network security - time for a change perhaps?
DESCRIPTION
Frost & Sullivan Analyst Briefing on network security trendsTRANSCRIPT
Network Security- Time for a Change Perhaps?
Aliza Kasim
Research Analyst
ICT Practice, Frost & Sullivan
2
Table of Content
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
3
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
4
ANZ
Politically stable; strong
economy fuelled by primary
industries
Technologically advanced and
savvy region; IT as part of
business strategy
Early adopter of emerging
technologies and high receptivity
to managed security services
model
Japan• Weak Japanese economy,
coupled with recent slate of disasters
• Drive towards advanced technologies; security and virtualization
• Rising emphasis on CAPEX and OPEX value
• Strong focus on branding and client-oriented sales approach
South Korea• Stable political climate, albeit
with economy still recovering• Mature security market and
mindset; highly IT connected society
• Strong local vendors• Competitive replacement market
for security solutions
GCR• Politically stable, coupled with
excellent economic growth potential,
• Massive opportunities in governmental sector
• Competitive landscape with local and global vendors
• Abundance of greenfield opportunities; strong focus on threat research/Web security .
India• Rapidly recovering economic
growth; domestic market continues to expand
• Room for growth in technology adoption
• Rapid drive towards managed services model
ASEAN• Political and economic climate
gradually stabilizing• Disparate levels of security
adoption; immature levels of regulatory compliance
• Less receptive to new technologies; prefer tried/tested methods
• Lower barriers to entry for new market players
Understanding APAC
5
What’s Driving IT Security
Increasing
sophistication
of threatsRegulatory &
Compliance
Maturing customer mindset
Infrastructure
growth and
expansion
Technology Convergence
Source: Frost & Sullivan.
6<GPS>
Network Security MarketHistorical and Forecast Revenue Analysis 2007-2013
1,537.5
1,812.0 1,782.7 1,841.61,988.8
2,216.5
2,470.0
1,165.3
1,346.4 1,303.2 1,343.8
1,447.91,605.4
1,775.3
264.4331.7 351.9 363.6
396.1 447.6 508.1
107.8134.0 127.6 134.2
144.7 163.5186.6
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
2007 2008 2009 2010 2011 2012 2013
Total Network Security Market CAGR (2011-2013): 7.5%
FireWall/IPSec VPN CAGR (2011-2013): 7.0%
IDS/IPS CAGR (2011-2013): 8.7%
SSL VPN CAGR (2011-2013): 8.8%
Note: All figures are rounded; the base year is 2010. Source: Frost & Sullivan
Tota
l Re
ven
ue
(U
S$
Mill
ion
)
Network Security Market in Asia Pacific, 2007-2013
7<GPS>
1,782.7 1,841.6
1,988.8
2,216.5
2,470.0
1,208.9
1,381.4
1,640.5
1,997.5
2,439.1
452.2 522.0 617.0739.6
891.6
81.1 93.4 112.9 140.5 181.0
46.9 60.2 83.9 119.8 167.925.1 37.9 60.6 98.1 153.9
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
2009 2010 2011 2012 2013
Network Security CAGR (2011-2013): 10.3%
MSS CAGR (2011-2013): 20.9%
SCM CAGR (2011-2013): 19.5%
SIEM CAGR (2011-2013): 24.7%
WAF CAGR (2011-2013): 40.7%
DLP CAGR (2011-2013): 59.6%
Note: All figures are rounded; the base year is 2010. Source: Frost & Sullivan
Tota
l Re
ven
ue
(U
S$
Mill
ion
)
Market Forecast for Security Segments in Asia Pacific, 2010-2013
Opportunities in the Security Arena
8<GPS>
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
9<GPS>
Facebook user, forum contributor
The Role of the Individual
Human Individual
Public Domain
Personal Domain
Professional Domain
Employee, mobile worker,
remote user
Home user, website blogger
10<GPS>
What Does This Mean to Enterprises?
