Managed Security Services

Size: px
Start display at page:

Download "Managed Security Services"

Transcription

1 NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall market segment. It contains the NEAT graph of vendor performance, a summary vendor analysis of Unisys in MSS, and the latest market analysis summary for MSS. An explanation of the NEAT methodology is included at the end of the document. The vendors evaluated are: Cognizant, CGI, CSC, CSS Corp, Dell SecureWorks, Dimension Data, HP, Mindtree, Symantec, Tata Consultancy Services (TCS), Unisys, and Wipro. Introduction NelsonHall has assessed and evaluated Unisys proposition against demand for Managed Security Services (MSS), and has identified Unisys as a Leader in the Overall market segment, demonstrating its ability both to deliver immediate benefit to clients and meet future client requirements in MSS. The Overall NEAT graph for MSS is shown on page 2. NelsonHall November 2015

2 NEAT Evaluation: Managed Security Services (MSS) Buy-side organizations can access the MSS NEAT tool here. NelsonHall November 2015

3 Vendor Analysis Summary for Unisys Overview In 2009, Unisys relaunched its entire portfolio around a number of key capabilities; cyber and physical security was one of four key pillars of the revamped portfolio. Unisys operates its security operations from its eight security operations centers (SOCs), primarily via a follow the sun methodology and with onsite operations. Unisys uses HP ArcSight in conjunction with its Unisys Noise Cancellation Advanced Analytics Platform (UNCAAP) for security information and event management. In November 2008, Unisys launched its Stealth solution (initially developed for the U.S. defense sector with partner Security First) for government and commercial organizations. Stealth encrypts data across networks using bit splitting. Since its introduction Unisys has expanded the Stealth offering to include Stealth for mobile, the virtual terminal and AWS as well as introducing a reseller channel. Financials Unisys' global revenues in 2014 were $3,356m of which: $2,786m was from services, and IT infrastructure outsourcing accounted for $1,705m $571m was from technology. Q1-Q service revenues were $1,957m, down 6.7% y/y, with IT infrastructure outsourcing revenues up 1% to $1,147m. Full year 2015 services revenues are likely to be in the region of $2.7bn, with IT infrastructure outsourcing revenues around $1.65bn. NelsonHall estimates that 2015 managed security services will be ~13% of the IM business, or ~$175m. Of this, NelsonHall estimates that Unisys' managed security services revenue split, by activity, will be: Security information and event management: 35% (~$61m) Security monitoring and management: 30% (~$53m) Threat and risk intelligence: 20% (~$35m) Content filtering: 5% (~$9m) Security as a service (a SaaS offering): 10% (~$18m). NelsonHall November 2015

4 Strengths The Unisys Noise Cancellation Advanced Analytics Platform (UNCAAP) correlates events, reduces the number of events that need to be processed and increases true positive rate. Combined with its strong presence in Bangalore, operational costs are reduced Unisys is also in a position to provide a client's infrastructure and security services. This should benefit the client and enable Unisys to enact threat resolutions more quickly and with more knowledge of the infrastructure Unisys' Stealth solutions offer a different type of cyber security; rather than protecting against threats across a client's network, important data is safeguarded by making it effectively undetectable. Besides the benefit to the client that Stealth brings, with its increased security, it also requires the client to assess the sensitivity of each of its end points, a useful practice when considering cyber security Value added services like the SIR report give clients a more in depth view of the vulnerabilities and malware that they could be affected by, in relation to their own infrastructure, software, and policies. Challenges Due to the large amount of automation with event management processes using ArcSight and UNCAAP, a number of events marked as low level occasionally slip through analysis; this can sometimes lead to a delay in detecting events Unisys is reliant on a number of large contracts, for example the contract with the large banking group (see Target Markets section) The expansion of its reseller program for its IP adds competition for its Stealth offerings. Strategic Direction In addition to continuing to develop its existing security clients, Unisys is looking to cross-sell its security services to systems integration and infrastructure services clients. It is also looking to increase take up of its security-as-a-service offerings, including SIEM and DLP services, both by existing clients and also by new logos. There has been a recent push for security services leveraging Stealth around mobile, including its 'get to zero' initiative, which aims to reduce to zero the number of cyber security incidents affecting a client. Unisys sees the Stealth solution as the most current cybersecurity solution in its portfolio, and will be looking to expand research and development from more standard cybersecurity solutions. Unisys will also be looking to continue to develop partnerships and expand the security ecosystem around the Stealth offerings, such as the partnership with Capgemini to act as a reseller, and expanding the scope for the Stealth for Mobile or for AWS. NelsonHall November 2015

