Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares



Similar documents
Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Global Headquarters: 5 Speen Street Framingham, MA USA P F

M A R K E T A N A L Y S I S

Worldwide Security and Vulnerability Management Market Shares, 2014: The Need for Improved Incident Response Driving Higher Growth Across the Market

Worldwide Workload Management Software 2013 Vendor Shares

Worldwide Datacenter Automation Software 2013 Vendor Shares

Worldwide Cloud Systems Management Software 2013 Vendor Shares

Worldwide Application Performance Management Software 2013 Vendor Shares

IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Worldwide Problem Management Software Market Shares, 2014: 3rd Platform Technologies and Delivery Models Drive Growth

ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Worldwide Datacenter Automation Software Market Shares, 2014: Year of Cloud and DevOps

The State of Mobility in the Enterprise in 2014: An IDC Survey of Devices, Platforms, Decisions, and Deployments

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Worldwide Cloud Systems Management Software 2012 Vendor Shares

Sluggish Incident Response: Next-Generation Security Problems and Solutions

Worldwide Application Performance Management Software 2012 Vendor Shares

W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified

Converged and Integrated Datacenter Systems: Creating Operational Efficiencies

Worldwide DDI Market Update

IDC MarketScape: Worldwide Oracle Implementation Services Ecosystem 2014 Vendor Assessment

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

"Why Didn't We Do It Sooner?" Deployment of a New BI Solution at The Pain Center of Arizona

SAS Enterprise Decision Management at a Global Financial Services Firm: Enabling More Rapid Implementation of Decision Models into Production

IDC MarketScape: Worldwide Digital Enterprise Strategy Consulting Services 2015 Vendor Assessment

W o r l d w i d e B u s i n e s s A n a l y t i c s S o f t w a r e F o r e c a s t a n d V e n d o r S h a r e s

IDC MarketScape: Worldwide Business Consulting Strategy for Digital Operations 2015 Vendor Assessment

IDC MarketScape: Worldwide Cloud Professional Services 2016 Vendor Assessment

MarketsandMarkets. Publisher Sample

Content Analyst's Cerebrant Combines SaaS Discovery, Machine Learning, and Content to Perform Next-Generation Research

IDC MarketScape: Worldwide Hydrocarbon Accounting Software 2013 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment

What is Security Intelligence?

2014 Human Capital Management Survey: HCM Buyer Actions and Plans

Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments

Microsoft Office 365: How the Hosted Exchange Server Is Redefining SMB Cloud IT Adoption

IDC MarketScape Excerpt: Worldwide HR BPO 2014 Vendor Assessment

Worldwide Cloud Systems Management Software Market Shares, 2014: Year of Hybrid Cloud

Hybrid Cloud Drives Need for Software-Defined WANs in Enterprise

Q1 Labs Corporate Overview

Journey to 3rd Platform Digital Customer Experience

Windows Server 2003 Migration: Take a Fresh Look at Your IT Infrastructure

Safeguarding the cloud with IBM Dynamic Cloud Security

Cirba Targets Software-Defined Infrastructure Control with Workload-Aware Predictive Analytics

Worldwide Datacenter Automation Software Market Shares, 2015: Year of Suite Success

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Continuous Network Monitoring

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

DNS Server Security Survey

Understanding the Business Value of Migrating to Windows Server 2012

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Worldwide Advanced and Predictive Analytics Software Market Shares, 2014: The Rise of the Long Tail

I N D U S T R Y D E V E L O P M E N T S A N D M O D E L S. I D C M a t u r i t y M o d e l : P r i n t a n d D o c u m e n t M a n a g e m e n t

IBM Security QRadar Vulnerability Manager

Global Headquarters: 5 Speen Street Framingham, MA USA P F

How To Understand Cloud Economics

Assessing the Business Value of SDN Datacenter Security Solutions

Global Headquarters: 5 Speen Street Framingham, MA USA P F

How To Buy Nitro Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Security Intelligence

IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

IDC MarketScape: Worldwide Microsoft Enterprise Applications Implementation Services Ecosystem 2015 Vendor Assessment

IDC MarketScape: U.S. Government Private Cloud IaaS 2014 Vendor Assessment

O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s

The Business Value of Network-Based Intrusion Prevention Systems

Allstate Getting Much More from Its IT Services with ServiceNow Cloud-Based IT Service Management Solution

Data Management: Foundational Technologies for Health Insurance Exchange Success

Toward Real-Time Plant Floor Visibility: A View From Various Manufacturing Sectors

Using Converged Infrastructure to Enable Rapid, Cost-Effective Private Cloud Deployments

