NetFinder Insight Series - Network Security



Similar documents
Rhetorik Salesforce CRM Services Product Overview

Global Endpoint Security Market

Rhetorik Salesforce CRM Services Product Overview

Global Security Software Market

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Global Antivirus Software Package Market

Global Enterprise Network Firewall Market

Global Security Testing Market

Strategic Focus Report Enterprise Mobility

Global Network Security Appliance Market

Encryption Market by Deployment Type, Industry Vertical, and Region - Global Forecast to 2020

Data Center Security Market by Solution, by Services, by Data Center Types and by Region - Global Forecast to 2020

Full version is >>> HERE <<<

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N July 2011

Sample Global Network Security Market. 1 technavio insights

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

Debt advice services in the UK. A snapshot of demand and supply

Global Encryption Software Market

Cyber Security Market by Solution - Global Forecast to 2020

Skills & Demand in Industry

Brochure More information from

The AGR Graduate Recruitment Survey 2015

Middle East Cloud Infrastructure Services Market by Services, by Deployment, by Countries - Forecasts and Analysis ( )

Middle Eastern Managed Services Market Emerging Opportunities in the Managed Services Market

Statistical Bulletin. Business Demography, Headlines figures. Summary

Global Information Security Products and Services Market

Healthcare AV Vertical Markets. Corporate Education Government Retail Hospitality. Venues. Global End-User Perspective

MarketsandMarkets. Publisher Sample

News consumption in the UK: 2014 Report

Global Cyber Security Market Forecast and Opportunities, 2020

- This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market.

DATA CENTER NETWORKING MARKET

Key players in the market include Oracle, Sage, Netsuite Inc., IBM Corp., Microsoft Corp., SAP, Infor, Totvs, Unit4 and Syspro among others.

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

Application Delivery Controllers (ADC) - Global Strategic Business Report

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019

Detecting a Hacking Attempt

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends ( )

Symantec Security Information Manager Version 4.7

Creative Skillset Employment Census of the Creative Media Industries

Citizen Machinery UK Ltd

Fully supported Antivirus software (Managed Antivirus)

Phone: Fax:

Time for change in facilities management. Interserve, Sheffield Hallam and i-fm facilities management research 2013

The growing demand for a centralized system for the management of academic processes is expected to drive the cloud computing in education market

The Burden of Financial and Property Debt, Great Britain, 2010 to 2012

Global BYOD Security Market

Understanding the Total Cost of Ownership for Endpoint Security Solutions. A TCO White Paper

Investigation into the use of Microsoft SharePoint in Higher Education Institutions

Brochure More information from

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Security Industry Market Share Analysis

DIGITAL SMEs: OPPORTUNITIES FOR CSPs PROVIDING SOCIAL, MOBILE, ANALYTICS AND CLOUD SERVICES

The Size and Health of the UK Space Industry

Chamber SME E-Business Survey 2002

MarketsandMarkets. Publisher Sample

How To Understand And Understand The Emea Contact Centre Outsourcing Market

2016 Firewall Management Trends Report

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

E-commerce and information and communication technology (ICT) activity, 2008

Global Security Services Market

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Strategic, User-Driven, and Managed: The Future Of Unified Communications and Collaboration Executive Summary

Global Threat Intelligence Security Market

Aaron Andrews Recruitment

Sample-Global Telepresence Equipment

Introduction (Contd )

Procurement of call-off contract from SASPAC s Framework Agreement.

Inbound Marketing. Research Summary Report. Reaching the Next Level of Marketing Performance

Reducing Downtime Costs with Network-Based IPS

Analysis of the Web Application Firewall Market

MarketsandMarkets. Publisher Sample

Transcription:

NetFinder Insight Series - Network Security Market Snapshot Report 26/09/2012 Version: 1.0

NetFinder Insight Series - Network Security Released by: Research Document Number: MDMS-117-996 Author: Clair Lester Version: 1.0 Issued by: Rhetorik Solutions Ascot House Finchampstead Road Wokingham RG40 2NW United Kingdom UK Registered No. 2958622 Copyright Rhetorik Limited (2012) All rights reserved Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page I