5 Outlook Unisys positions as a full service IT service vendor, with its managed security services being cross-sold by its data center and SI clients. One of Unisys' core areas is cyber and physical security across its portfolio; the company's ClearPath systems boast a low number of vulnerabilities. Unisys is likely to continue growing its managed security services as a proportion of its overall Services revenues. NelsonHall expects revenues from the Unisys managed security services to reach ~$300m by 2018, a CAGR of over 16%, in line with global market growth for managed security services. In 2016, expect: Further investment in expanding the Unisys Stealth offering, and for adoption of recently enhanced areas to increase, for example in Stealth for mobile/iot and AWS. Unisys' managed Stealth offering to grow as clients move from a traditional managed security offering, and despite competition within its own reseller channel. NelsonHall November 2015

6 MSS: Market Summary Buy-Side Dynamics Key challenges for organizations looking to outsource managed security services include: Increasing cost of cybersecurity, while demonstrating ROI Access to cybersecurity skills and up to date information Ability to respond quickly to threats Ability to gain a holistic view of cybersecurity Strengthening social engineering around security Uneven workloads. Market Size & Growth The global managed security service market is currently estimated by NelsonHall at $6.8bn, and is expected to grow at 16.5% CAAGR through to North America is the largest region in managed security services, with an estimated ~43% of market share, and is expected to account for $6.3bn in EMEA is estimated to have ~38% of the market and is expected to grow at 16.9% CAAGR to 2019, led by the U.K. with 17.6%. A portion of the growth will be attributable to the introduction and enforcement of the EU General Data Protection Regulation. The Asia Pacific managed security services market is estimated to be worth $1.1bn, and will have growth driven by IP DLP in defense of corporate espionage. In Latin America growth will be driven by the defense of organized crime, particularly in Brazil. Success Factors Critical success factors for vendors within the managed security services market are: A strong understanding of the entire IT security landscape, typically through a high level of security research An understanding of IT security in the context of the organization's security needs and industry Access to expertise for best of breed tools that the client organization lacks, and willingness to work with existing security tools while offering best of breed tools Well defined responsibility for the contract with service expectations, escalation procedures and incident response plans clearly established at the start of contracts Through research into emerging technologies, the ability to provide security in support of emerging types of IT (cloud, mobile, IoT) The ability to not only take over existing security processes but to maximize the coverage of security NelsonHall November 2015

7 Increasing the detection rate of cyber threats while increasing the reliability and speed of detection and response to threats, by reducing the number of false positives and negatives found 24/7/365 full service availability. Outlook Over the next few years: MSSP R&D spend on automation will increase to handle an increased number of events from IoT and BYOD To speed up incident resolution, vendors will move to automatic remediation for low level events, transferring people to event research As the speed of resolution of events becomes more critical, more contracts will include incident management More contracts will involve incident response planning and ancillary services including legal services and cyber insurance As collaborative threat databases become the norm, vendors will shift man hours from penetration testing to building advanced automated scanning tools, while focusing on advanced scanning methods such as building visual representations to increase the speed of vulnerability scans with pattern recognition The construction of RASP technologies to self-protect applications Skills shortages and an increasing number of events will hamper growth in onshore services. NelsonHall November 2015