Guarding vs Leveraging
Technologies
Security as Business IssueConsumer Trends
Lack of ControlGrowing Threat
Exposure
Evolving Threats
11<GPS>
Paradigm Shift
Infrastructure Security
Gateway vs Endpoint
Static perspective
Defensive approach
Information-centric Security
Data protection
External/Internal viewpoints
Preventive approach
User-centric Security
Application-centric
Dynamic control
Centralized management
12<GPS>
#1 Treat Users as Your Endpoints!
Blurring of responsibilities
Increasingly tech-savvy
Adoption vs Compliance
User education & enforcement
Consumer vs Enterprise
devices
Mobile Computing
13<GPS>
#2 Get Back the Power of Control!
Understanding
Managing
Power of Control
+ =
14<GPS>
#3 It Isn’t Just Defending!
Dynamic Security vs Defensive Security
Proactive vs Reactive
Assess Both External and Internal Threats
Attack Potential Security Loopholes
15<GPS>
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
16<GPS>
The Dynamic Application-Fluent Firewall
Static vs Dynamic
Understands the Application
language
Multi-faceted Converged
Platform
Flexible and Scalable
Centralized Reporting and Enforcement
User Identification
Software Performance Management
17<GPS>
Next Stop: Intelligent Convergence
Network Security
Effective security management requires intelligent interactionbetween the different components
Content Security
Application Security
Endpoint Security
Access Control
Data Security
18<GPS>
The Security Customer of the Future
ScalabilityPerformance
Application-centric
A need for a holistic view towards IT security that caters to multi-faceted
technology and business needs
Convergence
19
Security Trends
Mobile Security
Converged Platform
Forensic & Event Management
Compliance
Virtualized Security
Application-Centric Security
Upcoming Security Trends
20
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
21<GPS>
Risk Management
Threat Management
Technology People Process
Moving Towards Risk Management
22<GPS>
TacticalTactical
Aligning security strategy with business strategy
Strategic
Technology, people and processTechnology drivenTechnology driven
IT responsibilityIT responsibility Business + IT shared responsibility
ROI is difficult to measureROI is difficult to measure Easier ROI measurement
Viewing Threats to Assessing Risk
23<GPS>
Failure to approach security at an Organizational level
Reactive and purely technology/product based approach
Treating security as an expense/sunk cost
Failure to integrate people, processes and products
View security as purely a technology & not business issue
1
5
43
2
5 Common Mistakes of Security Management
24<GPS>
Strategizing
Adapting
Controlling
Implementing
Planning
• Business Risk Perspective• Integration into Corporate Governance Framework• People, Process, Technology
• Dynamic Boundaries• Technology-Centric Businesses
• User Empowerment vs User Misuse• Beyond Systems to Individuals
• Intelligent Convergence• Security Platforms• Dynamic, Scalable• Need for Performance
• ‘Security is a process’• Sustaining Manageability• Centralized Approach• Long-term Cost Viability
A Framework for Change
25<GPS>
Value Operationalization
Improving Customer Experiences
Selling Products
Changing the Customer Approach
Mapping SolutionsPrice Competition
IT-centric Business-centricTechnical Discussions
Business Interactions
Listen First, Sell Later
26<GPS> 26
Global Support
Localization
Integrated Solutions
R&D Expertise/ Tech Roadmap
Preferred Partner
Brand Strength
Financial stability
Choosing the Right Vendor
27<GPS>
http://twitter.com/frost_sullivan
Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter
http://www.facebook.com/pages/Frost-Sullivan/249995031751?ref=ts
http://www.linkedin.com/companies/4506
http://www.slideshare.net/FrostandSullivan
28<GPS>
For Additional Information
Donna JeremiahCorporate CommunicationsAsia Pacific+603 6204 [email protected]
Carrie LowCorporate CommunicationsAsia Pacific+603 6204 [email protected]
Aliza KasimResearch AnalystICT+603 6204 [email protected]