Table of contents 1. INTRODUCTION... 1 2. RESEARCH METHODOLOGY... 1 3. PROFILE OF END-USER ESTABLISHMENTS... 2 3.1 Profile by Geographic Region... 2 FIGURE 1: REGIONAL BREAKDOWN... 2 3.2 Profile by Vertical Market... 3 FIGURE 2: VERTICAL MARKET BREAKDOWN... 3 4. ANTI-VIRUS SOFTWARE... 4 4.1 Sites using Anti-virus Software... 4 4.2 Anti-virus Software Supplier Market Share... 4 FIGURE 3: ANTI-VIRUS SOFTWARE SUPPLIER MARKET SHARE... 4 4.3 Anti-virus Software Products In Use... 5 5. FIREWALLS... 5 5.1 Sites using Firewalls... 5 5.2 Firewalls Supplier Market Share... 6 FIGURE 4: FIREWALL SUPPLIER MARKET SHARE... 6 5.3 Firewalls Products in Use... 7 6. INTRUSION DETECTION... 8 6.1 Sites using Intrusion Detection... 8 FIGURE 5: USERS OF SECURITY INTRUSION DETECTION... 8 6.2 Intrusion Detection Supplier Market Share... 10 FIGURE 6: INTRUSION DETECTION SUPPLIER MARKET SHARE... 10 6.3 Intrusion Detection Products in Use... 11 FIGURE 7: INTRUSION DETECTION PRODUCTS IN USE... 11 7. ABOUT RHETORIK SOLUTIONS... 12 8. NETFINDER INSIGHT SERIES MARKET SNAPSHOT REPORTS... 12 9. WHAT SHOULD I DO NEXT?... 12 Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page II

1. Introduction Welcome to the first of Rhetorik Solution s new series of Snapshot reports based on analysis of a sample of research data collected through the ongoing NetFinder continuous research programme. This report Network Security provides a summary analysis of a range of key software categories used within these organisations, and the sample was drawn from a base of more than 25,000 end-user establishments. The analysis for each category is drawn from a subset of the available data. A similar report covering servers and security was produced by Rhetorik in 2006/7 which will be drawn upon for comparison. An outline of the research methodology applied in the NetFinder research programme is given in the next section of this report, followed by a profile of the end-user establishments covered in the research. The subsequent sections of this report contain summary analysis of research covering anti-virus software, firewalls and intrusion detection, to provide insights into the current user-base of key security offerings in the UK and Ireland. 2. Research Methodology Rhetorik Solutions dedicated team of NetFinder telephone researchers continuously monitor the products and services used by more than 25,000 ICT end-user sites in the UK and Ireland. The research focuses primarily on ICT decision-making establishments with more than 20 PCs on site. The inclusion of all vertical market sectors ensures coverage of all major ICT investment. The team collects and regularly updates information on the use of a broad range of products, services, brands and suppliers at each site, as well as maintaining information on the core details such as site name, address and key contact details. This is probably the most comprehensive and up-to-date continuous tracking survey of the ICT end-user base in these countries today. Every effort is made to call each site at least every 6 months to ensure that core information is up-to-date, and the team is tasked with gathering and updating full technical profile details on an annual basis The information is gathered by our researchers through primary research, mainly by application of a structured questionnaire using computer-aided telephone interview (CATI) techniques. An online survey is used when specifically requested by a respondent. Technical details are gathered from key ICT decisionmakers at each site, typically IT and Telecoms managers and other senior staff directly responsible for purchasing and implementing the actual products and services in use. The research data is held in a comprehensive database that can be used by Rhetorik Solutions analysts for ad-hoc analysis of products, services and suppliers in use as well as for tracking of the uptake of these same products, services, suppliers and brands over time. The data in this report is from sites profiled within the last three years. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 1 / 12

3. Profile of End-user Establishments This chapter provides a summary profile by geographical region and key vertical market sector for sites extracted from the NetFinder continuous research programme and used as the basis for top level analysis in this report. 3.1 Profile by Geographic Region 93% of the IT and Telecoms end-user sites analysed were based in the UK, with the remaining 7% in the Republic of Ireland. The regional profile of these user establishments is given in Figure 1. Figure 1: Regional Breakdown Regions Scotland South West 4% East 4% Northern Ireland 2% Wales 3% Channel Islands 0% London 18% Republic of Ireland 7% Midlands 14% South 9% North East 10% Home Counties 11% North West 12% Question: Location of site (single response) Base: Responses - 25,421 Source: Rhetorik 2012 The chart illustrates a broad sample distribution across all regions of the UK. The user-base for these technologies is clearly well-distributed throughout the country. The 7% of sites based in the Republic of Ireland are mainly concentrated around Dublin and in the South- West of the country. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 2 / 12

3.2 Profile by Vertical Market By vertical market sector, the ICT end-user base is distributed across all sectors of the economy. Figure 2: Vertical Market Breakdown Vertical Market Sectors Banking & Finance Wholesalers 3% Food & Bevarage 3% Others 17% Services 23% Metal 3% Retail 3% Transport 4% Electronics 4% Construction Healthcare IT Government Education 14% Question: Vertical market group (single response) Base: Responses - 25,448. Source: Rhetorik 2012 Services and Education have the largest market share with 23% and 14% respectively. These are followed by a broad distribution of different market sectors such as Government, IT, Healthcare and Contruction. Significant sectors in the Others sector include the publishing, mechanical, mineral and telecomunications industries. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 3 / 12