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Global Headquarters: 5 Speen Street Framingham, MA USA P F

IBM QRadar Security Intelligence April 2013

IDC MarketScape: Worldwide Supply Chain Management Business Consulting Services 2014 Vendor Assessment

The Benefits of an Integrated Approach to Security in the Cloud

IDC MarketScape: Worldwide Life Science Sales and Marketing BPO 2015 Vendor Assessment

Worldwide Business Analytics Software Forecast and 2013 Vendor Shares

IDC MarketScape: Worldwide Life Science Sales and Marketing ITO 2015 Vendor Assessment

COMPETITIVE ANALYSIS. Worldwide RDBMS 2006 Vendor Shares: Preliminary Results for the Top 5 Vendors IDC OPINION. Carl W. Olofson

The Evolution of Application Monitoring

Transcription:

Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market Analysis: Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares (Doc #250223). All or parts of the following sections are included in this excerpt: IDC Opinion, Situation Overview, Future Outlook, and Essential Guidance sections that relate specifically to Qualys, and any figures and or tables relevant to Qualys. IDC OPINION Among the uncertainties of business there seems to be one constant, cyberthreats. There has been no let up on Internet-enabled crime and mischief. As IT becomes more important to business, the threats they face increase. As a result, the security and vulnerability management (SVM) market remains exceedingly strong. Enterprises and organizations continued to deploy technologies to improve their management of security operations. In response to sophisticated threats and privacy requirements, organizations turn to security and vulnerability management solutions to provide threat intelligence, security policy consistency, and risk management. The SVM market provides a window into an organization's risk posture and allows for that risk position to be monitored and improved. Security and vulnerability management market revenue grew at a rate of 10.2% in 2013. This was up slightly from the 10% rate in 2012. Revenue in the SVM market was $4 billion in 2013 compared with $3.7 billion in 2012. IDC believes the SVM market will remain on a positive growth trajectory in 2014, with revenue anticipated to be $4.4 billion, which is a 9.7% increase. By the end of the forecast period (2018), the market should exceed revenue of $6.5 billion with a steadily strong annual growth rate, resulting in a compound annual growth rate (CAGR) of 10.2%. Highlights are: The public disclosure of security breaches and data loss incidents results in ever-increasing usage of products that can create and enforce security policy and provide information required by auditors. It also requires that products that aggregate data and event management have the ability to identify and remediate internal threats based on user privileges. Security consists of products, people, and policy. SVM vendors are able to provide many policy solutions that are used to supplement and validate other security defenses. SVM products can be considered the "brains" of an organization's security efforts. The SVM market is diverse. The top 10 vendors only command 49% of the overall market, with still only one vendor with a market share greater than 10%. Mergers and acquisitions (M&As) are slowly resulting in consolidation of the market; however, with multiple components, it will be difficult for a few vendors to dominate the market. August 2014, IDC #250223e

SVM products will continue to benefit from increasing threats from organized attackers. SVM solutions help organizations identify weaknesses (vulnerabilities and policies), gain a full picture of what is going on (security intelligence and event management [SIEM] and forensics), and provide visibility of those issues to the executive team. SITUATION OVERVIEW Security and Vulnerability Management Market in 2013 Products that fall within the security and vulnerability management market remain in high demand. The SVM market covers a wide area of solutions that are designed to provide the brains of the security organization. Organizations look for solutions to proactively mitigate risk, create and audit security policy, consolidate risk management information and, ultimately, provide some security peace of mind. As a result, the market had a 10% growth rate in 2013 compared with 2012's results. The total market in 2013 was $4 billion. The SVM market is large and competitive with well over 100 vendors, but only 35 are tracked in this study. This diversity and competitiveness is illustrated by the fact that only 1 vendor exceeds 10% in market share. Unlike some other security markets, SVM is not dominated by a handful of vendors. The 35 vendors in this study do not reach 75% share of the total market, while it takes only 7 in endpoint security and 15 in network security to reach that level. To illustrate the complexity and competitiveness of this market, Table 1 provides a list of products, within the submarkets, of the top dozen vendors. Please understand this is a representative list and does not include every product a vendor has that falls within the SVM market. TABLE 1 Representative SVM Vendor Products for Select Vendors Company Forensics and Incident Investigation Policy and Compliance Security Intelligence and Event Management Security Device Systems Management Vulnerability Assessment EMC RSA Security Analytics RSA Archer GRC Suite RSA Security Analytics Extreme Networks NetSight Security Information and Event Manager Ridgeline Good Technology Good Dynamics Secure Mobility Platform Guidance Software EnCase Forensic; EnCase Cybersecurity EnCase Enterprise HP Compliance Insight Packages ArcSight ESM; ArcSight Logger Fortify Static-Code Analyzer: Webinspect

