THE CYBER-SECURITY PLAYBOOK



Similar documents
TOTAL DATA WAREHOUSING:

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market

TOTAL DATA INTEGRATION

CLOUD CLIENTS AND VIRTUAL CLIENTS

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS

E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance

MOBILE APP LIFECYCLE

E-DISCOVERY AND E-DISCLOSURE 5 IMPLICATIONS

The Data Management of Things

Are Small Consultancies Best for Big Data Projects?

OF THE CLOUD, FOR THE CLOUD

Social Intranets and the Supply Chain

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013

Software and Data Are Reshaping the Advertising Market

The State of the European Public Cloud Market

Cloud Management Platform Market Map 2016

CLOUDSCAPE. IT SERVICES Tooling up for ITaaS KEY FINDINGS

Data Platforms and Analytics Market Map 2016

DATACENTRE ENTERPRISE DATACENTRE SELECTION EUROPE 2011 JEFF PASCHKE & MARK ACTON REPORT BY SEPTEMBER 2011

2016 Trends in Cloud and IT Services Markets

London Multi-Tenant Datacenter and Hosting Market

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY?

2016 Trends in Service Providers

ENTERPRISE MOBILE APPLICATIONS

Mexico EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET

DATACENTER BRAZIL MTDC MARKET ASSESSMENT EXECUTIVE OVERVIEW. Supply and Providers MARCH 2013

2016 Trends in Datacenter Technologies

Web and Application Hosting 2015

Upheaval in the CRM Services Market

DATACENTER CANADA MTDC MARKET ASSESSMENT REPORT EXCERPT SUPPLY AND PROVIDERS MICHAEL LEVY WRITTEN BY DECEMBER 2012

Telco Multi-Play and Content Strategies

Seattle EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET

DATACENTER MULTI-TENANT DATACENTER NORTH AMERICAN PROVIDERS 2013 EXECUTIVE OVERVIEW KEY FINDINGS

2016 Trends in Enterprise Mobility

WEB AND APPLICATION HOSTING

Decision Framework, DF J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing

2016 Trends in Storage

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor

Network Management Software Technology Roadmap

2016 Trends in Information Security

Big Data and Business Analytics

The Magic Quadrant Framework

COM M. Margevicius

Predicts 2004: Supplier Relationship Management

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.

ENTERPRISE SECURITY INFORMATION MANAGEMENT 5 IMPLICATIONS

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary

Business Intelligence: The European Perspective

Definition of the Market

Managing Vulnerabilities For PCI Compliance

COM J. Holincheck

Lead architect. Business architect. Technical architect. Lead Architect

This white paper was written by Csilla Zsigri, The 451 Group, based on the work done by the SmartLM Consortium in business modeling.

DATACENTER MULTI-TENANT DATACENTER PROVIDERS EVOLVE WITH CLOUD OFFERINGS EXECUTIVE OVERVIEW MAY 2013

Hierarchy of Needs for Content Networking

Hosting and Colocation Regional Strategies for Growth. April 2015

Magic Quadrant for Data Center Outsourcing, 4Q03

Data Networking Technology Roadmap

DATACENTER NORTH AMERICAN MULTI-TENANT DATACENTER SUPPLY EXECUTIVE OVERVIEW. Emerging Major Markets 2013 DECEMBER 2013

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

RBC Insurance Fetes Online Auto/Home Insurance Growth

Users and Vendors Speak Out: Intrusion Detection and Prevention

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

New Sales and Marketing Models Required to Sell Business Process Services

Research Agenda and Key Issues for Converged Infrastructure, 2006

BSM Definition, Drivers and Inhibitors

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary

Managers Begin to Apply Business Activity Monitoring

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant

Candidate AD Roles for Outsourcing

Business Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002

Use These Guidelines for Making Better CRM Consulting Provider Selections

What Are Network Security Platforms?

Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary

SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER

PLM Eclipses CPC as a Software Market

Magic Quadrant for Global Enterprise Desktops and Notebooks

Like all football clubs, PSG suffered from unsold seats for the less-popular games. Even when it was able to sell tickets for

Don't Pay to Support CRM 'Shelfware'

RESEARCH NOTE. Workplace Service. Hot Vendors in Knowledge and Collaboration, 2014

IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary

Achieving Enterprise Software Success

CARRIER-NEUTRAL COLOCATION 2009 DATACENTER REPORT BY JASON SCHAFER APRIL TIER1 RESEARCH & THE 451 GROUP DATACENTER

Estimating the Costs of an ERP/Business Application Initiative

Prediction 2003: CRM Software Market Faces Tough Times

DATACENTER NORTH AMERICAN MULTI- TENANT DATACENTER SUPPLY EMERGING MAJOR MARKETS 2011 JEFF PASCHKE, RICK KURTZBEIN & MICHAEL LEVY REPORT BY JULY 2011

Management Update: How to Implement a Successful ERP II Project

Global Case Studies in Highly Efficient Datacenters 2014

Management Update: The Eight Building Blocks of CRM

Data Center Conference Survey Results: Server Consolidation

Vendor Classification

IP Centrex and IP Telephony Offer Different Capabilities

Enterprise Mobility Services. Market Opportunity for Mobile Service Providers

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

Transcription:

THE CYBER-SECURITY PLAYBOOK Selling Into the Global Defense Market The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated market has remained a mystery to many vendors. Analyzing the Business of Enterprise IT Innovation ESP ENTERPRISE SECURITY PRACTICE 4 FINDINGS Defense contractors and SIs are beginning to reach into the enterprise market to acquire complementary security product vendors for the enhancement of their cyber-security portfolios. PAGE 22 There are multiple paths to sell to government agencies, many of which are supported by assistance programs that enterprise vendors can use. PAGE 14 Vulnerability management is an early leader in cyber-security-market adoption, but ESIM, forensics and several other classic enterprise technologies are hot on its heels. PAGE 25 Due to threat severity, government buyers are more inclined to buy best-in-breed technologies than allencompassing portfolios as long as the technology is extensible and malleable. PAGE 20 5 IMPLICATIONS Established vendors with a strong enterprise presence looking to further exploit the cyber-security market will likely need to follow traditional certification and partnership strategies. PAGE 11 Startups need to gain a firm understanding of governmentbacked opportunities and the procurement vehicles employed by government agencies. PAGE 11 End users of enterprise security products from a vendor that has recently adopted a federal sales strategy may find themselves a less important factor in product roadmap decisions going forward. PAGE 38 Investment in a federal-focused company shouldn t be seen as an arduous long-term deal with limited ROI potential. Government agencies will likely help incubate products and fund their development. PAGE 14 Between 2002 and 2009, there were only four acquisitions in the cyber-security space driven by product or technology portfolio inclusion, compared to four in 2010 and one so far in 2011. PAGE 22 1 BOTTOM LINE The cyber-security market has always been perceived as a tough nut to crack. However, with government-backed R&D programs, increased defense contractor and SI security acquisitions, and growing cyber-security concerns and mandates, this space may be one of the last greenfield opportunities left in the security-product market. APRIL 2011

REPORT SNAPSHOT TITLE The Cyber-Security Playbook ANALYST RELEASE DATE April 2011 LENGTH Andrew Hay, Senior Security Analyst, Enterprise Security Practice 40 pages ABOUT THIS REPORT The primary purpose of this report is to open the eyes of security technology vendors to the slew of cyber-security opportunities and related monies made available by the cyber-security concerns of the government, military and intelligence communities. If you are a security vendor looking to make money in this lucrative sector, this report explains some of the lesser-known government programs that could help you gain entry into the market, as well as the natural technology affinities within the realm of cyber security that will succeed. From an opportunity standpoint, we also explain the potential exits for technology companies and show investors how they can make more money (while taking fewer risks) than ever before. Although this report is primarily US-centric due to the US having the majority of government funding and R&D-backed initiatives in this space, in addition to the largest defense industrial base in the world, many of the recommendations still apply across geographic boundaries.