8 NEAT Evaluations for MSS NelsonHall s (vendor) Evaluation & Assessment Tool (NEAT) is a method by which strategic sourcing managers can evaluate outsourcing vendors and is part of NelsonHall's Speed-to- Source initiative. The NEAT tool sits at the front-end of the vendor screening process and consists of a two-axis model: assessing vendors against their ability to deliver immediate benefit to buy-side organizations and their ability to meet client future requirements. The latter axis is a pragmatic assessment of the vendor's ability to take clients on an innovation journey over the lifetime of their next contract. The ability to deliver immediate benefit assessment is based on the criteria shown in Exhibit 1, typically reflecting the current maturity of the vendor s offerings, delivery capability, benefits achievement on behalf of clients, and customer presence. The ability to meet client future requirements assessment is based on the criteria shown in Exhibit 2, and provides a measure of the extent to which the supplier is well-positioned to support the customer journey over the life of a contract. This includes criteria such as the level of partnership established with clients, the mechanisms in place to drive innovation, the level of investment in the service, and the financial stability of the vendor. The vendors covered in NelsonHall NEAT projects are typically the leaders in their fields. However, within this context, the categorization of vendors within NelsonHall NEAT projects is as follows: Leaders: vendors that exhibit both a high ability relative to their peers to deliver immediate benefit and a high capability relative to their peers to meet client future requirements High Achievers: vendors that exhibit a high ability relative to their peers to deliver immediate benefit but have scope to enhance their ability to meet client future requirements Innovators: vendors that exhibit a high capability relative to their peers to meet client future requirements but have scope to enhance their ability to deliver immediate benefit Major Players: other significant vendors for this service type. The scoring of the vendors is based on a combination of analyst assessment, principally around measurements of the ability to deliver immediate benefit; and feedback from interviewing of vendor clients, principally in support of measurements of levels of partnership and ability to meet future client requirements. NelsonHall November 2015

9 Exhibit 1 Ability to deliver immediate benefit : Assessment criteria Assessment Category MSS Offerings MSS Delivery MSS Presence Benefits achieved Assessment Criteria SIEM Application Security Endpoint Security IAM Threat Database Maturity Penetration Testing Event Throughput Ability to Offer as Part of Larger IT Infrastructure Deal Firewall Overall MSS Offerings Ability to Offer Dedicated Delivery Delivery in Support of North America Delivery in Support of U.K. Delivery in Support of Rest of EMEA Delivery in Support of APAC Delivery in Support of LATAM Languages Supported Scale of FTE support Security IP Single Touch Point Offshore Focus Scale of Delivery to Financial Services Scale of Delivery to Government Scale of Delivery to Manufacturing Scale of Delivery to Retail Scale of Delivery to Energy & Utilities Automation of Security Dashboard or Portal Offered SLA Flexibility Detection and Response Time Cost Reduction Introduction of Security Frameworks Staff Training Offered Recovery/Damage Control Demonstrated NelsonHall November 2015

10 Exhibit 2 Ability to meet client future requirements : Assessment criteria Assessment Category Suitability to Deliver Future Benefits Investment in MSS Assessment Criteria Area of Investment in Centers: Onshore Area of Investment in Centers: Offshore Investment in Automation Investment in Threat Database Additional Security Research Conducted Industry Specific Security Research FTE Growth Security Roadmap Detailed Financial Rating Partnerships for MSS For more information on other NelsonHall NEAT evaluations, please contact the NelsonHall relationship manager listed below. research.nelson-hall.com Sales Enquiries NelsonHall will be pleased to discuss how we can bring benefit to your organization. You can contact us via the following relationship manager: Guy Saunders at guy.saunders@nelson-hall.com Important Notice Copyright 2015 by NelsonHall. All rights reserved. No part of the publication may be reproduced or distributed in any form, or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. The information provided in this report shall be used only by the employees of and within the current corporate structure of NelsonHall s clients, and will not be disclosed to any other organization or person including parent, subsidiary, or affiliated organization without prior written consent of NelsonHall. NelsonHall exercises its best efforts in preparation of the information provided in this report and believes the information contained herein to be accurate. However, NelsonHall shall have no liability for any loss or expense that may result from incompleteness or inaccuracy of the information provided. NelsonHall November 2015

Life, Annuities and Pensions BPO

Life, Annuities and Pensions BPO NEAT EVALUATION FOR TCS: Life, Annuities and Pensions BPO Market Segment: Overall This document presents TCS with the NelsonHall NEAT vendor evaluation for Life, Annuities and Pensions BPO (Overall market

More information

Recruitment Process Outsourcing Market Segment: Overall

Recruitment Process Outsourcing Market Segment: Overall NEAT EVALUATION FOR CIELO: Recruitment Process Outsourcing Market Segment: Overall This document presents Cielo with the NelsonHall NEAT vendor evaluation for Recruitment Process Outsourcing (Overall market

More information

Mortgage and Loan BPO

Mortgage and Loan BPO NEAT EVALUATION FOR TCS: Mortgage and Loan BPO Market Segment: Overall This document presents TCS with the NelsonHall NEAT vendor evaluation for Mortgage and Loan BPO (Overall market segment). It contains

More information

MSP NEAT EVALUATION FOR KELLYOCG: NEAT Evaluation: MSP (Talent Management Focus) Market Segment: Talent Management Focus

MSP NEAT EVALUATION FOR KELLYOCG: NEAT Evaluation: MSP (Talent Management Focus) Market Segment: Talent Management Focus NEAT EVALUATION FOR KELLYOCG: MSP Market Segment: Talent Management Focus This document presents KellyOCG with the NelsonHall NEAT vendor evaluation for MSP (Wider Talent Management focus market segment).

