Network Security- Time for a Change Perhaps?<br />AlizaKasim<br />Research Analyst<br />ICT Practice, Frost & Sullivan <br />
Table of Content<br />Network Security Landscape in APAC<br />Mindset Shift in Network Security 	<br />Marriage of People,...
Network Security Landscape in APAC<br />Mindset Shift in Network Security 	<br />Marriage of People, Process & Technology<...
Understanding APAC<br />GCR<br /><ul><li> Politically stable, coupled with excellent economic growth potential,
 Massive opportunities in governmental sector
 Competitive landscape with local and global vendors
 Abundance of greenfield opportunities; strong focus on threat research/Web security .  </li></ul>South Korea<br /><ul><li...
 Mature security market and mindset; highly IT connected society
Strong local vendors
 Competitive replacement market for security solutions</li></ul>Japan<br /><ul><li> Weak Japanese economy, coupled with re...
 Drive towards advanced technologies; security and virtualization
 Rising emphasis on CAPEX and OPEX value
 Strong focus on branding and client-oriented sales approach </li></ul>India<br /><ul><li> Rapidly recovering economic gro...
 Room for growth in technology adoption
 Rapid drive towards managed services model</li></ul>ASEAN<br /><ul><li> Political and economic climate gradually stabilizing
 Disparate levels of security adoption; immature levels of regulatory compliance
 Less receptive to new technologies; prefer tried/tested methods
 Lower barriers to entry for new market players</li></ul>ANZ<br /> Politically stable; strong economy fuelled by primary i...
What’s Driving IT Security <br />Maturing customer mindset<br />Infrastructure growth and expansion <br />Increasing sophi...
Network Security Market<br />Historical and Forecast Revenue Analysis 2007-2013<br />Network Security Market in Asia Pacif...
Opportunities in the Security Arena<br />Market Forecast for Security Segments in Asia Pacific, 2010-2013<br />Total Reven...
Network Security Landscape in APAC<br />Mindset Shift in Network Security	<br />Marriage of People, Process & Technology	<...
The Role of the Individual<br />Employee,   mobile worker,      remote user<br />Facebook user, forum contributor<br />Hom...
Security as Business Issue<br />Consumer Trends<br />Evolving Threats<br />Guarding vs Leveraging Technologies<br />Growin...
Paradigm Shift<br />Gateway vs Endpoint <br />Static perspective<br />Defensive approach <br />Infrastructure Security<br ...
#1 Treat Users as Your Endpoints!<br />Consumer       vs Enterprise devices<br />Mobile Computing<br />Blurring of respons...
#2 Get Back the Power of Control!<br />Understanding <br />Power of Control <br />Managing<br />+ <br />= <br />
#3 It Isn’t Just Defending!<br />Dynamic Security vs                 Defensive Security <br />Proactive vs                ...
Upcoming SlideShare
Loading in …5
×

Network Security - Time for a Change Perhaps?

1,144
-1

Published on

Frost & Sullivan Analyst Briefing on network security trends

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,144
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
20
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Network Security - Time for a Change Perhaps?