TABLE OF CONTENTS SECTION 1: EXECUTIVE SUMMARY 1 1.1 INTRODUCTION....................... 1 1.2 KEY FINDINGS........................ 2 1.3 METHODOLOGY....................... 3 SECTION 2: THE CYBER-SECURITY BATTLEFIELD 4 Figure 1: Evolution of Targets by Industry............. 8 SECTION 3: GETTING A SEAT AT THE TABLE 11 3.1 INTERNAL SALES INFRASTRUCTURE............... 11 3.2 TESTING AND CERTIFICATION.................. 11 3.3 GETTING ONTO A GSA SCHEDULE............... 13 Figure 2: Traditional Path for Cyber-Security Market Entry.......14 3.4 OTHER PATHS TO THE GOVERNMENT CYBER-SECURITY MARKET... 14 Figure 3: Paths for Cyber-Security Market Entrance......... 16 Figure 4: DoD ASD(R&E) SBIR Topics.............. 17 Figure 5: BAA Technical Topic Areas...............18 3.5 GOVERNMENT PROCUREMENT.................. 18 SECTION 4: CYBER-SECURITY PRODUCT PACKAGING SUCCESS 20 SECTION 5: CYBER-SECURITY M&A 22 Figure 6: Non-Product Cyber-Security M&A in 2010......... 23 Figure 7: Product-Centric Cyber-Security M&A (January 2002 January 2010)...............24 SECTION 6: NATURAL CYBER-SECURITY AFFINITIES 25 6.1 VULNERABILITY MANAGEMENT AND PENETRATION TESTING...... 25 Figure 8: Pending US Congressional Legislation Pertinent to Penetration Testing................... 27 THE CYBER-SECURITY PLAYBOOK

6.2 FORENSICS AND IR...................... 28 6.3 NETWORK BEHAVIOR ANOMALY DETECTION AND DEEP-PACKET INSPECTION................. 29 6.4 ENTERPRISE SECURITY INFORMATION MANAGEMENT......... 31 6.5 IT GOVERNANCE, RISK AND COMPLIANCE............. 32 6.6 CHANGE AND CONFIGURATION MANAGEMENT........... 34 6.7 INTRUSION DETECTION AND PREVENTION............. 34 SECTION 7: CYBER-SECURITY IMPLICATIONS 38 INDEX OF COMPANIES 41

ABOUT THE 451 GROUP The 451 Group is a technology analyst company. We publish market analysis focused on innovation in enterprise IT, and support our clients through a range of syndicated research and advisory services. Clients of the company at vendor, investor, service-provider and end-user organizations rely on 451 insights to do business better. ABOUT TIER1 RESEARCH Tier1 Research covers consumer, enterprise and carrier IT services, particularly hosting, colocation, content delivery, Internet services, software-as-a-service and enterprise services. Tier1 s focus is on the movement of services to the Internet what they are, how they are delivered and where they are going. 2011 The 451 Group, Tier1 Research and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication, in whole or in part, in any form without prior written permission is forbidden. The terms of use regarding distribution, both internally and externally, shall be governed by the terms laid out in your Service Agreement with The 451 Group, Tier1 Research and/or its Affiliates. The information contained herein has been obtained from sources believed to be reliable. The 451 Group and Tier1 Research disclaim all warranties as to the accuracy, completeness or adequacy of such information. Although The 451 Group and Tier1 Research may discuss legal issues related to the information technology business, The 451 Group and Tier1 Research do not provide legal advice or services and their research should not be construed or used as such. The 451 Group and Tier1 Research shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. Analyzing the Business Better perspective from the top in independent tech research of Enterprise IT Innovation THE CYBER-SECURITY PLAYBOOK