer applications, are quickly moving into the enterprise environment. Many organizations are struggling with allowing their employees to use Web 2.0 tools www.idc.com responsibly without sacrificing security and regulatory compliance requirements. These environments have created a risk of both data leaks and new channels for malware. However, IDC believes Web 2.0 technologies, if used securely, can help organizations increase collaboration and productivity and drive revenue. This is F.508.935.4015 especially important in today's tough economic climate. Organizations need to balance the business value of Web 2.0 technologies with the risks and security implications of many nonsecure and uncontrolled Web 2.0 environments. The advances in Web 2.0 technologies require a new generation of Web security tools that go well beyond traditional URL filtering. Key trends in the Web security market P.508.872.8200 include:  The high volume of user-generated content in the Web 2.0 environment requires that effective Web security solutions have real-time deep content analysis and classification. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA  Web 2.0 presents a significant data loss prevention (DLP) challenge for many enterprises. Message boards, blogs, tweets, and other types of social networking sites are becoming a pipeline for information leakages and compliance violations.  The boundaries between consumer and corporate Web 2.0 environments are blurring. IDC believes a growing number of consumer-oriented Web 2.0 technologies will continue to saturate the corporate environment.  Many Web 2.0 applications leverage evasive techniques to communicate and share information. The challenge of identifying these applications and applying appropriate policies is a burden many organizations are facing today.  The growing number of mobile and remote users is creating a complex distributed workplace. Many corporate applications are being moved to the Web 2.0 environment to allow remote employees to work more efficiently. Filing Information: September 2009, IDC #220048, Volume: 1, Tab: Vendors Security Products: Vendor Profile
  • 2. IN THIS VENDOR PROFILE This IDC Vendor Profile features Websense Inc., the worldwide leader in the Web security market (see Worldwide Web Security 2009–2013 Forecast and 2008 Vendor Shares: It's All About Web 2.0 YouTwitFace, IDC #219502, August 2009). This Vendor Profile analyzes Websense's range of Web security services, company strategy, and developments in the market. Finally, this Vendor Profile discusses the challenges and opportunities that Websense will face in an increasingly competitive market. SITUATION OVERVIEW Company Overview The Web Security Market in 2008 Performance of Leading Vendors in 2008 The worldwide Web security market reached $1.4 billion in 2008, representing 16% Websense was the worldwide Web growth over 2007. Figures 1 and 2 and Table 1 display the 2008 worldwide revenue security leader in share for Web security vendors. Websense was the worldwide Web security leader in 2007, and it once again leads the pack 2007, and it once again leads the pack in 2008 in the total Web security market as in 2008. well as the Web security software market. Websense is the second-largest vendor in the fast-growing Web security software-as-a-service (SaaS) market. FIGURE 1 Worldwide Web Security Revenue Share by Vendor, 2008 Websense (19.5%) Trend Micro Other (52.7%) (11.4%) Microsoft (7.0%) McAfee (6.6%) Blue Coat (2.8%) Total = $1,409M Source: IDC, 2009 2 #220048 ©2009 IDC
  • 3. FIGURE 2 Worldwide Web Security Software Revenue Share by Vendor, 2008 Websense (26.2%) Other (40.5%) Trend Micro (15.3%) Check Point (3.5%) Microsoft (9.6%) McAfee (4.9%) Total = $1,032M Source: IDC, 2009 TABLE 1 Worldwide Web Security SaaS Revenue by Vendor, 2007–2008 ($M) 2007–2008 2007 2008 2007 Share (%) Growth (%) 2008 Share (%) ScanSafe 17 23 34.5 35.3 30.3 Websense 3 5 5.5 96.3 7.0 Symantec 3 4 5.1 60.0 5.3 Trend Micro 2 3 4.5 36.4 3.9 Google 2 3 4.1 50.0 3.9 MX Logic 2 3 3.9 57.9 3.9 Webroot 1 3 2.0 150.0 3.3 Blue Coat 1 2 2.0 100.0 2.6 Purewire – 1 – NA 0.7 Zscaler – 1 – NA 0.7 Subtotal 30 47 61.5 54.5 61.6 Other 19 29 38.5 53.7 38.4 Total 49 76 100.0 54.2 100.0 Source: IDC, 2009 ©2009 IDC #220048 3
  • 4. Company Strategy Websense (Nasdaq: WBSN) is a global leader in integrated Web, data, and email Websense (Nasdaq: WBSN) is a global security, providing Essential Information Protection for more than 42 million leader in integrated employees at more than 50,000 organizations worldwide. Headquartered in San Web, data, and email security, providing Diego, California, Websense distributes its solutions through a global network of Essential Information channel partners. Websense software and hosted security solutions help Protection for more organizations block malicious code, prevent the loss of confidential information, and than 42 million employees at more enforce Internet use and security policies. Websense has its roots in Web filtering and than 50,000 continues to develop its core strength in discovering and classifying content across all organizations worldwide. its product