SlideShare a Scribd company logo
1 of 8
Demand on Information Security (InfoSec) Skilled Expertise in India
Han Digital Talent Research and Consulting
This reportis solelyfor the use of Han Digitalpersonnel.No part of it maybe circulated,quoted,or reproducedfor distribution outsidethe clientorganization withoutprior written approvalfromHan DigitalSolution.
Han Digital Solution Confidential
Dec 2018, Refreshed
Infrastructure Regime
Data Eruption
24/7*365 Online World
Tomorrow’s Finance
Complicated Regulations & Standards
Infinite Internet Potential
Multiple Identities & Trust Models
IT Security Trends
Network Security
Cloud Security
Cyber Security
Threat Intelligence
Information Security Areas
145 million Potential User Login Data Stolen on the year 2014, Hacker still
Unknown
3 million Encrypted Credit Card Numbers Stolen; About 150 million Adobe
Accounts Compromised, Source code of Adobe Photoshop & Other
Products also was stole, Hacker Still Unknown
Year 2013
The personal information of 150,000 consumers who went into bankruptcy
between 2007 and 2011 – including their social security numbers – were
exposed after Citi failed to properly redact court records before they were put
on the Public Access to Court Electronic Records (PACER) system. Year 2011
On January 29, 2015, Anthem, Inc. (Anthem) learned of a cyberattack to their IT
system. The cyber attackers tried to get private information about individuals
with data on Anthem systems. It is believed that it happened over the course
of several weeks beginning in early December 2014.
Organizations today are highly vulnerable to data and identity theft, especially with
the popularity of social media, cloud computing, and mobile devices.
Members of Mozilla’s developer community have been alerted about an
accidental leak of email addresses and encrypted passwords, after the failure of
a “data sanitisation” process the organisation was carrying out. Year 2014
The market is segmented into solutions such as;
▪ Identity and Access Management
▪ Risk and Compliance Management
▪ Encryption
▪ Data Loss Prevention
▪ Unified Threat Management
▪ Firewall, Antivirus and Antimalware
▪ Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
▪ Security Information and Event Management (SIEM)
▪ Disaster Recovery
▪ Distributed Denial of Service (DDoS) Mitigation, and Whitelisting.
The Global Information Security market is currently in a state of growth with the high adoption of IAM solutions by SMEs, large enterprises,and government organizationswanting to improve efficiency and productivity.
Reactive Proactive
Consumers
Information Security
Recovery
Backup
Restore
IT Hacks, Leaks
& Threats
1 in every 10 consumers has already been victimized by #IdentityTheft
Identity and access management - IAM means management of individual
users, their authentication, authorization, and privileges within or across
system and enterprise boundaries.
2Source: Han Digital Solution
Identity & Access Management
Market & Talent
Tier1Productvendors
•OpenIAM
•OpenDS Directory Server
•OpenSSO
•Shibboleth (SSO)
•Gluu
Open Source Identity Management Solutions
IAMRoleplay2020Benefits
✓By 2020, 80% of digital access will be influenced by new mobile and non-PC architectures, an
increase from 5% today
16,000+ Talent pool Availablein India
Estimated 45,000+ Globally Available Pool
Estimated Total Market Size 2015 : $400
million (Only Licences Cost)
Identity and Access Management Market to
Grow at a CAGR of 15.1% to 2018
Supply
Worldwide
spending on
information
security is $78.5
billion in 2015,
an increase of 8.2
percent over 2013
▪ Reduced help desk costs and improved service through the self-service of password
changes and access requests. Eliminated security threat from active accounts that
have no valid owner or unapproved configurations.
▪Oracle Identity & Access Management
▪IBM Tivoli Access/Identity Manager
▪CA Identity Manager/Access Control
▪Sailpoint Identity IQ
▪NetIQ Identity Manager
▪EMC – RSA Secure ID
▪Forgerock OpenIDM
✓Use of monitoring tools and big data analytics will rise and spending
on IAM will fall. (It evokes the rise of Identity Intelligence)
✓By 2020, 70% of all businesses will use attribute-based access control (ABAC) to
protect critical assets, up from <5% today. Avoiding the existing Role-based
access control (RBAC).
✓Enterprise Mobility Management (EMM)
will play a significantrole in future of IAM
✓By 2020, the Internet of Things will redefine the
concept of "identity management" to include what
people own, share, and use.
