SlideShare ist ein Scribd-Unternehmen logo
1 von 21
RSA 大会数据分析 —— RSAC2009 、 2010 分析 ,[object Object]
2009 年分析
2009 各个领域产品的热度
2009 各个领域产品的热度
Enterprise Security Management 76 Compliance Management 55 Authentication 47 Application Security 46 Access Control 45 Endpoint Security 45 Risk Management 41 Identity Management 40 Anti Malware 33 Intrusion Detection 28 Vulnerability Assessment 28 Policy management enforcement 26 Encryption key management 25 Compliance PCI 24 Content Filtering 24 Firewalls 24 Web Services Security 24 Database Security 22 Password Management 21 Anti Spam 20
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
技术的融合 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2010 年分析
参展厂商数量减少 2009 年参展厂商 368 2010 年离开的参展商 149 占 2009 年厂商数的 40% 2010 年新参加的参展商 75 占 2009 年厂商数的 20% 2010 年参展商 316 厂商数比 2009 年的减少 15%
2009 、 2010 产品热度对比 绿 2009 , 蓝 2010
按 2009 年产品热度降序排列 绿 2009 , 蓝 2010
按 2009 年产品热度降序排列 绿 2009 , 蓝 2010 ,  红增额
按 2010 产品热度降序排列 绿 2009 , 蓝 2010
2010 年热度产品类 Compliance Management 55 Enterprise Security Management 48 Data Security 44 Cloud Computing 36 Endpoint Security 36 Application Security 36 Authentication 35 Intrusion Detection 34 Risk Management 34 Threat Management 32 Access Control 31 PCI 30 Anti Malware 30 Encryption 30 Identity Management 29 Vulnerability Assessment 28 Firewalls 24 Managed Security Services 22 Cybercrime 20 Forensics 19 Anti Spam 19 Policy management enforcement 19 Online Security 17 Content Filtering 16 SIEM 15 Audit 15 Encryption key management 15
2010 热度产品降序,附红差 绿 2009 , 蓝 2010 ,  红增额
根据 2010 热度增加额排序,向下为减 绿 2009 , 蓝 2010 ,  红增额
2010 年增加最多的产品类 大部分为新增的产品类 2010 差额 Data Security 44 44 Threat Management 32 32 Encryption 30 30 Cloud Computing 36 29 Online Security 17 17 PCI 30 14 Mobile Device Security 14 14 Insider Threats 12 12 Zero Day Vulnerability 11 11 Forensics 19 10 Biometrics 10 10 Identity Theft 10 10 Security Architecture 10 10 2010 差额 Botnet 9 9 Standard 9 9 Healthcare 8 8 Governance 7 7 Hacking 7 7 Intrusion Detection 34 6 Security Education 12 6 Visualization 8 6 Exploit of Vulnerability 6 6 Web2.0 6 6 Cybercrime 20 5 DLP 8 5 Web Server Security 5 5
2010 年减少最多的产品类 产品类 2009 差 Secure File Transfer 14 -5 Software Code Vul. Analysis 11 -5 Physical Security 10 -5 User Awareness 5 -5 Messaging Security 17 -6 Network Protocol Security 15 -6 Configuration Patch Management 11 -6 Risk Management 41 -7 Policy management enforcement 26 -7 Wireless Security 19 -7 Content Filtering 24 -8 Password Management 21 -8 Endpoint Security 45 -9 VPN 15 -9 2009 差 Application Security 46 -10 Encryption key management 25 -10 Identity Management 40 -11 Authentication 47 -12 Database Security 22 -12 Access Control 45 -14 Web Services Security 24 -16 Web Filtering 16 -16 Compliance PCI 24 -24 Enterprise Security Management 76 -28
热度变化不大的产品类 绿 2009 , 蓝 2010
变化不大的热门产品 2009 2010 Security Ecommerce 12 12 Virtualization 14 12 Privacy 8 11 Government Standards 10 11 Security Consulting 15 11 Storage Security 10 10 Penetration Testing 10 9 SSO 10 9 Incident Response 13 9 2009 2010 Compliance Management 55 55 Anti Malware 33 30 Vulnerability Assessment 28 28 Firewalls 24 24 Managed Security Services 18 22 Anti Spam 20 19 SIEM 15 15 Audit 19 15 Remote Access 16 14
变化不大的冷门产品 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
rsouthal2003
 

Was ist angesagt? (20)

Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security Industry
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration Datasheet
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
New york oracle users group 2013 spring general meeting ulf mattsson
New york oracle users group 2013 spring general meeting   ulf mattssonNew york oracle users group 2013 spring general meeting   ulf mattsson
New york oracle users group 2013 spring general meeting ulf mattsson
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 

Andere mochten auch

Andere mochten auch (6)

Fun with Ruby and Redis
Fun with Ruby and RedisFun with Ruby and Redis
Fun with Ruby and Redis
 
Recommendation Engines with Ruby and Redis
Recommendation Engines with Ruby and RedisRecommendation Engines with Ruby and Redis
Recommendation Engines with Ruby and Redis
 
Fun with ruby and redis, arrrrcamp edition, javier_ramirez, teowaki
Fun with ruby and redis, arrrrcamp edition, javier_ramirez, teowakiFun with ruby and redis, arrrrcamp edition, javier_ramirez, teowaki
Fun with ruby and redis, arrrrcamp edition, javier_ramirez, teowaki
 
Serializing Ruby Objects in Redis
Serializing Ruby Objects in RedisSerializing Ruby Objects in Redis
Serializing Ruby Objects in Redis
 
Redis, Resque & Friends
Redis, Resque & FriendsRedis, Resque & Friends
Redis, Resque & Friends
 