4. Anti-virus Software In this chapter we explore the application of anti-virus software across the sample. 4.1 Sites using Anti-virus Software Sites were first asked if they used any anti-virus products. Anti-virus software is almost universally applied in a business environment today. Across the entire sample only 4 respondents said that they had no such software in use, and only 2 respondents were unwilling to divulge whether or not they use it. Recently IT managers have become more open about some aspects of their core network security, and more willing to divulge their use of this software with nearly a third (28%) of the base now providing details on the AV software in use. In 2006 9% of respondents would not disclose this information or claimed not to know. 4.2 Anti-virus Software Supplier Market Share Those using anti-virus products were further questioned regarding the supplier in use. An analysis of these suppliers and their share (in terms of mentions in use) is given in Figure 3. Figure 3: Anti-virus Software Supplier Market Share Anti-Virus Software - Supplier Market Share Sophos McAfee Symantec Trend Micro Kaspersky Lab Microsoft ESET Computer Associates 2% 3% 3% 23% 2 2 Other 0% 10% 1 20% 2 30% Question: Who are the suppliers of the Anti Virus Software you use on site? (multiple response) Base: Responses - 7,192 reported mentions of suppliers in use. Source: Rhetorik 2012 Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 4 / 12

McAfee, Sophos and Symantec were clearly the dominant suppliers of the anti-virus software currently in use. Those 3 suppliers have more than 74% of the market share and were also the dominant three suppliers in 2006. However McAfee s market share of the installed base has declined from 33% in 2006 to 2 in 2012. The Eastern European suppliers ESET and Kaspersky Lab have risen from nowhere over the past 6 years and now have a substantial foothold in the market. 4.3 Anti-virus Software Products In Use User organisations were also asked about the specific products in use. However, it is clear that in this market users were much more likely to know the suppliers of this software than the names of the actual products installed. Interestingly, Norton Antivirus was the most frequently mentioned product name, which perhaps says something about the strength of recall of this Symantec product name in the minds of its users. This may have been influenced by its distinctive branding, packaging and pre-installation to PCs over the past two decades. 5. Firewalls This chapter analyses the use firewalls across the IT/Telecoms user base. 5.1 Sites using Firewalls Sites were asked about their application of a firewall. As with anti-virus software, firewalls are almost universal in use within the business world. Less than 0.1 % of sites declared that they did not have a firewall protecting their network. Uncertainty was very low with only a similarly very low proportion not willing to divulge this information or unable to confirm. Again, following the pattern with anti-virus software, users were now much more willing to disclose their use of this software than when we analysed the user base in 2006. At that time, although only 2% reported nonuse of firewalls around 27% of all IT managers were not prepared to disclose the information or were unable to confirm. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 5 / 12

5.2 Firewalls Supplier Market Share Details of the firewall suppliers in use and their share (in terms of mentions in use) are provided in Figure 4. Figure 4: Firewall Supplier Market Share Firewall Supplier Market Share Cisco Centrally Managed Check Point Juniper SonicWALL Watchguard ISP Managed Microsoft 11% 17% 24% Other 22% 0% 10% 1 20% 2 Question: Who are the suppliers of the network Firewall(s) you use on site? (multiple response) Base: Responses - 6,730 reported mentions of suppliers' in use. Source: Rhetorik 2012 Cisco has remained the dominant firewall supplier with 24% of the market share; this percentage has remained fairly stable since 2006 when it was 2. However, Check Point s share of the user base has dropped from 21% in 2006 to 11% currently. Interestingly, the percentage of respondents with centrally managed firewalls has increased substantially since 2006 (from 9% to 17%). This category includes educational establishments whose firewalls are managed by the Local Educational Authority, as well as those managed by County Councils and at corporate head offices. Firewalls externally managed by an ISP have also increased in prominence. In 2006 only 1. of users in our sample reported an ISP managed firewall but that proportion has now increased to of the total. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 6 / 12

5.3 Firewalls Products in Use When questioned about specific products in use, recall of brands was again much stronger than product names. Responses included a mix of product and brand names, but the Cisco PIX and ASA product offerings were significant amongst them and clearly exhibited strong recall amongst their users. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 7 / 12

6. Intrusion Detection The final chapter of this report provides a summary analysis of the use of intrusion detection network security. 6.1 Sites using Intrusion Detection IT managers and other senior staff were asked about the use of intrusion detection security within their networks. Figure 5: Users of Security Intrusion Detection 90% 8 Sites Using Intrusion Detection 80% 70% 60% 2006 2012 50% 40% 34% 37% 30% 20% 13% 17% 12% 10% 0.70% 0.20% 0% Users Non-users Did not know Would not divulge Question: Do you use Intrusion Detection security on your network? (single response) (Note: "Did not know" and "Would not divulge" includes respondents unable or unwilling to divuldge name of supplier) Base: Responses 2006-8,245 Base: Responses 2012-5,910 Source: Rhetorik 2012 Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 8 / 12