More information

Payroll BPO 2015 NEAT EVALUATION FOR RAMCO: Introduction. Market Segments: Overall & Multi-Country Focus

Payroll BPO 2015 NEAT EVALUATION FOR RAMCO: Introduction. Market Segments: Overall & Multi-Country Focus NEAT EVALUATION FOR RAMCO: Payroll BPO 2015 Market Segments: Overall & Multi-Country Focus This document presents Ramco with the NelsonHall NEAT vendor evaluation for Payroll BPO (Overall and Multi-Country

More information

Multi-Process HR Outsourcing Market Segment: Overall

Multi-Process HR Outsourcing Market Segment: Overall NEAT EVALUATION FOR INFOSYS: Multi-Process HR Outsourcing Market Segment: Overall This document presents Infosys with the NelsonHall NEAT vendor evaluation for Multi- Process HR Outsourcing (Overall market

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

Payroll Services 2015

Payroll Services 2015 NEAT EVALUATION FOR ADP: Payroll Services 2015 Payroll Services: Market Summary.. Page 2 NEAT Evaluations for Payroll Services Page 5 Vendor Analysis Summary for ADP.. Page 11 NelsonHall 2015 1 June 2015

More information

Application Outsourcing

Application Outsourcing NEAT EVALUATION FOR INFOSYS Application Outsourcing Market Segments: Overall and Managed Services This document presents Infosys with the NelsonHall NEAT vendor evaluation for Application Outsourcing (Overall

More information

CSS Corp Digital Transformation Case Studies: CPG Firm and Healthcare Insurance Company

CSS Corp Digital Transformation Case Studies: CPG Firm and Healthcare Insurance Company IT SERVICES VENDOR PROFILE OF: CSS Corp Digital Transformation Case Studies: CPG Firm and Healthcare Insurance Company 1. A U.S. Based Consumer Goods Company... 1 1.1.. Background... 1 1.2.. Business Challenges...

More information

Managed Service Programs (MSP)

Managed Service Programs (MSP) NEAT EVALUATION FOR KELLYOCG: Managed Service Programs (MSP) Market Segment: Wider Talent Management Focus This document presents KellyOCG with the NelsonHall NEAT vendor evaluation for Managed Service

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Wealth & Asset Management BPS

Wealth & Asset Management BPS NEAT EVALUATION FOR TCS: Wealth & Asset Management BPS Market Segment: Overall This document presents TCS with the NelsonHall NEAT vendor evaluation for Wealth & Asset Management BPS (Overall market segment).

More information

IDC MarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment

IDC MarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment IDC MarketScape IDC MarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment Cathy Huang THIS IDC MARKETSCAPE EXCERPT FEATURES: CSC IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape Asia/Pacific

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Ovum Decision Matrix: Selecting a Managed Security Services Provider, 2016 17

Ovum Decision Matrix: Selecting a Managed Security Services Provider, 2016 17 Ovum Decision Matrix: Selecting a Managed Security Services Provider, 2016 17 Publication Date: 08 Jan 2016 Ian Brown Product code: IT0019-003526 Summary Catalyst IT security must be top of mind at every

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Unisys Innovation Plan

Unisys Innovation Plan Unisys Innovation Plan June 12th, 2015 Our View of the Market Unisys regards user support, cloud/datacenter, applications, data, analytics, social, service management and security as essential components

More information

TBR. Demand for Engineering Services Outsourcing is increasing, particularly for offshore vendors. May 2012

TBR. Demand for Engineering Services Outsourcing is increasing, particularly for offshore vendors. May 2012 Demand for Engineering Services Outsourcing is increasing, particularly for offshore vendors May 2012 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. 1 HCL ESO Whitepaper May 2012 2012 Technology

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

CyberArk Privileged Threat Analytics. Solution Brief

CyberArk Privileged Threat Analytics. Solution Brief CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect

