Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IT Security Market Overview Sept 2012


Published on

Research and analysis on the IT security market. Prepared by Lee Mashburn in September 2012. Provides overview of market size, trends, and competitive landscape.

Published in: Technology, Business
  • Be the first to comment

IT Security Market Overview Sept 2012

  1. 1. IT Security Market OverviewSeptember 2012Prepared by Lee MashburnMarketing & Product Management Executive Check out my personal website. Recently launched. Lee Mashburn and Elijah
  2. 2. The IT Security Market and Competitive Landscape • This PowerPoint presentation overviews the IT Security market. It has been developed as a result of over 100 hours of research and analysis. • It provides a snapshot of the various IT Security sub- markets; size, projected growth, and competitive landscape. • If you wish to see more detail, contact me at 2
  3. 3. IT Market Overview 2012 Estimated Computing Hardware 11% Software 7% $3.8 trillion market, $1.6 trillion excluding Telecom Telecom 6% annual growth rate expected excluding Telecom Services 46% IT security represents only 1.5% of total IT Services 23% IT security market expected to grow 12% through 2016 Cloud IT security will grow from 17% to 24% by 2016 Telecom Equipment 13% CY CY CY CY CY CY 2010 CY 2011 2012E 2013E 2014E 2015E 2016E CAGR Computing Hardware $375 $404 $421 $457 $496 $553 $592 7.9% Software $244 $267 $280 $299 $319 $339 $362 6.3% IT Services $793 $845 $856 $886 $920 $956 $995 3.3% Telecom Equipment $412 $442 $473 $508 $538 $567 $593 6.0% Telecom Services $1,603 $1,704 $1,721 $1,767 $1,816 $1,861 $1,898 2.2% All IT $3,427 $3,662 $3,751 $3,917 $4,089 $4,276 $4,440 3.9% HW, SW, Svcs $1,412 $1,516 $1,557 $1,642 $1,735 $1,848 $1,949 IT Security $19 $22 $24 Percent of Total 1.3% 1.5% 1.5% 12.0%Copyright, Cogniti, Inc., 3 3
  4. 4. The 2012 Top Priorities of the CIO• CIOs are increasingly in step with CEO top priorities• Top CIO priorities: – Business intelligence and analytics – Mobility – Virtualization – Cloud computing – Business process management• Must derive insight, competitive advantage, and tangible business benefit from the huge volumes of data available across an enterprise – how? – Master data management, customer analytics, data warehousing, and visual information dashboards• Must deliver information technology securely and reliably• Must help simplify operations, business processes, products, and services• Leverage cloud computing and outsourcing to reallocate internal resources from routine system maintenance toward more valuable tasks 4
  5. 5. IT Security Sub-Markets $25,000 $20,000 Network access control Identity & Access Management Sales in USD (millions) Mobile device management $15,000 Content aware data loss prevention Secure web gateway SIEM Unified threat management $10,000 Secure email gateways Endpoint protection platforms MSSP Enterprise network firewalls $5,000 $0 FY 2009 FY 2010 FY 2011 FY 2012E 5 5
  6. 6. IT Security – Most Google-Searched Terms, 2012 Managed security services Unified threat management Data loss prevention Database security Email security SSL VPN Endpoint security Endpoint protection Computer forensics Identity management Intrusion detection system Fraud prevention 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 No. of Google Search URLs 6
  7. 7. Mobile Device Management IAM DLP UTM Secure Web MSSP SIEM Gateway NAC Enterprise Network Firewalls Endpoint Protection PlatformsKey: Secure EmailSize of circle reflects relative 2012 market size GatewaysVertical placement reflects relative growth rate 7
  8. 8. Network, Data, & EndpointSecurity and Unified Threat Management MSSP 8
  9. 9. Managed Security Service Provider, MSSP Gartner Magic Quadrant, Nov ‘11Market DefinitionEnterprises that optimize their use of managed security service providers(MSSPs) can free up internal staff time for dealing with more business-critical security functions if they select. Gartner sees continued strong, if Verizon AT&T Dell SecureWorksnot spectacular, growth for managed security services in North America. Symantec IBMAn MSS portfolio can include unified threat management, data loss Bell Canada Executionprevention, security information and event management, log management, SAIC CSC Integralis Solutionaryvulnerability scanning, and email security. Web-based portals typically