铺开业务看应用防护
铺开业务看应用防护铺开业务看应用防护
铺开业务看应用防护
 

Ähnlich wie RSA大会2009-2010分析

Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
resultsig
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
Tarek Mekkawy
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
internetbrasil
 

Ähnlich wie RSA大会2009-2010分析 (20)

Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security Breakout
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdf
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
智慧市政大未來 主題一
智慧市政大未來 主題一智慧市政大未來 主題一
智慧市政大未來 主題一
 

Mehr von Jordan Pan (6)

漏洞的进化(CNCERT/CC CNVD)
漏洞的进化(CNCERT/CC CNVD)漏洞的进化(CNCERT/CC CNVD)
漏洞的进化(CNCERT/CC CNVD)
 
2009通信安全峰会(11月6日)
2009通信安全峰会(11月6日)2009通信安全峰会(11月6日)
2009通信安全峰会(11月6日)
 
阵法 左守右攻,前强后弱
阵法 左守右攻,前强后弱阵法 左守右攻,前强后弱
阵法 左守右攻,前强后弱
 
阵法 双人夹击闪电推土机战法
阵法 双人夹击闪电推土机战法阵法 双人夹击闪电推土机战法
阵法 双人夹击闪电推土机战法
 
IT Value and Risk Management
IT Value and Risk ManagementIT Value and Risk Management
IT Value and Risk Management
 
From Principle to Practice
From Principle to PracticeFrom Principle to Practice
From Principle to Practice
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

RSA大会2009-2010分析

  • 1.
  • 5. Enterprise Security Management 76 Compliance Management 55 Authentication 47 Application Security 46 Access Control 45 Endpoint Security 45 Risk Management 41 Identity Management 40 Anti Malware 33 Intrusion Detection 28 Vulnerability Assessment 28 Policy management enforcement 26 Encryption key management 25 Compliance PCI 24 Content Filtering 24 Firewalls 24 Web Services Security 24 Database Security 22 Password Management 21 Anti Spam 20
  • 6.
  • 7.
  • 9. 参展厂商数量减少 2009 年参展厂商 368 2010 年离开的参展商 149 占 2009 年厂商数的 40% 2010 年新参加的参展商 75 占 2009 年厂商数的 20% 2010 年参展商 316 厂商数比 2009 年的减少 15%
  • 10. 2009 、 2010 产品热度对比 绿 2009 , 蓝 2010
  • 11. 按 2009 年产品热度降序排列 绿 2009 , 蓝 2010
  • 12. 按 2009 年产品热度降序排列 绿 2009 , 蓝 2010 , 红增额
  • 13. 按 2010 产品热度降序排列 绿 2009 , 蓝 2010
  • 14. 2010 年热度产品类 Compliance Management 55 Enterprise Security Management 48 Data Security 44 Cloud Computing 36 Endpoint Security 36 Application Security 36 Authentication 35 Intrusion Detection 34 Risk Management 34 Threat Management 32 Access Control 31 PCI 30 Anti Malware 30 Encryption 30 Identity Management 29 Vulnerability Assessment 28 Firewalls 24 Managed Security Services 22 Cybercrime 20 Forensics 19 Anti Spam 19 Policy management enforcement 19 Online Security 17 Content Filtering 16 SIEM 15 Audit 15 Encryption key management 15
  • 15. 2010 热度产品降序,附红差 绿 2009 , 蓝 2010 , 红增额
  • 16. 根据 2010 热度增加额排序,向下为减 绿 2009 , 蓝 2010 , 红增额
  • 17. 2010 年增加最多的产品类 大部分为新增的产品类 2010 差额 Data Security 44 44 Threat Management 32 32 Encryption 30 30 Cloud Computing 36 29 Online Security 17 17 PCI 30 14 Mobile Device Security 14 14 Insider Threats 12 12 Zero Day Vulnerability 11 11 Forensics 19 10 Biometrics 10 10 Identity Theft 10 10 Security Architecture 10 10 2010 差额 Botnet 9 9 Standard 9 9 Healthcare 8 8 Governance 7 7 Hacking 7 7 Intrusion Detection 34 6 Security Education 12 6 Visualization 8 6 Exploit of Vulnerability 6 6 Web2.0 6 6 Cybercrime 20 5 DLP 8 5 Web Server Security 5 5
  • 18. 2010 年减少最多的产品类 产品类 2009 差 Secure File Transfer 14 -5 Software Code Vul. Analysis 11 -5 Physical Security 10 -5 User Awareness 5 -5 Messaging Security 17 -6 Network Protocol Security 15 -6 Configuration Patch Management 11 -6 Risk Management 41 -7 Policy management enforcement 26 -7 Wireless Security 19 -7 Content Filtering 24 -8 Password Management 21 -8 Endpoint Security 45 -9 VPN 15 -9 2009 差 Application Security 46 -10 Encryption key management 25 -10 Identity Management 40 -11 Authentication 47 -12 Database Security 22 -12 Access Control 45 -14 Web Services Security 24 -16 Web Filtering 16 -16 Compliance PCI 24 -24 Enterprise Security Management 76 -28
  • 20. 变化不大的热门产品 2009 2010 Security Ecommerce 12 12 Virtualization 14 12 Privacy 8 11 Government Standards 10 11 Security Consulting 15 11 Storage Security 10 10 Penetration Testing 10 9 SSO 10 9 Incident Response 13 9 2009 2010 Compliance Management 55 55 Anti Malware 33 30 Vulnerability Assessment 28 28 Firewalls 24 24 Managed Security Services 18 22 Anti Spam 20 19 SIEM 15 15 Audit 19 15 Remote Access 16 14
  • 21.