Gabriel Coimbra Research & Consulting Director IDC Portugal. Porto, 29 de Maio 2008. www.idc.com



Similar documents
Network Security. Intertech Associates, Inc.

Jort Kollerie SonicWALL

How to Secure Your Environment

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Achieving SOX Compliance with Masergy Security Professional Services

Seamless ICT Infrastructure Security.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Building a Web Security Ecosystem to Combat Emerging Internet Threats

How are we keeping Hackers away from our UCD networks and computer systems?

Computer Crime & Security Survey

Personal Security Practices of the CAO

Top tips for improved network security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Unified Threat Management, Managed Security, and the Cloud Services Model

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

End-user Security Analytics Strengthens Protection with ArcSight

Firewall and UTM Solutions Guide

Table of Contents. White paper. Executive Summary

The Attacker s Target: The Small Business

Next Gen Firewall and UTM Buyers Guide

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Achieving PCI-Compliance through Cyberoam

McAfee Endpoint Protection Products

Can Your Budget Reshape Your Threat Landscape?

Cybersecurity Health Check At A Glance

Today's security needs in networking

How To Secure Your Business

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Astaro Gateway Software Applications

IBM Global Technology Services Preemptive security products and services

Modular Network Security. Tyler Carter, McAfee Network Security

Data Center security trends

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Lesson 5: Network perimeter security

EndUser Protection. Peter Skondro. Sophos

The Advantages of Security as a Service versus On-Premise Security

IBM Internet Security Systems products and services

Attacks from the Inside

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Securing the Service Desk in the Cloud

Chaos to Simplicity: Making Sense of the Security Marketplace. Paul Adamonis Director, Security Solutions Forsythe

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Managed Security Services for Data

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

FortiMail Filtering. Course for FortiMail v4.0. Course Overview

Best Practices For Department Server and Enterprise System Checklist

CloudCheck Compliance Certification Program

April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise

Promoting Network Security (A Service Provider Perspective)

Computer Crime & Security Survey

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

Chapter 15: Computer and Network Security

INFORMATION PROTECTED

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Clavister InSight TM. Protecting Values

Section 12 MUST BE COMPLETED BY: 4/22

Chapter 9 Firewalls and Intrusion Prevention Systems

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

NetDefend Firewall UTM Services

13 Ways Through A Firewall

INFORMATION SECURITY FOR YOUR AGENCY

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Endian Unified Threat Management

The Key to Secure Online Financial Transactions

Your Security Partner of Choice

Proven LANDesk Solutions

Network protection and UTM Buyers Guide

NetDefend Firewall UTM Services

Move over, TMG! Replacing TMG with Sophos UTM

2012 Endpoint Security Best Practices Survey

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

How To Protect Your Cloud From Attack

CDW-G Federal Cybersecurity Report: Danger on the Front Lines. November CDW Government, Inc.

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

DTR Business Systems, Inc. Rene Beltran

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

A progressive and integrated approach to protecting corporate networks

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

Best Practices for Outdoor Wireless Security

Penetration Testing //Vulnerability Assessment //Remedy

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Transcription:

IT Security Market Overview Gabriel Coimbra Research & Consulting Director IDC Portugal Porto, 29 de Maio 2008 www.idc.com

Agenda Market context IT Security context CSO Agenda IT Security market Conclusion 2

The Expanding IT Realm IT $1.2 Trillion 3

The Expanding IT Realm Business Services $1+ Trillion IT $1.2 Trillion Telecom Services $1.3 Trillion Content ~$1 Trillion 4

The Expanding IT Realm Business Services Expenses: >$1T CIO IT Mgt Budget: ~$2T Telecom Services Budget: $1.3T Content Spending: ~$1T 5

The Information Explosion 1.000 900 800 700 600 500 400 300 200 100 Exabytes of Information Created WW 90% Unstructured 10X File Diversity 70% User Created 85% Corporate Liability 30% Outside Data Center 0 2007 2008 2009 2010 6

The CIO Domain Explosion Communicating Devices* WW (Millions) 5.000 4.000 3.000 2.000 1.000 Automobiles Cameras Converged phones Games GPS Industrial Machines PDAs Toys and Appliances Etc. PCs and Servers 0 2006 2007 2008 2009 2010 * Excludes RFID and sensors 7

Security Context www.idc.com

IT Security context IT Security Security Hardware Security Software Security Services Hardware Authentication Biometrics Tokens Smart Cards Threat Management Security Appliances FW/VPN Unified (UTM) IDS and IPS SCM Consulting Implementation Operations Education and Training Other 9