TABLE 1 Representative SVM Vendor Products for Select Vendors Company Forensics and Incident Investigation Policy and Compliance Security Intelligence and Event Management Security Device Systems Management Vulnerability Assessment IBM zsecure Audit; IBM InfoSphere Guardium Data Activity Monitor; QRadar Risk Manager QRadar SIEM; QRadar Log Manager Rational AppScan; AppScan Source; Guardium Database Vulnerability Assessment; QRadar Vulnerability Manager McAfee, an Intel company Policy Auditor; epolicy Orchestrator McAfee Enterprise Security Manager, Risk Advisor Vulnerability Manager; Vulnerability Assessment SaaS NetIQ NetIQ Secure Configuration Manager, NetIQ Security Solutions for iseries Sentinel Qualys QualysGuard Policy Compliance QualysGuard Vulnerability Management; QualysGuard Web Application Scanning Rapid7 ControlsInsight Nexpose; Metasploit Symantec Risk Automation Suite; Control Compliance Suite DeepSight Early Warning Control Compliance Suite Vulnerability Manager Tripwire Tripwire Enterprise; Tripwire Security Intelligence Hub Tripwire Log Center Tripwire IP360 Performance of Leading Vendors in 2013 The leading vendors for 2013 are pulled from both the security management and the vulnerability assessment ranks. Table 2 provides worldwide SVM revenue and market shares. Top vendors include: IBM is the leader of the market, with market revenue of $556.3 million. IBM's revenue grew 26.4% in 2013 compared with 2012 revenue, growing its leading share to 13.8%. HP remained in the second position, with revenue of $368 million for 2013. HP's market share was 9.1%. EMC had another strong year with a growth rate of over 15%, resulting in $253.5 million in market revenue and a market share of 6.3% in 2013.

Tripwire moved to the fourth position, following its acquisition of ncircle and strong growth. The company had revenue of $150 million, resulting in a market share of 3.7%. McAfee, an Intel company, is fifth, with revenue of $130.6 million. The company grew at a 13.9% rate. Table 4 displays 2013 worldwide revenue and market shares for the leading vulnerability assessment vendors. Figures 5 and 6 display 2013 market shares for the top 5 device vulnerability assessment vendors and application vulnerability assessment vendors, respectively. TABLE 2 Worldwide Security and Vulnerability Management Revenue by Vendor, 2012 and 2013 ($M) Vendor 2012 2013 2013 Share (%) 2012 2013 Growth (%) IBM 440.2 556.3 13.8 26.4 HP 355.1 368.0 9.1 3.6 EMC 219.9 253.5 6.3 15.3 Tripwire 126.4 150.0 3.7 18.7 McAfee, an Intel company 114.7 130.6 3.2 13.9 NetIQ (an Attachmate company) 119.5 121.4 3.0 1.5 Symantec 129.4 116.8 2.9-9.7 Qualys 86.9 102.6 2.5 18.0 Subtotal 1,592.10 1,799.20 44.50 13.0 Other 2,063.00 2,229.80 55.50 8.1 Total 3,655.20 4,028.90 100.00 10.2

TABLE 4 Worldwide Vulnerability Assessment Revenue by Vendor, 2013 Vendor Revenue ($M) Share (%) IBM 162.9 16.0 HP 94.2 9.3 Qualys 93.1 9.1 Rapid7 68.6 6.7 McAfee, an Intel company 62.4 6.1 Subtotal 481.2 47.2 Other 536.9 52.7 Total 1,018.00 100.00 FIGURE 5 Worldwide Device Vulnerability Assessment Revenue Share by Vendor, 2013