serve HP HCL CompuCom Savvisas the primary means of communication about monitoring and management Perimeter Wipro Trustwaveservices performed for customers.Drivers: evolving compliance reporting requirements (PCI and FISMA), ITstaffing and budget constraints, increased availability and adoption of IT-as-a-Service, expansion of Internet connection endpoints, the SMB North America Marketmarket, applications to prevent data loss, and SaaS for remotely-monitoredCPE. Vision Market Size, Worldwide Market Share $8,000 Market Growth 3-Yr CAGRSales ($US million) $6,000 22% IT Security $4,000 78% $2,000 MSSP MSSP Market $0 0% 5% 10% 15% 20% FY 2009 FY 2010 FY 2011 FY 2012E IT Security Market 9
  10. 10. Content-Aware Data Loss Prevention (DLP) Gartner Magic Quadrant, Aug ‘11 Market Definition Content-aware DLP tools enable the dynamic application of policy based on the classification of content determined at the time of an operation. These technologies and inspection techniques are used to Symantec classify information content contained within an object – such as a file, McAfee email, packet, application, or data store - while at rest (in storage), in use CA RSA (during an operation), or in transit (across a network); and the ability Execution Websense to dynamically apply a policy – such as log, report, classify, tag, and Trustwave Verdasys encrypt – and/or apply enterprise data rights management protections. Code Green They can execute responses ranging from simple notification to active blocking – based on policy settings. Trend Micro Fidelis GTB Technologies Safend DLP technologies help organizations develop, educate, and enforce Pallisade better business practices concerning the handling and transmission of sensitive data. Used to its full capability, DLP is a nontransparent control, which means it is intentionally visible to an end user with a primary value proposition of changing user behavior. Vision Market Size Market Share $600 Market Growth 3-Yr CAGR 2%Sales ($US million) $500 $400 12% IT Security $300 $200 98% $100 DLP 22% $0 DLP Market FY 2009 FY 2010 FY 2011 FY 2012E IT Security Market 10 10
  11. 11. Security Information & Event Management (SIEM) Market Definition Gartner Magic Quadrant, May ‘12 SIEM technology aggregates the event data produced by security devices, network devices, systems, and applications. The primary data source is log data but SIEM technology can also process other forms of HP ArcSight data. Event data is combined with contextual information about users, IBM Q1 Labs data, and assets. The data is normalized so that events from disparate McAfee Nitro sources can be correlated and analyzed for specific purposes such as RSA (EMC) Security Splunk network security event monitoring, user activity monitoring, or compliance Execution NetIQ Symantec LogRhythm reporting. This technology combines real-time security monitoring, LogLogic SolarWinds historical analysis, and other support for incident investigation and Trustwave compliance reporting. Deployment and support simplicity is an important elQnetworks attribute for all use cases because of the resource constraints of most IT Sensage security organizations. Features: behavior profiling, anomaly detection, threat intelligence, and advanced analytics – to support the early detection of targeted attacks. Drivers include real-time security monitoring and compliance reporting. Vision Market Share Market Size $1,400 Market Growth 3-Yr CAGR 5%Sales ($US million) $1,200 $1,000 $800 IT Security 12% 95% $600 $400 $200 SIEM 14% SIEM Market $0 IT Security Market FY 2009 FY 2010 FY 2011 FY 2012E 11 11
  12. 12. Threat Intelligence Incident & Access Management Data Loss Prevention SIEM File Integrity Monitoring Enterprise Resource Management Security Information & Event Management (SIEM) Application Monitoring • Analytics • Reporting • Ad hoc query Behavior • Log management Profiling Database Activity Monitoring12
  13. 13. Cloud is the FutureCloud computing is a style of computing where scalable and elastic IT-relatedcapabilities are provided “as a service” to customers using Internet technologies Benefits Risks • Increased agility • Security • Reduced cost • Transparency • Less complexity • Assurance • Better focus on the • Lock-in priorities • Integration Cloud Computing Hype Cycle By Gartner • Enhanced collaboration • Financial sustainability • Easier to innovate 13