  1. 1. Network Security- Time for a Change Perhaps?<br />AlizaKasim<br />Research Analyst<br />ICT Practice, Frost & Sullivan <br />
  2. 2. Table of Content<br />Network Security Landscape in APAC<br />Mindset Shift in Network Security <br />Marriage of People, Process & Technology<br />Get on the Change Bandwagon<br />Source: Frost & Sullivan.<br />
  3. 3. Network Security Landscape in APAC<br />Mindset Shift in Network Security <br />Marriage of People, Process & Technology<br />Get on the Change Bandwagon<br />Source: Frost & Sullivan.<br />
  4. 4. Understanding APAC<br />GCR<br /><ul><li> Politically stable, coupled with excellent economic growth potential,
  5. 5. Massive opportunities in governmental sector
  6. 6. Competitive landscape with local and global vendors
  7. 7. Abundance of greenfield opportunities; strong focus on threat research/Web security . </li></ul>South Korea<br /><ul><li> Stable political climate, albeit with economy still recovering
  8. 8. Mature security market and mindset; highly IT connected society
  9. 9. Strong local vendors
  10. 10. Competitive replacement market for security solutions</li></ul>Japan<br /><ul><li> Weak Japanese economy, coupled with recent slate of disasters
  11. 11. Drive towards advanced technologies; security and virtualization
  12. 12. Rising emphasis on CAPEX and OPEX value
  13. 13. Strong focus on branding and client-oriented sales approach </li></ul>India<br /><ul><li> Rapidly recovering economic growth; domestic market continues to expand
  14. 14. Room for growth in technology adoption
  15. 15. Rapid drive towards managed services model</li></ul>ASEAN<br /><ul><li> Political and economic climate gradually stabilizing
  16. 16. Disparate levels of security adoption; immature levels of regulatory compliance
  17. 17. Less receptive to new technologies; prefer tried/tested methods
  18. 18. Lower barriers to entry for new market players</li></ul>ANZ<br /> Politically stable; strong economy fuelled by primary industries<br /> Technologically advanced and savvy region; IT as part of business strategy<br /> Early adopter of emerging technologies and high receptivity to managed security services model<br />
  19. 19. What’s Driving IT Security <br />Maturing customer mindset<br />Infrastructure growth and expansion <br />Increasing sophistication of threats<br />Regulatory & Compliance<br />Technology Convergence<br />Source: Frost & Sullivan.<br />
  20. 20. Network Security Market<br />Historical and Forecast Revenue Analysis 2007-2013<br />Network Security Market in Asia Pacific, 2007-2013<br />Total Revenue (US$ Million)<br />Note: All figures are rounded; the base year is 2010. Source: Frost & Sullivan<br />
  21. 21. Opportunities in the Security Arena<br />Market Forecast for Security Segments in Asia Pacific, 2010-2013<br />Total Revenue (US$ Million)<br />Note: All figures are rounded; the base year is 2010. Source: Frost & Sullivan<br />
  22. 22. Network Security Landscape in APAC<br />Mindset Shift in Network Security <br />Marriage of People, Process & Technology <br />Get on the Change Bandwagon<br />Source: Frost & Sullivan.<br />
  23. 23. The Role of the Individual<br />Employee, mobile worker, remote user<br />Facebook user, forum contributor<br />Home user, website blogger <br />
  24. 24. Security as Business Issue<br />Consumer Trends<br />Evolving Threats<br />Guarding vs Leveraging Technologies<br />Growing Threat Exposure<br />Lack of Control<br />What Does This Mean to Enterprises?<br />
  25. 25. Paradigm Shift<br />Gateway vs Endpoint <br />Static perspective<br />Defensive approach <br />Infrastructure Security<br />Data protection<br />External/Internal viewpoints <br />Preventive approach<br />Application-centric<br />Dynamic control<br />Centralized management<br />Information-centric Security<br />User-centric Security<br />
  26. 26. #1 Treat Users as Your Endpoints!<br />Consumer vs Enterprise devices<br />Mobile Computing<br />Blurring of responsibilities<br />User education & enforcement<br />Adoption vs Compliance<br />Increasingly tech-savvy<br />
  27. 27. #2 Get Back the Power of Control!<br />Understanding <br />Power of Control <br />Managing<br />+ <br />= <br />
  28. 28. #3 It Isn’t Just Defending!<br />Dynamic Security vs Defensive Security <br />Proactive vs Reactive <br />Assess Both External and Internal Threats<br />Attack Potential Security Loopholes<br />
  29. 29. Network Security Landscape in APAC<br />Mindset Shift in Network Security <br />Marriage of People, Process & Technology <br />Get on the Change Bandwagon<br />Source: Frost & Sullivan.<br />
  30. 30. The Dynamic Application-Fluent Firewall<br />Understands the Application language<br />Static vs Dynamic<br />Centralized Reporting and Enforcement<br />User Identification<br />Software Performance Management<br />Flexible and Scalable<br />Multi-faceted Converged Platform<br />
  31. 31. Next Stop: Intelligent Convergence<br />Network Security<br />Endpoint Security<br />Access Control<br />Content Security<br />Application Security<br />Data Security<br />Effective security management requires intelligent interaction<br />between the different components<br />
  32. 32. The Security Customer of the Future<br />Application-centric<br />Convergence<br />A need for a holistic view towards IT security that caters to multi-faceted technology and business needs<br />Performance<br />Scalability<br />
  33. 33. Upcoming Security Trends<br />
  34. 34. Network Security Landscape in APAC<br />Mindset Shift in Network Security <br />Marriage of People, Process & Technology <br />Get on the Change Bandwagon<br />Source: Frost & Sullivan.<br />
  35. 35. Moving Towards Risk Management<br />Risk Management<br />Threat Management<br />Technology<br />People<br />Process<br />
  36. 36. Viewing Threats to Assessing Risk<br />Aligning security strategy with business strategy<br />Tactical<br />Strategic<br />Technology driven<br />Technology, people and process<br />IT responsibility<br />Business + IT shared responsibility<br />ROI is difficult to measure<br />Easier ROI measurement<br />
  37. 37. 5 Common Mistakes of Security Management<br />1<br />2<br />Failure to approach security at an Organizational level<br />Reactive and purely technology/product based approach<br />3<br />4<br />Treating security as an expense/sunk cost<br />Failure to integrate people, processes and products<br />5<br />View security as purely a technology & not business issue<br />
  38. 38. A Framework for Change<br /><ul><li> Business Risk Perspective
  39. 39. Integration into Corporate Governance Framework
  40. 40. People, Process, Technology</li></ul>Strategizing<br /><ul><li> Dynamic Boundaries
  41. 41. Technology-Centric Businesses</li></ul>Adapting<br /><ul><li> User Empowerment vs User Misuse
  42. 42. Beyond Systems to Individuals</li></ul>Controlling<br /><ul><li> Intelligent Convergence
  43. 43. Security Platforms
  44. 44. Dynamic, Scalable
  45. 45. Need for Performance</li></ul>Implementing<br /><ul><li> ‘Security is a process’
  46. 46. Sustaining Manageability
  47. 47. Centralized Approach
  48. 48. Long-term Cost Viability </li></ul>Planning<br />
  49. 49. Changing the Customer Approach<br />Improving Customer Experiences<br />Price Competition<br />Mapping Solutions<br />Value Operationalization<br />Selling Products<br />Business Interactions<br />Technical Discussions<br />IT-centric<br />Business-centric<br />Listen First, Sell Later <br />
  50. 50. Choosing the Right Vendor <br />Integrated Solutions<br />R&D Expertise/ Tech Roadmap<br />Global Support<br />Localization<br />Brand Strength<br />Financial stability<br />Preferred Partner<br />26<br />
  51. 51. Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter<br />http://www.facebook.com/pages/Frost-Sullivan/249995031751?ref=ts<br />http://www.linkedin.com/companies/4506<br />http://www.slideshare.net/FrostandSullivan<br />http://twitter.com/frost_sullivan<br />
  52. 52. For Additional Information<br />Donna Jeremiah<br />Corporate Communications<br />Asia Pacific<br />+603 6204 5832<br />djeremiah@frost.com<br />Carrie Low<br />Corporate Communications<br />Asia Pacific<br />+603 6204 5910<br />carrie.low@frost.com<br />AlizaKasim<br />Research Analyst<br />ICT<br />+603 6204 5800<br />aliza.shima@frost.com<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×