FUTURE OUTLOOK Forecast and Assumptions Worldwide revenue for the SVM market reached $4 billion in 2013, representing 10.2% growth over 2012. IDC currently forecasts that the SVM market will increase at a 10.2% CAGR and reach $6.6 billion in 2018, as shown in Table 5. TABLE 5 Worldwide Security and Vulnerability Management Revenue by Segment, 2009 2018 ($M) 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2013 2018 CAGR (%) Security management SIEM 870.0 1,065.0 1,264.0 1,380.2 1,527.0 1,653.9 1,804.0 1,984.4 2,146.4 2,304.4 8.6 Forensics and incident investigation Policy and compliance Security device systems management 120.0 125.0 221.0 305.0 361.7 424.4 491.5 559.6 630.7 699.7 14.1 587.6 694.2 800.5 875.3 956.8 1,046.6 1,143.0 1,240.0 1,339.4 1,447.7 8.6 273.7 254.5 201.4 179.0 165.3 154.6 144.5 136.7 129.9 123.6-5.7 Subtotal 1,851.3 2,138.7 2,486.9 2,739.5 3,010.9 3,279.5 3,583.0 3,920.7 4,246.4 4,575.4 8.7 Vulnerability assessment Device 428.3 474.7 522.0 569.5 628.4 696.4 779.3 897.2 1,019.4 1,140.5 12.7 Application 244.6 275.9 314.7 346.2 389.6 445.4 530.8 633.3 739.3 838.5 16.6 Subtotal 672.9 750.6 836.7 915.7 1,018.0 1,141.8 1,310.1 1,530.5 1,758.8 1,978.9 14.2 Total 2,524.2 2,889.3 3,323.6 3,655.2 4,028.9 4,421.3 4,893.1 5,451.2 6,005.1 6,554.3 10.2 Market Context Table 8 and Figure 7 show a comparison of IDC's current forecast with the forecast published in Worldwide Security and Vulnerability Management 2013 2017 Forecast and 2012 Vendor Shares (IDC #242465, August 2013). The SVM market's growth rate is slightly greater than the previous forecast.

However, the total market size is down because a submarket (proactive endpoint risk management) previously included in the SVM market has been moved to the endpoint security market. TABLE 8 Worldwide Security and Vulnerability Management Revenue, 2009 2018: Comparison of August 2013 and August 2014 Forecasts ($M) 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 August 2014 forecast 2,524.2 2,889.3 3,323.6 3,655.2 4,028.9 4,421.3 4,893.1 5,451.2 6,005.1 6,554.3 Growth (%) NA 14.5 15.0 10.0 10.2 9.7 10.7 11.4 10.2 9.1 August 2013 forecast 2,875.8 3,365.3 3,832.6 4,191.5 4,603.5 5,030.6 5,495.5 5,979.0 6,473.4 NA Growth (%) NA 17.0 13.9 9.4 9.8 9.3 9.2 8.8 8.3 NA Notes: See Worldwide Security and Vulnerability Management 2013 2017 Forecast and 2012 Vendor Shares (IDC #242465, August 2013) for prior forecast. Historical market values presented here are as published in prior IDC documents based on the market taxonomies and current U.S. dollar exchange rates existing at the time the data was originally published. For more details, see the Methodology in the Learn More section.

FIGURE 7 Worldwide Security and Vulnerability Management Revenue, 2009 2018: Comparison of August 2013 and August 2014 Forecasts Market Trends Given the importance of risk management, government regulations, and exposure through vulnerabilities, the security and vulnerability management market is full of opportunity. Developments that will shape this market in the future include the following: Big Data analytics. Organizations have a lot of data (various logs and other reporting data) associated with network devices, applications, and user activities. To optimize advance defenses, this amalgamation of data must be turned into actionable information. Combining Big Data with threat intelligence information, organizations can start using "situational awareness" to see the big picture of how their IT assets are working and how well they stack up to existing threats. SVM technologies provide the knowledge and intelligence to improve the overall security posture. SIEM technology does the heavy lifting of analyzing the data, but many of the other SVM technologies have a role to play. Vulnerability assessment data allows an organization to learn where risk resides, forensics provides historical data that can show how an attack proliferated, and policy and compliance provides data on devices but also is used to report many of the findings. By using advanced analytics to bring together threat intelligence, vulnerability information, security events, and protection profiles, it might be possible to better anticipate what types of attacks will come next. Both situational awareness and analytics are designed to facilitate better decision making by security professionals and executives and to help discover stealthy attacks.

