idc & blue coat security infographic | voyager networks

1
An IDC Infographic, sponsored by Blue Coat Identity and access management; Advanced authentication; Web single sign-on; Enterprise single sign-on; Legacy authorization; User provisioning; Personal portable security devices; Software licensing authentication token; Unified threat management; Intrusion detection and prevention; Virtual private network; Security and vulnerability management; Security information and event management; Proactive endpoint risk management; Forensics and incident investigation; Security device and systems management; Vulnerability assessment... $20 million 1999 Worldwide PC shipments 1999 Worldwide Security Software 2012 Worldwide Security Software $3.8 Billion $19.3 Billion 2012 Worldwide PC shipments $371.1 million 43 157 644 774 2000 2001 2002 2003 2004 2005 2006 2007 2008 $357.4B $6,884B DataLossDB.org incidents 2004-2007 Worldwide E-Commerce Spending (B2B & B2C) $B 8000 7000 6000 5000 4000 3000 2000 1000 0 Which if any of the following is your company currently using/likely to purchase or implement during the next 12 months? Any potential security risks cloud computing or SaaS introduce are far outweighed by the benefits. Employees using personal smartphones at work understand the risks, and are aware of security proper security practices. 45% 33% 22% AGREE DISAGREE NEUTRAL 63% 23% 14% from pain to empowerment Antiviral, Firewall, Encryption, Security AAA Security submarkets tracked by IDC 2013 Security submarkets tracked by IDC 1999 I LOVE YOU Emerges Code Red costs top $2B Slammer Worm infects an estimated 150,000 to 200,000 servers worldwide How would you describe your mobile device environment? 63% BYOD 37% IT-CONTROLLED Worldwide cloud revenue ($B) 2012 2013 2014 2015 2016 659 SMARTPHONE SHIPMENTS (M) 1,161 $29B $67B Employee Monitoring Solutions: 57% Network Admission Control: 57% Data loss prevention: 62% Complexity of security solutions Increasing sophistication of attacks Increasing volume of threats and/or attacks Web grows as a top threat source Top security challenges facing large enterprises over the next 12 months Top rated enterprise security challenges (a five year comparison) DIFFICULTY SECURING WEB APPS 64% EMPLOYEE USE OF WEB 2.0 60% 45% 45% 41% 53% 61% 63% 2007 2008 2009 2010 2011 Does your organization have a formal documented security policy? Yes 65% No 35% Yes 55% No 45% 1999 2016 Era Before Security Era of Pain Era of Obtrusive Security Era of Empowerment Cloud, mobile and consumerization disrupt IT. Security empowers business. Web commerce grows; hackers take notice, mischief turns to theft Enterprises lock-down infrastructures. Breaches mount. Not Much Online Commerce, Not Much thinking About Security

Upload: voyager-networks

Post on 01-Jun-2015

104 views

Category:

Technology


0 download

DESCRIPTION

Voyager Networks is a managed services and solutions provider based in the UK. For more information on how Voyager Networks can help with your network security project, please visit: http://www.voyager.net.uk We're also on Twitter at: https://twitter.com/voyagernetworks LinkedIn: https://www.linkedin.com/company/voyager-networks Facebook: https://www.facebook.com/VoyagerNetworks

TRANSCRIPT

Page 1: IDC & Blue Coat Security Infographic | Voyager Networks

An IDC Infographic, sponsored by Blue Coat

Identity and access management; Advanced authentication; Web single sign-on; Enterprise single sign-on; Legacy authorization; User provisioning; Personal portable security devices; Software licensing authentication token; Uni�ed threat management; Intrusion detection and prevention; Virtual private network; Security and vulnerability management; Security information and event management; Proactive endpoint risk management; Forensics and incident investigation; Security device and systems management; Vulnerability assessment...

$20 million1999 Worldwide PC shipments

1999 Worldwide Security Software 2012 Worldwide Security Software

$3.8 Billion $19.3 Billion

2012 Worldwide PC shipments

$371.1 million

43157

644774

2000 2001 2002 2003 2004 2005 2006 2007 2008

$357.4B

$6,884B

DataLossDB.org incidents2004-2007

Worldwide E-Commerce Spending (B2B & B2C) $B

8000

7000

6000

5000

4000

3000

2000

1000

0

Which if any of the following is your company currently using/likely to purchase

or implement during the next 12 months?

Any potential security risks cloud computing or SaaS introduce are

far outweighed by the bene�ts.

Employees using personal smartphones at work understand the risks, and are aware of security proper security practices.

45%33%22%

AGREE

DISAGREE

NEUTRAL

63%23%14%

from pain to empowerment

Antiviral, Firewall, Encryption, Security AAA

Security submarkets tracked by IDC 2013

Security submarketstracked by IDC 1999

I LOVE YOUEmerges

Code Red costs top

$2B

Slammer Worminfects an

estimated 150,000to 200,000 servers

worldwide

How would you describe your mobile device environment?

63%BYOD

37%IT-CONTROLLED

Worldwide cloud revenue ($B)

2012 2013 2014 2015 2016

659 SMARTPHONE SHIPMENTS (M) 1,161

$29B$67B

Employee Monitoring Solutions: 57%Network Admission Control: 57%Data loss prevention: 62%

Complexity of security solutions

Increasing sophistication of attacks

Increasing volume of threats and/or attacks

Web grows as a top threat sourceTop security challenges facing large enterprises over the next 12 months

Top rated enterprise security challenges(a �ve year comparison)

DIFFICULTY SECURING WEB APPS

64%EMPLOYEE

USE OF WEB 2.0

60%

45%45%41%

53%61%63%

2007 2008 2009 2010 2011

Does your organization have a formal documented

security policy?

Yes

65%No35%

Yes55% No

45%

1999 2016Era Before Security Era of Pain Era of Obtrusive Security Era of Empowerment

Cloud, mobile and consumerization disrupt IT. Security empowers business.

Web commerce grows; hackers take notice, mischief turns to theft

Enterprises lock-down infrastructures. Breaches mount.

Not Much Online Commerce, Not Much thinking About Security