Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology



Similar documents
2012 North American Managed Security Service Providers Growth Leadership Award

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

Network Security Forensics Global Market

Phone: Fax:

Cyber Security Market by Solution - Global Forecast to 2020

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

The Hillstone and Trend Micro Joint Solution

External Supplier Control Requirements

Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N July 2011

Brochure More information from

Advanced Threats: The New World Order

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Network Security Platform MSSP Vendor Rankings

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Introduction (Contd )

Analysis of the SSL Certificate Market Balancing Certificate Growth with Declining Revenue Growth Rates and Trust. Global

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Combating a new generation of cybercriminal with in-depth security monitoring

Evolving Threat Landscape

NASCIO 2015 State IT Recognition Awards

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

SANS Top 20 Critical Controls for Effective Cyber Defense

2013 Frost & Sullivan Asia Pacific ICT Awards Network Security Vendor of the Year

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

WHITE PAPER: THREAT INTELLIGENCE RANKING

Windows Server 2003 End of Support. What does it mean? What are my options?

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Spear Phishing Attacks Why They are Successful and How to Stop Them

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

Endpoint Threat Detection without the Pain

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

How To Protect A Virtual Desktop From Attack

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

INSERT COMPANY LOGO HERE

SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS

MarketsandMarkets. Publisher Sample

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Delivering Control with Context Across the Extended Network

Akamai Security Products

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Sophistication of attacks will keep improving, especially APT and zero-day exploits

CyberArk Privileged Threat Analytics. Solution Brief

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Opportunities in Healthcare Cloud Market in the US and Europe. Evolving Regulatory Scene Likely to Boost Healthcare Cloud Adoption

Cyber Security on the Offense: A Study of IT Security Experts

Cybersecurity. Are you prepared?

OVERVIEW. Enterprise Security Solutions

Threat-Centric Security for Service Providers

Redefining SIEM to Real Time Security Intelligence

BEST PRACTICES RESEARCH

Introduction to Cyber Security / Information Security

WildFire. Preparing for Modern Network Attacks

The Benefits of an Integrated Approach to Security in the Cloud

Find the intruders using correlation and context Ofer Shezaf

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Discover Security That s Highly Intelligent.

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Analyzing HTTP/HTTPS Traffic Logs

Readiness Assessments: Vital to Secure Mobility

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

UP L13: Leveraging the full protection of SEP 12.1.x

Injazat s Managed Services Portfolio

Cenzic Product Guide. Cloud, Mobile and Web Application Security

High Performance NGFW Extended

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

External Supplier Control Requirements

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Persistence Mechanisms as Indicators of Compromise

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Transcription:

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology An Executive Brief Frank Dickson Research Director Information & Network Security 1

Key Findings Advanced persistent threats (APTs) are necessitating a behavioral approach to detecting malware. Instead of trying to detect malware based on what it is (signature based), behavioral malware detection relies on what the malware does. A network security sandbox is an analysis environment (often virtualized) in which a suspicious program is executed and the behavior of the program is observed, noted, and then analyzed in an automated manner. o This approach is more effective than just looking at the appearance of the executable, because sandboxing goes beyond just the mere appearance of the binary, and observes what the binary does; and, therefore, it is much more conclusive in determining if an executable is malicious. The network security sandbox market represented over half a billion dollars in revenue in 2014, the vast majority of which came from North America. By 2019, the market will grow to $3.5 billion and see a broader geographic revenue distribution. The market is dominated by FireEye, comprising almost two-thirds of 2014 market revenue. The market is seeing flurry of new market entrants as vendors of security platforms augment their solutions with network security sandbox offerings. A combination of network security sandbox features and large market share puts FireEye in the position of clear market leadership. Source: Frost & Sullivan 2

Market Engineering Measurements Total Network Security Sandbox Market: Market Engineering Measurements, Global, 2014 For complete study background and methodology, please see http://www.frost.com/nf0f. Note: All figures are rounded. The base year is 2014. Source: Frost & Sullivan 3