▪ Improved security and scaling of administrative staff
through the division of workload among administrators
that have an accurate knowledgeof user access needs.
▪ Reduced security risk and auditing costs
through the establishment of a system-
of-record for access changes and
approvals.
▪ Improved accuracy and reduced costs associated with the creation and
revocation of user access rights to internal resources and to resources
that are external to your organization.
✓By 2020, overall IAM product and pricing will drop by 40% relative to today in real terms.
I. Financial Services, Healthcare &
Public Sector
II. Manufacturing &
Telecommunications
III. Utilities & Retail
According to Ponemon Institute, the average cost of a data breach
for an organization in 2013 was $3.5 million U.S. dollars — a 15
increase since 2012
OtherProductvendors
Demand
n Number of small & medium
sized IAM solution providers went
through a series of acquisitionsin
the year 2005
With an increased use of
IAM solutions and the entry
of new vendors, the market
is expected to experience
strong growth
85% in tier 1 Indian Cities
3
More than 40% of the installed
IAM pool contributed by Tier I
IT service providers
Non - Exhaustive
IM & AM
Source: Han Digital Solution
IAM Acquisitions - TimeLine
Distributed
Computing
Birth Grid / Cloud Computing Era
1990’s
Internet of Things /
BYOD
2014
Internet Based
Computing / Web
services
Late 1990’s
1990 2005 2007 2008 2009 2010 2011 2013 2014 2015 2020
Today
Oracle
Acquires
Oblix
CA Acquires
eTrust Cleanup
March,2005
Bull Evidian
Acquires Enatel
Microsoft
Acquires Alacris
Sept,2005
Oracle Acquires
Thortech
Oracle Acquires Octetstring
Nov,2005
Novell
Acquires
Fortefi
Oracle Acquires
Bharosa
Oracle Acquires Bridgestream
Sept,2007
Feb,2007
July,2007
Oracle Acquires BEA
Systems
Jan,2008
CA Acquires
ID Focus
Oct,2008
Jan2009
CA Acquires
Orchestria
Microsoft Acquires Sentillon
Dec2009
Oracle
Acquires
Stellent
2006
Nov2006
Oracle Acquires
Sun Microsystems
Jan2010
Aug2010
Vmware Acquires
TriCipher
Oracle Acquires
Passlogix
Dell Acquires
Enstratius
May2010
Kaseya
Acquires
Scorpian
Vmware Acquires Airwatch
IBM
Acquires
CrossideasEMC
Acquires
Aveksa
LogMeIn
Acquires
Meldium
IBM Acquires
Lighthouse Security
Microsoft Acquires Aorato
Jan2014
July2014
Aug2014
Sept2014
Nov2014
Sailpoint Acquires Whitebox
June2015
July2015
CA Acquires
IDMLogic
20021999
IBM
Acquires
MetaMerge
IBM Acquires Access360
Microsoft
Acquired
Zoomit
SAP Acquired Maxware
Oracle Acquires
Phaos
Technology
July,1999
June,2002
Sept,2002
May,2004
May,2007
2004
Size of Digital Data has
increased in the last decade
at a exponential rate.
Proportionally the Data
Hacks & IT Security Threats
has been increased
Enterprises are spending
46% on security technologies
in 2015
IAMDemandacrossITEvolutionIAMProductAcquisitionsovertheyears
bring your
own identity
(BYOI)
Projected
The Identity of Things (IDoT) is a new
extension to identity management
meant to encompass all identities,
regardless of whether it is a person or
device
4Source: Han Digital Solution
Identity & Access Management – Market Share
19% 15% 10% 7% 8% 6% 6% 7% 22%
Oracle IBM CA Sailpoint Microsoft EMC-RSA Forgerock Novell/NetIQ Others
Global
Market
Penetration
India -
Talent Pool
India – Hiring
Demand
Industry
Adoption of IAM
High
Utilization
Low
4500 3300 1000 - 1200 300 - 400 600 - 900 200 - 400 2200 - 2500
800+ 600+ 400+ 40+ 80+ 300+
10+
20+ 150+
50 - 100
100 - 200
Cloud Companies
Adopt IAM at Volume
Banking & Finance Healthcare Public Sector Telecom Manufacturing Utilities Retail
5Source: Han Digital Solution
Han Digital experience in IAM and other InfoSec Areas’s
Identity & Access
Management
Functionality
Based IDMS
Class
Deployment
Based IDMS
Class
Cloud - IAM
Isolated Cloud IDMS
Centralized Cloud IDMS
Federated Cloud IDMS
User-Centric Cloud IDMS Anonymous Cloud IDMS
• IDM365
• NetIQ/Novell
• Atos
• Oracle
• Sailpoint
• Gigya
• Intel McAfee
• Avatier
• Courion
• Evidian
• AWS Webservices
• IBM
• Covisint
• Hitachi
• OSIAM
• Gemalto
• OneLogin
• Dell
• SecurAct
• Microsoft
• Vmware
• SAP
• Octa
• security
• Good IDM
• Omada
•OpenIAM
•OpenDS Directory Server
•OpenSSO
•Shibboleth (SSO)
•Gluu
On Premise - IAM
Most IAM are moving into
Cloud based Solutions
6Source: Han Digital Solution
What do we help on InfoSec?Why do your peer’s adopt InfoSec?
