The Internet Security And Intrusion Detection Market



Similar documents
Service Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Managed Security Services for Data

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

Network- vs. Host-based Intrusion Detection

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

How to Choose a Managed Network Services Provider

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Conquering PCI DSS Compliance

Name. Description. Rationale

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Braindumps QA

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

ArcSight Supports a Wide Range of Security Relevant Products

Understanding SCADA System Security Vulnerabilities

AUDIT REPORT WEB PORTAL SECURITY REVIEW FEBRUARY R. D. MacLEAN CITY AUDITOR

Information Technology Policy

Windows Server 2003 End of Support. What does it mean? What are my options?

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Four Top Emagined Security Services

IBM Internet Security Systems

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

PROFESSIONAL SECURITY SYSTEMS

CiscoWorks SIMS(Netforensics)

MANAGED SECURITY SERVICES

Performance Evaluation of Intrusion Detection Systems

This is a preview - click here to buy the full publication

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Digital War in e-business

GFI White Paper PCI-DSS compliance and GFI Software products

HP Application Security Center

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

7 Capabilities Your Software Vendor Should Offer to Support your Business Operations in China.

Architecture Overview

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Firewall Architectures of E-Commerce

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

This document has for purpose to elaborate on how Secomea have addressed all these topics with a solution consisting of the three components:

Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?

NETWORK PENETRATION TESTING

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000

BSA-ISSA Information Security Study Online Survey of ISSA Members

Intrusion Detection Methodologies

How To Protect Your Network From Attack From A Network Security Threat

PCI Compliance: Improve Payment Security

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

State of the Art in CyberSecurity Monitoring

Multi-layered Security Solutions for VoIP Protection

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

Securing Virtual Applications and Servers

McAfee Total Protection Reduce the Complexity of Managing Security

Managed Security Services Portfolio

Microsoft Technologies

DOBUS And SBL Cloud Services Brochure

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

NETWORK SECURITY (W/LAB) Course Syllabus

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Taxonomy of Intrusion Detection System

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

How To Buy Nitro Security

Next Generation IPS and Reputation Services

Driving Company Security is Challenging. Centralized Management Makes it Simple.

McAfee Server Security

INTRUSION DETECTION SYSTEMS and Network Security

Patch Management Policy

Transcription:

The Internet Security And Intrusion Detection Market Serge-Paul Carrasco December 1998 asiliconvalleyinsider.com

Contents 1) The Internet Security Market 2) The Intrusion Detection and Response Market 3) The Market Players in IDS

The Internet Security Market

The Internet Security Market (1) Corporations have invested a total of $67.8 B in data communication products for 1998, but only $1.1 B in network security. For data services, corporations spent $102.9 B with their carriers and only $370 M in VPNs. Source: Datacommunication Magazine. If 100% of Fortune 1,000 are using firewalls, only 40% are using encryption. Source: Forrester Research.

The Internet Security Market (2) $2,000 $1,500 $1,000 $500 Firewalls & Authentification Servers VPNs Services $0 1997 1998 1999 Source: DataCommunication Magazine

The Internet Security Market (3) Bigger networks potentially have bigger holes. But, corporations have not kept their security budgets in sync with their overall IS budgets. Most corporations agree that Internet security should be one of the enabling technologies for business use of the Net.

Why This Slow Start of the Internet Security Market? Internet security is an insurance cost that must be justified in terms of the bottom line. It only when a tragic incident has occurred that threats are taken seriously and budgets allocated. Commercial products are still emerging. Besides firewalls, no other technology has reached the mainstream.

Corporate Security Needs (1) Upgrading current security infrastructure to support e-commerce activities. Implementing remote access without compromising the security of the corporate network. Preventing Insider attacks against corporate systems.

Corporate Security Needs (2) Extending networks to support business partner connections. Employing encryption and key management technology for customer interfacing systems.

The Intrusion Detection and Response Market

The Intrusion Detection Market The IDS market is the latest segment in network and computer security. We estimate that the worldwide market for IDS was $66 M in 1998 (without scanner and services) and grew from 1997 to 1998 by 150%. We expect that this market could reach by year 2002 the size of today s firewall market, which was around $350 M in 1998.