offerings. Websense provides visibility into the internal and external movement of information in the Web 2.0 world, with extensive management of who is authorized to access Web sites, content, or applications, as well as what data must be protected from leaks, where users and data can go online, and how data and online resources can be communicated and used. Websense Web Security Gateway allows organizations to secure Web traffic effectively while still enabling the latest Web-based tools and applications. Through a multivector traffic-scanning engine, the Websense Web Security Gateway analyzes Web traffic in real time, instantly categorizing new sites and dynamic content and proactively discovering security risks and blocking dangerous malware. Using the Websense ThreatSeeker Network, the Websense Web Security Gateway provides advanced analytics, including rules, signatures, heuristics, and application behaviors, to detect and block proxy avoidance, hacking sites, adult content, botnets, keyloggers, phishing attacks, spyware, and many other types of unsafe content. Websense Web Security Gateway also closes a common security gap: decrypting and analyzing SSL-encrypted content before it enters the network. FUTURE OUTLOOK The worldwide Web security market is forecast to grow from $1.4 billion in 2008 to $2.5 billion in 2013, representing a 12% compound annual growth rate (CAGR). Web security SaaS will be the fastest-growing segment of the Web security market. Web security SaaS will grow from $76 million in 2008 to $513 million in 2013, representing a 46.5% CAGR (see Table 2). 4 #220048 ©2009 IDC
  • 5. TABLE 2 Worldwide Web Security Revenue by Platform, 2008–2013 ($M) 2008 2008–2013 2013 2008 2009 2010 2011 2012 2013 Share (%) CAGR (%) Share (%) Software 1,032 1,070 1,115 1,160 1,200 1,239 73.3 3.7 49.3 Appliance 301 360 449 559 670 760 21.3 20.4 30.3 SaaS 76 116 191 295 400 513 5.4 46.5 20.4 Total 1,409 1,545 1,755 2,014 2,270 2,512 100.0 12.3 100.0 Source: IDC, 2009 ESSENTIAL GUIDANCE Advice for Websense With Web 2.0 applications, the challenge is to imagine a threat where no perceived threats exist today. As organizations increasingly leverage Web 2.0 for large enterprise projects that involve sensitive data, security will need to be applied to this environment. The tolerance for simply smearing on security after a problem will be seen as increasingly poor, legally deficient, and ignorant of emerging threat environments. Still, changing behaviors and perceptions require an incremental approach. The first step is monitoring so IT understands the issues and can prepare solutions. The next step is reporting on the findings in such a way that senior executives and business unit managers can understand the benefits of controlled collaboration where customer information and intellectual property (IP) are protected from mistaken, mischievous, and malicious exposure. This phased approach is slow and cumbersome to implement, but necessary. In concert, technologies must support gradual migration while also offering the flexibility to deal with monitoring, reporting, and enforcement. The policy enforcement aspect must be flexible enough to handle both draconian and laissez-faire attitudes toward these environments. Instead of rolling up into a ball like an armadillo as an instinctive survival tactic or just Web 2.0 dramatically changes the way adopting a laissez-faire process where "anything goes," IDC believes successful solutions must organizations should embrace Web 2.0 technologies. Web 2.0 dramatically changes classify content for data leakage, email, the way solutions must classify content for data leakage, email, and Web threats. and Web threats. These applications and communities will become a major source of malware distribution, identity fraud, privacy violations, and corporate data loss. Organizations must address Web 2.0 technologies with the same security posture as any other business-critical application. ©2009 IDC #220048 5
  • 6. LEARN MORE Related Research  Worldwide Web Security 2009–2013 Forecast and 2008 Vendor Shares: It's All About Web 2.0 YouTwitFace (IDC #219502, August 2009)  Worldwide Messaging Security 2009–2013 Forecast Update and 2008 Vendor Shares: Is Virtual a Reality? (IDC #219270, July 2009)  IDC's Software Taxonomy, 2009 (IDC #216557, February 2009)  Worldwide IT Security Software, Hardware, and Services 2009–2012 Forecast and 2007 Vendor Shares: The Big Picture (IDC #216224, January 2009) Copyright Notice This IDC research document was published as part of an IDC continuous intelligence service, providing written research, analyst interactions, telebriefings, and conferences. Visit www.idc.com to learn more about IDC subscription and consulting services. To view a list of IDC offices worldwide, visit www.idc.com/offices. Please contact the IDC Hotline at 800.343.4952, ext. 7988 (or +1.508.988.7988) or sales@idc.com for information on applying the price of this document toward the purchase of an IDC service or for information on additional copies or Web rights. Copyright 2009 IDC. Reproduction is forbidden unless authorized. All rights reserved. 6 #220048 ©2009 IDC