❑Greater agility, Reliability & Threat Detection
❑Can be secure with the acts of Human Error or Failure
❑Secure the company’s intellectual property such as
Patents, Trademarks, Trade Secrets & Copyrights
❑Safeguards the technology assets in use at the
organization
❑Enables the safe operation of applications
implemented on the organization‘s IT systems
❑ Talent availability study for your InfoSec skills
❑ Location feasibility for hiring
❑ Compensation insights
❑ InfoSec skill mix analysis
❑ Alternative talent pool for cross skilling
❑ Peer companies hiring best practices
❑ Hiring competition and trends
❑ Talent fulfilment in less time
Write us for further InfoSec Domain/Skills Market View – SIEM, Vulnerability Tools, Cloud
Security, Application Security, Disaster Recovery, etc..
Contact info@handigital.com
7
Thank You
Secunderabad
# 104 & 105, 1st Floor,
Bhuvana Towers,
CMR Building,
Sarojini Devi Road,
Secunderabad 500 003,
India
Pune
6th Floor
Pentagon P-2,
Magarpatta City,
Hadapsar,
Pune 411 028,
India
Manila
L29 Joy Nostalg Centre,
17 ADB Avenue,
Ortigas Center,
Pasig City,
Manila - 1600
Philippines
Han Digital Solution
# 4 & 5, 1st & 2nd Floor,
1st Cross, Krishna Reddy Colony,
Domlur Layout, Bangalore – 560 071
Phone: +0-80-6113-4848/4747
Website: www.handigital.com
Headquarters (HQ)
Write us for more query @ saran@handigital.com / info@handigital.com

More Related Content

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Information Security Talent Pool India

  • 1. Demand on Information Security (InfoSec) Skilled Expertise in India Han Digital Talent Research and Consulting This reportis solelyfor the use of Han Digitalpersonnel.No part of it maybe circulated,quoted,or reproducedfor distribution outsidethe clientorganization withoutprior written approvalfromHan DigitalSolution. Han Digital Solution Confidential Dec 2018, Refreshed
  • 2. Infrastructure Regime Data Eruption 24/7*365 Online World Tomorrow’s Finance Complicated Regulations & Standards Infinite Internet Potential Multiple Identities & Trust Models IT Security Trends Network Security Cloud Security Cyber Security Threat Intelligence Information Security Areas 145 million Potential User Login Data Stolen on the year 2014, Hacker still Unknown 3 million Encrypted Credit Card Numbers Stolen; About 150 million Adobe Accounts Compromised, Source code of Adobe Photoshop & Other Products also was stole, Hacker Still Unknown Year 2013 The personal information of 150,000 consumers who went into bankruptcy between 2007 and 2011 – including their social security numbers – were exposed after Citi failed to properly redact court records before they were put on the Public Access to Court Electronic Records (PACER) system. Year 2011 On January 29, 2015, Anthem, Inc. (Anthem) learned of a cyberattack to their IT system. The cyber attackers tried to get private information about individuals with data on Anthem systems. It is believed that it happened over the course of several weeks beginning in early December 2014. Organizations today are highly vulnerable to data and identity theft, especially with the popularity of social media, cloud computing, and mobile devices. Members of Mozilla’s developer community have been alerted about an accidental leak of email addresses and encrypted passwords, after the failure of a “data sanitisation” process the organisation was carrying out. Year 2014 The market is segmented into solutions such as; ▪ Identity and Access Management ▪ Risk and Compliance Management ▪ Encryption ▪ Data Loss Prevention ▪ Unified Threat Management ▪ Firewall, Antivirus and Antimalware ▪ Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) ▪ Security Information and Event Management (SIEM) ▪ Disaster Recovery ▪ Distributed Denial of Service (DDoS) Mitigation, and Whitelisting. The Global Information Security market is currently in a state of growth with the high adoption of IAM solutions by SMEs, large enterprises,and government organizationswanting to improve efficiency and productivity. Reactive Proactive Consumers Information Security Recovery Backup Restore IT Hacks, Leaks & Threats 1 in every 10 consumers has already been victimized by #IdentityTheft Identity and access management - IAM means management of individual users, their authentication, authorization, and privileges within or across system and enterprise boundaries. 2Source: Han Digital Solution