The use of intrusion detection has increased significantly since the last report. In 2006 only 34% of respondents confirmed they were using intrusion detection, whereas now 8 definitely are. Respondents have become more comfortable with disclosing their use of intrusion detection in the intervening period. In 2006, 29% of respondents either did not know or were unwilling to divulge if they were using it; this figure has now dropped to less than 1%. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 9 / 12

6.2 Intrusion Detection Supplier Market Share Named suppliers at a significant sample of user sites are given below. Figure 6: Intrusion Detection Supplier Market Share Intrusion Detection - Supplier Market Share Centrally Managed 23% Cisco 21% Check Point 9% ISP Managed Juniper SonicWALL Watchguard Microsoft Fortinet Symantec McAfee Other 2% 2% 2% 4% 1 0% 10% 1 20% 2 Question: Who are the suppliers of the Intrusion Detection Software you use on site? (multiple response) Base: Responses - 5,245 reported mentions of suppliers in use. Source: Rhetorik 2012 The largest group of responders stated that their intrusion detection was managed centrally. This was usually managed at the firm s head office, or by the Local Educational Authority or County Council in the case of education or local government establishments. Centrally managed intrusion detection was also important when analysed in 2006, but has increased in the intervening period from 17% to 23% of the user base. ISP Managed has also grown significantly over this period, from 1.3% in 2006 to of current users. As with firewalls the key suppliers for the installed base of intrusion detection were Cisco and Checkpoint. This was also the case in 2006. However, whereas Cisco has maintained its position the significance of Checkpoint appears to have diminished somewhat over the past 6 years (falling from 17% of mentions in the user base to 9% today). Juniper has increased its market position, from less than 2% in 2006 to in the current analysis. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 10 / 12

6.3 Intrusion Detection Products in Use An analysis of respondent product recall for Intrusion Detection in use is given in Figure 11. Figure 7: Intrusion Detection Products in Use Intrusion Detection - Products in Use PIX Check Point ASA NetScreen ISA Server Firebox FortiGate Symantec McAfee Other 3% 4% 4% 9% 9% 9% 1 1 2 0% 10% 1 20% 2 30% Question: Which Intrusion Detection Products do you use on site? (multiple response) Base: Responses - 3,139 reported mentions of products in use. Source: Rhetorik 2012 As can be seen from the above, the response was a mixture of specific products and brand names for different suppliers. These results show some consistency with the supplier analysis, in that Cisco (PIX and ASA), Checkpoint and Juniper (Netscreen) are the most prominent. The shares do not correlate however and the respondent base is lower, as many respondents were unable to recall the specific product names in use. The researchers have reported a trend away from PIX towards ASA in recent years, and Cisco will end their support of the older PIX product in 2013. As with the other types of network security, brand is much stronger than product recall in this market, and the analysis only serves to identify those products that are best known by their user base. Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 11 / 12

7. About Rhetorik Solutions Rhetorik Solutions delivers market intelligence and market research services focused exclusively on the IT and Telecoms industries. To meet the challenges of these fast-moving and highly competitive markets our clients need a consultancy that truly understands the issues and concerns that drive them. With an in-house team of highly trained researchers working exclusively in these markets, we have a particular focus on end user research and employ a range of quantitative and qualitative research techniques including: Face-to-face Interviews Focus Groups Telephone Interviews Web-based Surveys Research Panels to provide a unique portfolio of research services. Rhetorik Solutions is part of Matrix Solutions www.matrixsolutions.co.uk and are also a founder member of the EMIG (European Market Intelligence Group) www.emi-group.com. 8. NetFinder Insight Series Market Snapshot Reports Rhetorik will be releasing a new series of these snapshot reports over the coming months that will include analysis and insight within the following ICT segments: Network Security PCs & LAN Servers & Operating Systems Key Business Applications WAN & Telecoms providing you with powerful insights to help market your company s solutions more effectively. 9. What should I do next? For more details about our NetFinder ICT Marketing Database or Business Intelligence & Research Solutions, please visit http://www.rhetoriksolutions.co.uk or contact Rick Paskins, Group Research Director on +44 (0)1189 898580 or at mailto:rpaskins@rhetoriksolutions.co.uk Rhetorik Solutions Telephone: +44 (0)1189 898580 Ascot House Fax: +44 (0)1189 898590 Finchampstead Road Wokingham Berkshire RG40 2NW United Kingdom Date: 26/09/2012 MDMS-117-996 Version: 1.0 Page 12 / 12