Cloud. Cloud infrastructures are growing in popularity, but organizations are concerned about the security of the devices that their data will be processed on and stored in. To deal with these fears, cloud providers are partnering with SVM vendors to allow customers to assess the security posture of the cloud infrastructure they will be utilizing. For ease of use, the cloud infrastructure vendors are turning to cloud security providers so that there is consistency regarding the scans, assessments, and reporting. In this way, they are using the cloud to protect the cloud. Mobile devices. Growth in corporate usage of smartphones and tablets, both enterprise liable and employee liable (bring your own device), is changing the risk posture of many organizations. The proliferation of these devices is requiring organizations to revamp some of their security policies, to improve their vulnerability management, and to bring security management into the mobile device management (MDM) systems. IDC expects that many MDM systems deployed by enterprises will come from security vendors that will be able to enforce unique security policies associated with mobile devices. Application and software security vulnerability assessment. As security becomes more important at the application level, especially with the proliferation of mobile applications, application-level security is becoming a fundamental component for software development and quality assurance. There are application scanning tools that look at operational products such as databases and Web servers, and there is code scanning for mobile apps. The market has been moving from individual static and dynamic testing products to hybrid solutions that can offer both capabilities. IDC refers to this as "measuring twice and cutting once." Products within this market will continue to evolve to the point where they will be used throughout the software development life cycle so that vulnerabilities can be eliminated before a program becomes operational. Multiple delivery systems. Vendors are providing SVM products using various delivery methods, which include software, hardware, software as a service (SaaS), and virtualized appliances. The vulnerability assessment market has a strong SaaS component. The use of SaaS for application testing continues to grow. SaaS is also growing in the SIEM submarket, and there is no reason SaaS can't be used in the policy and compliance submarket. Hardware products are most prominent in the SIEM and forensics and incident investigation submarkets because of the need to store vast amounts of log data. However, the reliance on specialized appliances has been declining, while the use of software appliances run in a hypervisor-based environment has been increasing. IDC expects that SVM products will continue to be delivered in a diverse manner. ESSENTIAL GUIDANCE Security is a value-add, not just a necessary evil or the purview of the paranoid. Companies understand that their systems, storage operations, network connectivity, endpoints, and applications need to be inherently secure. Customers demand security management that is well integrated with the IT infrastructure and that is effective, usable, and affordable. Security and vulnerability management is very important to meeting risk management goals because it provides policy and compliance context, vulnerability information and, ultimately, a comprehensive view of enterprise risk management. It offers organizations better ways to cost effectively provide risk management. SVM solutions can simplify the complexity associated with managing multiple security solutions while at the same time increasing the automation, effectiveness, and proactive nature of security. Vendors are growing the capabilities to provide comprehensive coverage within their security management offerings. The key to success in this space will be the ability to provide proactive security protection and the knowledge and intelligence to provide comprehensive security assessment data.

IDC believes vendors should develop tools that bring together event records, efficiently prioritize incidents, separate real security violations from false alarms, and aggregate security events from different locations, devices, and manufacturers. Moreover, vulnerabilities must be viewed as part of an overall security management infrastructure that takes into account security policy, compliance, and risk management. SVM solutions should tell the enterprise why the vulnerability is a concern, its risk ranking, and how to remediate. SVM offerings must be able to provide a more aggressive, positive security model and not just respond to events in a chaotic manner. For the SVM market to maintain its strong growth rates, vendors must continue to make security smart. One area where SVM makes security smart is in the SIEM market, where an ever-growing set of security data has to be processed to find the critical information among a huge set of data and to put that intelligence into its proper context. The SIEM market is important for providing audit information and ensuring proper utilization of security technologies. IDC also believes that vulnerability scanning whether it's device or application based, white box or black box, or credential or hacker view provides critical information that allows organizations to adjust their security position to meet real security threats. IDC believes that products that can do real-time penetration testing will see considerable success over the next few years because they can pinpoint specific security gaps. LEARN MORE Related Research Worldwide Mobile Enterprise Security Software 2014 2018 Forecast and Analysis (IDC #249434, June 2014) The Human Element to IT Security (IDC #249370, June 2014) IDC's Worldwide Security Predictions, 2014: The New Value of Security Paranoia (IDC #WC20140107, January 2014) Worldwide IT Security Products 2013 2017 Forecast and 2012 Vendor Shares: Comprehensive Security Product Review (IDC #245102, December 2013) Worldwide Security and Vulnerability Management 2013 2017 Forecast and 2012 Vendor Shares (IDC #242465, August 2013) U.S. Mobile Security Survey, 2013 (IDC #240598, April 2013)

About IDC International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make factbased decisions on technology purchases and business strategy. More than 1,100 IDC analysts provide global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries worldwide. For 50 years, IDC has provided strategic insights to help our clients achieve their key business objectives. IDC is a subsidiary of IDG, the world's leading technology media, research, and events company. Global Headquarters 5 Speen Street Framingham, MA 01701 USA 508.872.8200 Twitter: @IDC idc-insights-community.com www.idc.com Copyright Notice This IDC research document was published as part of an IDC continuous intelligence service, providing written research, analyst interactions, telebriefings, and conferences. Visit www.idc.com to learn more about IDC subscription and consulting services. To view a list of IDC offices worldwide, visit www.idc.com/offices. Please contact the IDC Hotline at 800.343.4952, ext. 7988 (or +1.508.988.7988) or sales@idc.com for information on applying the price of this document toward the purchase of an IDC service or for information on additional copies or Web rights. Copyright 2014 IDC. Reproduction is forbidden unless authorized. All rights reserved.