  • 3. Identity & Access Management Market & Talent Tier1Productvendors •OpenIAM •OpenDS Directory Server •OpenSSO •Shibboleth (SSO) •Gluu Open Source Identity Management Solutions IAMRoleplay2020Benefits ✓By 2020, 80% of digital access will be influenced by new mobile and non-PC architectures, an increase from 5% today 16,000+ Talent pool Availablein India Estimated 45,000+ Globally Available Pool Estimated Total Market Size 2015 : $400 million (Only Licences Cost) Identity and Access Management Market to Grow at a CAGR of 15.1% to 2018 Supply Worldwide spending on information security is $78.5 billion in 2015, an increase of 8.2 percent over 2013 ▪ Reduced help desk costs and improved service through the self-service of password changes and access requests. Eliminated security threat from active accounts that have no valid owner or unapproved configurations. ▪Oracle Identity & Access Management ▪IBM Tivoli Access/Identity Manager ▪CA Identity Manager/Access Control ▪Sailpoint Identity IQ ▪NetIQ Identity Manager ▪EMC – RSA Secure ID ▪Forgerock OpenIDM ✓Use of monitoring tools and big data analytics will rise and spending on IAM will fall. (It evokes the rise of Identity Intelligence) ✓By 2020, 70% of all businesses will use attribute-based access control (ABAC) to protect critical assets, up from <5% today. Avoiding the existing Role-based access control (RBAC). ✓Enterprise Mobility Management (EMM) will play a significantrole in future of IAM ✓By 2020, the Internet of Things will redefine the concept of "identity management" to include what people own, share, and use. ▪ Improved security and scaling of administrative staff through the division of workload among administrators that have an accurate knowledgeof user access needs. ▪ Reduced security risk and auditing costs through the establishment of a system- of-record for access changes and approvals. ▪ Improved accuracy and reduced costs associated with the creation and revocation of user access rights to internal resources and to resources that are external to your organization. ✓By 2020, overall IAM product and pricing will drop by 40% relative to today in real terms. I. Financial Services, Healthcare & Public Sector II. Manufacturing & Telecommunications III. Utilities & Retail According to Ponemon Institute, the average cost of a data breach for an organization in 2013 was $3.5 million U.S. dollars — a 15 increase since 2012 OtherProductvendors Demand n Number of small & medium sized IAM solution providers went through a series of acquisitionsin the year 2005 With an increased use of IAM solutions and the entry of new vendors, the market is expected to experience strong growth 85% in tier 1 Indian Cities 3 More than 40% of the installed IAM pool contributed by Tier I IT service providers Non - Exhaustive IM & AM Source: Han Digital Solution