IT Security context Security Services Consulting Implementation Operations Education and Training Security Strategy and Planning Assessment Compliance Audit Architecture Analysis and Review IR and Forensics Design Managed Security Instructor-Led Services Training i HW and SW Procurement Integration of Security Architecture Performance Testing Transition/ Migration Hosted Security Services Technology- Based Training Text-Based Training Knowledge Transfer 10

IT Security context Security Software Identity and Access Management (IAM) Security Compliance and Vulnerability Management (SVM) Secure Content and Threat Management (SCTM) Other Security Software Advanced Authentication Web SSO Host SSO Legacy Authorization User Provisioning Directory Services Sec. Info and Event Network Endpoint Messaging Web Security Management Security Security Security Vulnerability Enterprise Endpoint (IPC) Mail Server Assessment URL Filtering Firewall Antivirus Intrusion Client Antivirus Antispam Policy and Network Prevention Compliance Intrusion Firewall/VPN Personnal Messaging Prevention Firewall Information Patching and Gateway Protection and Remediation Network Antivirus Client Control (IPC) Antivirus Antispyware Security Sys and Gateway Secure Email Host Intrusion Configuration Network Antispyware Prevention Management Access Control (NAC) USB Security Forensics Endpoint Encryption Encryption Toolkits File Encryption Database Encryption Wireless Security Others... Network Access Control (NAC) 11

Today: Current Situation ti 12

Current Threat Environment How would you rate the items below on the threat each poses to your company s enterprise network security? (Scale: 5 = significant threat; 1 = no threat) Trojans, viruses, worms, and other malicious code Spyware 45% 50% 50% 57% SPAM Employee error (unintentional) 35% 39% 39% 47% Application vulnerabilities 31% 37% Data stolen by employee or business partner 22% 37% 2006 2005 Hackers 37% 36% Source: IDC s Enterprise Security Survey 2006 Top 2 boxes (rating of 4 or 5) 13

Current Internal v. External Threats Q: Do you believe that the most serious threats to your company's enterprise IT infrastructure originate from internal or external sources? 60% 50% 40% 30% 20% 10% 0% Small Medium Large Very large External sources Internal sources About even Source: IDC s Enterprise Security Survey 2006 14

Tomorrow s Situation 15

Future Security Challenges How would you rate the items below on the threat each poses to your company s enterprise network security? (Scale: 5 = significant threat; 1 = no threat) Employees following security policy 44% 52% Increasing sophistication of attacks Business executives following security policy 33% 44% 51% 49% Security budget too small Increasing complexity of security solutions Increasing volume and complexity of network traffic 40% 38% 39% 36% 39% 33% 2006 2005 Mobile clients 27% 37% Source: IDC s Enterprise Security Survey 2006 Top 2 boxes (rating of 4 or 5) 16

What's on the Agenda for CSOs? (And What Will Drive the Market for the Next Three Years) www.idc.com

CSO Agenda, 2007 2008 1 - Process Compliance and risk assessment/management Information protection and control Security process (incident reaction) 2- People User escort Endpoint protection IAM 3 - Technology Best of breed Mixing vendors Refocus on real security 18

IT Security Market www.idc.com

Security Revenues IT Security Market in Portugal 80 Milhões de Euros 60 40 20 Hardware Software Services 2005 2006 2007 2008 2009 2010 2011 Source: IDC, 2007 20

Security Revenues Growth 35% IT Security Market in Portugal UTM Appliances Explosion Annual Growth Rate 30% 25% 20% 15% 10% Shift to SaaS Hardware Software Services 5% 2005 2006 2007 2008 2009 2010 2011 Source: IDC, 2007 21

Conclusion www.idc.com

Conclusion Traditional IT security over-protects the wrong assets, overreacts to the unexpected and over-spends on almost everything. IDC believes the risk management that applies security resources appropriately while maximizing business agility is the correct approach to the IT Security. Instead looking to IT security as a reflection, it should integrate compliance, risk assessment and business continuity dynamics into every process and application. In IDC vision, It s the only way to contain security spending while managing the risks of doing business in a connected world and mobility environment. 23

Questões? Gabriel Coimbra Research & Consulting Director IDC Portugal Av.António A Serpa, 36 9º andar 1050-027 Lisboa Portugal Tel:+351 21 796-5487 Mob:+351 91 985-4722 Fax:+351 21 796-5476 gcoimbra@idc.com www.idc.pt www.idc.com 24