Revenue ($M) Growth Rate (%) Revenue Forecast The market promises strong growth throughout the forecast period. Total Network Security Sandbox Market: Revenue Forecast, Global, 2011 2019 Year Note: All figures are rounded. The base year is 2014. Source: Frost & Sullivan 4

Competitive Analysis Market Share FireEye continues to capitalize on its first mover advantage. Total Network Security Sandbox Market: Percent Revenue Breakdown, Global, 2014 *A list of companies included in Others can be found in the appendix Note: All figures are rounded. The base year is 2014. Source: Frost & Sullivan 5

Sandbox Capabilities Competitive Landscape FireEye is the clear market leader. Competitive Landscape Total Network Security Sandbox Market: Global, 2014 FireEye Emerging Competitor Market Challenger Market Leader Market Penetration Source: Frost & Sullivan 6

Market Engineering Methodology One of Frost & Sullivan s core deliverables is its Market Engineering studies. They are based on our proprietary Market Engineering Methodology. This approach, developed across the 50 years of experience assessing global markets, applies engineering rigor to the often nebulous art of market forecasting and interpretation. A detailed description of the methodology can be found here. Source: Frost & Sullivan 7

About the Author Functional Expertise Over 18 years of research experience in the security, mobile, wireless, telecomm, multimedia, computing and semiconductor sectors. - Built client relationships with market leaders across many sectors - Launched two research practices; turned three research practices to profitability - Predicted Mega Trends that changed the nature of industries, such as - The impact of Windows95 on the PC industry - The migration of ASSPs to standard semiconductor devices that supported categories of applications - The use of Flash-based SSDs in portable computing devices Frank Dickson Research Director Frost & Sullivan North America Scottsdale, AZ Primary Research Domains Industry Principal on IT and Information Security market strategies, business opportunities, and technologies What I bring to the Team Over 20 years of experience in the TMT (Technology, Media, Telecomm) space Broad functional expertise including analysis, sales, consulting, and management An ever broadening portfolio of subject expertise and industry connections Career Highlights Delivered innovative research solutions as Vice President of Research, Mobile & Wireless with In-Stat (The NPD Group); Chief Research Officer with MultiMedia Intelligence; Principal Analyst, TMT with isuppli; Vice President of Research, Multimedia with In-Stat (Reed Business Information); and Senior Analyst for the Semiconductor Industry Product Manager with SpeedFAM Corporation, a semiconductor and hard disk drive capital equipment provider Education Master of International Management with Distinction, Thunderbird School of Global Management, Glendale, AZ Master of Business Administration from Arizona State University, Tempe, AZ USA Bachelor of Science Cum Laude, Operations/Production Management from Arizona State University, Tempe, AZ Source: Frost & Sullivan 8

About Frost & Sullivan Information and Network Security Research Programs Frost & Sullivan's Network Security Research and Consulting practice provides global industry analysis, custom consulting, growth consulting and market research & forecasts that help your firm grow. 9 Market Analysis: Information & Network Security Advanced Persistent Threats (APT) Detection and Mitigation Distributed DoS (DDoS) Attack Mitigation Endpoint Protection and Security Network Forensics Identity & Access Management (IAM) Intrusion Detection and Prevention Systems Managed and Professional Security Services Network Access Control (NAC) Public Vulnerabilities SIEM and Log Management SSL Certificates Strong Authentication Unified Threat Management and Next-Gen FW Vulnerability Management Web and Email Content Filtering Web Application Firewall (WAF) Strategic Analysis: Stratecast Secure Networking Examination of market dynamics Creation and presentation of market dimensions Examination of market participants strategic movements Creation and presentation of market growth recommendations Advanced Threat Detection and Mitigation Cloud Security Desktop Virtualization File Sharing and Synchronization Hardware-embedded Security Identity and Access Management (IAM) Identity Assurance and Strong Authentication Network Security Usability Secure Containerization and MDM Secure Software Development Software Defined Networking (SDN) Tokenization 9