More information

Leading Providers of Application Management in Germany 2013

Leading Providers of Application Management in Germany 2013 Application Management I Germany I 2013 Leading Providers of Application Management in Germany 2013 SITSI I Vendor Analysis I PAC RADAR Scoring results Accenture - Unlimited reprint rights - SITSI I Vendor

More information

Brochure More information from http://www.researchandmarkets.com/reports/3493712/

Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint

More information

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Senior Technology Consultant Symantec Bulgaria Enterprise Threat Landscape Attackers Moving Faster Digital extortion on the rise Malware

More information

Brochure More information from http://www.researchandmarkets.com/reports/3301109/

Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),

More information

Cyber intelligence in an online world

Cyber intelligence in an online world Cyber intelligence in an online world James Hanlon CISM, CISSP, CMI Cyber Strategy & GTM, EMEA Cyber intelligence in an online world SYMANTEC VISION SYMPOSIUM 2014 2 Software and data powers the world

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

1 of 8 3/18/2013 4:59 PM

1 of 8 3/18/2013 4:59 PM 1 of 8 3/18/2013 4:59 PM Advanced Latest Update: August 05, 2010 By Khalid Kark with Stephanie Balaouras, Nick Hayes 1950 downloads 1 comments Rating: quick scan full report resources WHY READ THIS REPORT

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

3Q15 Financial Release CEO/CFO Statements October 21, 2015 Niels Christenson, IRO Peter Altabef, CEO

3Q15 Financial Release CEO/CFO Statements October 21, 2015 Niels Christenson, IRO Peter Altabef, CEO 3Q15 Financial Release CEO/CFO Statements October 21, 2015 Niels Christenson, IRO Thank you operator. Good afternoon everyone, and thank you for joining us. Earlier today, Unisys released its third quarter

More information

BPO in Manufacturing: Catching the New Wave of Innovative Services

BPO in Manufacturing: Catching the New Wave of Innovative Services Manufacturing the way we see it BPO in Manufacturing: Catching the New Wave of Innovative Services New Capgemini research enables manufacturers to evaluate how Business Process Outsourcing can help them

More information

The Current State of Cyber Security

The Current State of Cyber Security The Current State of Cyber Security Bob Kalka, Vice President, IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2 Cyber criminals use BUSINESS INTELLIGENCE 3 NOBODY IS IMMUNE 2012

More information

All about Threat Central

All about Threat Central All about Threat Central Ted Ross & Nadav Cohen #HPProtect Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward

More information

Synergic Partners: Spanish big-data pioneer

Synergic Partners: Spanish big-data pioneer Synergic Partners: Spanish big-data pioneer Analyst: Katy Ring 20 Mar, 2015 Synergic Partners offers a services portfolio around data engineering, big data and data science. The company focuses on business

More information

How To Compare Managed Security Services In Australia/Pb

How To Compare Managed Security Services In Australia/Pb Excerpt IDC ITMarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment Cathy Huang IDC ITMARKETSCAPE FIGURE FIGURE 1 IDC ITMarketScape Asia/Pacific Managed Security Services Market Vendor

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors

Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors January 13, 2015 Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors Excerpted From The Forrester Wave : Global Infrastructure Outsourcing, Q1 2015 by William Martorelli and Wolfgang

More information

2015 Pyramid Research Latin America Telecom Insider

2015 Pyramid Research Latin America Telecom Insider SAMPLE PAGES Carrier Enterprise Services in Latin America: Creating the Cloud Telco Daniel Ramos Senior Analyst Enterprise Cloud Practice Leader Guillermo Hurtado Senior Analyst This report is part of

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

- This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market.

- This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market. Brochure More information from http://www.researchandmarkets.com/reports/3197615/ Global Managed Security Services Market - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research,

More information

COMBATING CYBER THREATS: A HOW TO FOR THE CISO.