  • 4. IAM Acquisitions - TimeLine Distributed Computing Birth Grid / Cloud Computing Era 1990’s Internet of Things / BYOD 2014 Internet Based Computing / Web services Late 1990’s 1990 2005 2007 2008 2009 2010 2011 2013 2014 2015 2020 Today Oracle Acquires Oblix CA Acquires eTrust Cleanup March,2005 Bull Evidian Acquires Enatel Microsoft Acquires Alacris Sept,2005 Oracle Acquires Thortech Oracle Acquires Octetstring Nov,2005 Novell Acquires Fortefi Oracle Acquires Bharosa Oracle Acquires Bridgestream Sept,2007 Feb,2007 July,2007 Oracle Acquires BEA Systems Jan,2008 CA Acquires ID Focus Oct,2008 Jan2009 CA Acquires Orchestria Microsoft Acquires Sentillon Dec2009 Oracle Acquires Stellent 2006 Nov2006 Oracle Acquires Sun Microsystems Jan2010 Aug2010 Vmware Acquires TriCipher Oracle Acquires Passlogix Dell Acquires Enstratius May2010 Kaseya Acquires Scorpian Vmware Acquires Airwatch IBM Acquires CrossideasEMC Acquires Aveksa LogMeIn Acquires Meldium IBM Acquires Lighthouse Security Microsoft Acquires Aorato Jan2014 July2014 Aug2014 Sept2014 Nov2014 Sailpoint Acquires Whitebox June2015 July2015 CA Acquires IDMLogic 20021999 IBM Acquires MetaMerge IBM Acquires Access360 Microsoft Acquired Zoomit SAP Acquired Maxware Oracle Acquires Phaos Technology July,1999 June,2002 Sept,2002 May,2004 May,2007 2004 Size of Digital Data has increased in the last decade at a exponential rate. Proportionally the Data Hacks & IT Security Threats has been increased Enterprises are spending 46% on security technologies in 2015 IAMDemandacrossITEvolutionIAMProductAcquisitionsovertheyears bring your own identity (BYOI) Projected The Identity of Things (IDoT) is a new extension to identity management meant to encompass all identities, regardless of whether it is a person or device 4Source: Han Digital Solution
  • 5. Identity & Access Management – Market Share 19% 15% 10% 7% 8% 6% 6% 7% 22% Oracle IBM CA Sailpoint Microsoft EMC-RSA Forgerock Novell/NetIQ Others Global Market Penetration India - Talent Pool India – Hiring Demand Industry Adoption of IAM High Utilization Low 4500 3300 1000 - 1200 300 - 400 600 - 900 200 - 400 2200 - 2500 800+ 600+ 400+ 40+ 80+ 300+ 10+ 20+ 150+ 50 - 100 100 - 200 Cloud Companies Adopt IAM at Volume Banking & Finance Healthcare Public Sector Telecom Manufacturing Utilities Retail 5Source: Han Digital Solution
  • 6. Han Digital experience in IAM and other InfoSec Areas’s Identity & Access Management Functionality Based IDMS Class Deployment Based IDMS Class Cloud - IAM Isolated Cloud IDMS Centralized Cloud IDMS Federated Cloud IDMS User-Centric Cloud IDMS Anonymous Cloud IDMS • IDM365 • NetIQ/Novell • Atos • Oracle • Sailpoint • Gigya • Intel McAfee • Avatier • Courion • Evidian • AWS Webservices • IBM • Covisint • Hitachi • OSIAM • Gemalto • OneLogin • Dell • SecurAct • Microsoft • Vmware • SAP • Octa • security • Good IDM • Omada •OpenIAM •OpenDS Directory Server •OpenSSO •Shibboleth (SSO) •Gluu On Premise - IAM Most IAM are moving into Cloud based Solutions 6Source: Han Digital Solution
  • 7. What do we help on InfoSec?Why do your peer’s adopt InfoSec? ❑Greater agility, Reliability & Threat Detection ❑Can be secure with the acts of Human Error or Failure ❑Secure the company’s intellectual property such as Patents, Trademarks, Trade Secrets & Copyrights ❑Safeguards the technology assets in use at the organization ❑Enables the safe operation of applications implemented on the organization‘s IT systems ❑ Talent availability study for your InfoSec skills ❑ Location feasibility for hiring ❑ Compensation insights ❑ InfoSec skill mix analysis ❑ Alternative talent pool for cross skilling ❑ Peer companies hiring best practices ❑ Hiring competition and trends ❑ Talent fulfilment in less time Write us for further InfoSec Domain/Skills Market View – SIEM, Vulnerability Tools, Cloud Security, Application Security, Disaster Recovery, etc.. Contact info@handigital.com 7
  • 8. Thank You Secunderabad # 104 & 105, 1st Floor, Bhuvana Towers, CMR Building, Sarojini Devi Road, Secunderabad 500 003, India Pune 6th Floor Pentagon P-2, Magarpatta City, Hadapsar, Pune 411 028, India Manila L29 Joy Nostalg Centre, 17 ADB Avenue, Ortigas Center, Pasig City, Manila - 1600 Philippines Han Digital Solution # 4 & 5, 1st & 2nd Floor, 1st Cross, Krishna Reddy Colony, Domlur Layout, Bangalore – 560 071 Phone: +0-80-6113-4848/4747 Website: www.handigital.com Headquarters (HQ) Write us for more query @ saran@handigital.com / info@handigital.com