The Market Players (1) ISS 20% 8% 8% 12% 17% 35% Axent Cisco NAI Security Dynamics Others Source: Carrasco & Associates

The Market Players (2) The market is fragmented but with a clear leader: ISS could become as strong in the IDS market as CheckPoint is in the firewall market. Behind ISS, there is no single challenger but a group of companies: Axent, Cisco, NAI and Security Dynamics. We expect Cisco to be number two. Other marginal vendors include: Platinium, ODS and Centrax.

IDS Market Penetration Networkbased IDS Hostbased IDS 0.0% 20.0% 40.0% Still Planning Still Learning Implementing within 6 mos Pilot Implementation Implemented Org-Wide Source: The Sans Institute

Market Risks Present early adopters of IDS tools are likely to accept current technical weaknesses, but not mainstream customers. If products do not lower the complexity and the costs to deploy and manage network security, the market could still be slow to take off or never reach significant size.

Product Weaknesses We believe that current IDS products are leaving significant unfulfilled functionality required for business use. IDS customers will look for higher level of scalability, automation and integration than present tools offer in order to deploy IDS widely in enterprise networks.

The Market Players in IDS

Consolidation of the Players Vendors went through an aggressive consolidation. First start-ups were the Wheel Group, Haystack and Intrusion Detection. Later start-up entrants were Abirnet, Internet Tools and Centrax. With the exception of ISS and Centrax, no other vendor is selling exclusively IDS tools. With the exception of Cisco, all vendors sell only security products.

Results of the Consolidation IDS is becoming more a component of a product portfolio than a product by itself. Security companies such as Axent, NAI and Security Dynamics are positioning themselves as a one stop security shop for encryption, firewalls and IDS. Consolidation is going to slow down innovation, resulting in the opportunity for a second generation of start-ups with more promising technologies to emerge.

ISS: The Leader in IDS (1) ISS leads with 35% market share. Revenues for 1998 were $36M, a 167% increase from 1997. Not profitable yet. Should grow in the next few years from its current market capitalization of $600 M to $2 B. ISS management and marketing is good. Since its inception in 1995, outstanding implementation and execution. Should strengthen its leadership. Built a growing channel and service organization with debt. Expanding R&D with acquisitions.

ISS: The Leader in IDS (2) Started with a vulnerability scanner. Selling mostly now its IDS product lines RealSecure with services. RealSecure console is free. Probes are priced at $9,000. Does not own any technical breakthrough. RealSecure is sniffer-based. Provides host and network-based versions of RealSecure. Seeding RealSecure brand aggressively through partnerships: Checkpoint, Nortel, IBM, Compaq, HP

Cisco: The Most Likely Challenger Acquired IDS technology NetRanger from the WheelGroup in 1998 for $124 M. Now marketing IDS as part of its VPN offering. Selling IDS as a component of a networking hardware sale for large customers. Will never be able to sell sophisticated IDS solutions. Will never provide beyond strictly network-based solution, e.g. IDS for operating systems. Singular feature: NetRanger can change ACLs on IOS.

Axent: The Old Market Timer Merged with Raptor Systems in 1998. Trying to catch up with NAI and Security Dynamics. Was the number one ID vendor with host-based IDS Intruder Alert marketed before as OmniGuard. Lost significant market share to ISS. Acquired start-up Internet Tools in 1999 for $25 M for their network-based IDS ID-Track. Plan to integrate Intruder Alert with ID-Track. Singular feature: ID-Track applies rules specific to a domain.

NAI: One Stop Security Shop Acquired from merger with Network General, CyberCop technology developed under licensing with the WheelGroup. Acquired additional technology WebStacker from purchased of TIS/Haystack. Re-designing CyberCop as an host-based-only IDS (which is going to be very similar to Stacker) and selling it as a component of its active firewall product line which includes firewall, help desk, vulnerability and virus scanners and IDS.

Security Dynamics: One Stop Security Shop Acquired in 1998, Intrusion Detection Inc. for $32.5M whose IDS product was Kane Security Monitor. Kane is a sophisticated IDS for NT hosts only. Like NAI, does not seem yet to have taken advantage of the acquisition and has lost market share to ISS.

Thank you for your attention asiliconvalleyinsider.com