COMBATING CYBER THREATS: A HOW TO FOR THE CISO. www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Symantec Managed Security Services The Power To Protect

Symantec Managed Security Services The Power To Protect Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1 Expanding

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

IBM Security X-Force Threat Intelligence

IBM Security X-Force Threat Intelligence IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

> Cognizant Analytics for Banking & Financial Services Firms

> Cognizant Analytics for Banking & Financial Services Firms > Cognizant for Banking & Financial Services Firms Actionable insights help banks and financial services firms in digital transformation Challenges facing the industry Economic turmoil, demanding customers,

More information

Global Software Testing Services Market 2016-2020

Global Software Testing Services Market 2016-2020 Brochure More information from http://www.researchandmarkets.com/reports/3517368/ Global Software Testing Services Market 2016-2020 Description: Market outlook of software testing services Technavio s

More information

Fight fire with fire when protecting sensitive data

Fight fire with fire when protecting sensitive data Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule

More information

Capgemini taps Gravitant for cloud broker role

Capgemini taps Gravitant for cloud broker role Capgemini taps Gravitant for cloud broker role Analyst: William Fellows 1 Aug, 2014 Capgemini is using Gravitant's CloudMatrix decision engine and portal within its cloud broker service. The Gravitant

More information

SecureData grows through managed security services

SecureData grows through managed security services SecureData grows through managed security services How has SecureData grown its managed services business? SecureData has invested heavily in training and recruiting skilled security professionals to provide

More information

Global Infrastructure Outsourcing Market 2015-2019

Global Infrastructure Outsourcing Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3063725/ Global Infrastructure Outsourcing Market 2015-2019 Description: About Infrastructure Outsourcing Infrastructure outsourcing

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

Next-Generation Building Energy Management Systems

Next-Generation Building Energy Management Systems WHITE PAPER Next-Generation Building Energy Management Systems New Opportunities and Experiences Enabled by Intelligent Equipment Published 2Q 2015 Sponsored By Daikin Applied and Intel Casey Talon Senior

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1 I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored

More information

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Analytics Business Process Services (BPS) Service Provider Landscape with PEAK Matrix Assessment 2015

Analytics Business Process Services (BPS) Service Provider Landscape with PEAK Matrix Assessment 2015 Analytics Business Process Services (BPS) Service Provider Landscape with PEAK Matrix Assessment 2015 Market Report: February 2015 Preview Deck Our research offerings for global services Subscription information

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

IDC MarketScape: Worldwide Oracle Implementation Services Ecosystem 2014 Vendor Assessment

IDC MarketScape: Worldwide Oracle Implementation Services Ecosystem 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Oracle Implementation Services Ecosystem 2014 Vendor Assessment Ali Zaidi Gard Little Chad Huston THIS IDC MARKETSCAPE EXCERPT FEATURES: ACCENTURE IDC MARKETSCAPE

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix SESSION ID: PDIL-W02F Understanding the Security Vendor Landscape Using the Cyber Defense Matrix Sounil Yu sounil@gmail.com @sounilyu Disclaimers The views, opinions, and positions expressed in this presentation

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Global SaaS-based Content Security Market 2014-2018

Global SaaS-based Content Security Market 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2933813/ Global SaaS-based Content Security Market 2014-2018 Description: About SaaS-based Content Security SaaS-based content security

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Everest Group PEAK Matrix TM for Supply Chain Management (SCM) BPO Service Providers

Everest Group PEAK Matrix TM for Supply Chain Management (SCM) BPO Service Providers Everest Group PEAK Matrix TM for Supply Chain Management (SCM) BPO Service Providers Focus on TCS December 2014 Copyright 2014 Everest Global, Inc. This document has been licensed for exclusive use and

More information

Managed Security Service Providers vs. SIEM Product Solutions

Managed Security Service Providers vs. SIEM Product Solutions White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

Everest Group s PEAK Matrix for Independent Testing Services

Everest Group s PEAK Matrix for Independent Testing Services Everest Group s PEAK Matrix for Independent Testing Services Focus on Infosys August 2015 Copyright 2015 Everest Global, Inc. This document has been licensed for exclusive use and distribution by Infosys

More information

Global Managed Security Services Market Regulatory Compliance and Advanced Threat Protection Induce Organizations to Outsource Security

Global Managed Security Services Market Regulatory Compliance and Advanced Threat Protection Induce Organizations to Outsource Security Global Managed Security Services Market Regulatory Compliance and Advanced Threat Protection Induce Organizations to Outsource Security December 2013 Contents Section Slide Numbers Executive Summary 5

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Integrating MSS, SEP and NGFW to catch targeted APTs

Integrating MSS, SEP and NGFW to catch targeted APTs #SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

Security Operation Centre 5th generation

Security Operation Centre 5th generation Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

Advanced Threats: The New World Order

Advanced Threats: The New World Order Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China gary.lau@rsa.com 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information