Asia Pacific Security Information and Event Management (SIEM) Market CY 2010. P474-74 March 2011



Similar documents
Asia Pacific (including Japan) Web Application Firewall Market CY2010

Introduction (Contd )

How To Manage Log Management

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N July 2011

World Security Information and Event Management (SIEM) and Log Management Products Market

Global Managed Security Services Market Regulatory Compliance and Advanced Threat Protection Induce Organizations to Outsource Security

2011 Latin American Network Security Markets. N July 2011

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

Network Security Platform MSSP Vendor Rankings

Analysis of the SSL Certificate Market Balancing Certificate Growth with Declining Revenue Growth Rates and Trust. Global

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

Brochure More information from

Cyber Security Market by Solution - Global Forecast to 2020

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Network Security Market in India CY 2014

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Phone: Fax:

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market

Caretower s SIEM Managed Security Services

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Emerging Trends in the Network Security Market in India, CY 2013

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Information Technology Policy

2012 North American Managed Security Service Providers Growth Leadership Award

Asia-Pacific Secure Content Management Market 2012 Stable Growth is Anticipated in the and Web Security Segments

INSERT COMPANY LOGO HERE

nfx One for Managed Service Providers

World Marketing Automation Software Market

What is Security Intelligence?

Strategic Focus Report Enterprise Mobility

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends ( )

Asia Pacific Network Security Markets

2013 Frost & Sullivan Asia Pacific ICT Awards Network Security Vendor of the Year

Analysis of the Worldwide Physical Security Information Management Market. M November 2010

Sample Global Network Security Market. 1 technavio insights

Analyzing Logs For Security Information Event Management Whitepaper

Windows Server 2003 End of Support. What does it mean? What are my options?

Unified Security Management vs. SIEM

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

APAC CRO Market A deep dive into the trends transforming APAC CRO industry. P86A-52 June 2015

World Unified Threat Management (UTM) Products Market. N February 2010

Concierge SIEM Reporting Overview

SIEM and Log Management Global Market Analysis

Q1 Labs Corporate Overview

Is your SIEM ready.???

Information & Asset Protection with SIEM and DLP

GOOD PRACTICE GUIDE 13 (GPG13)

How To Buy Nitro Security

BlackStratus for Managed Service Providers

Brochure More information from

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

Metrics that Matter Security Risk Analytics

Global Web and Mobile Analytics Market Mobile Emerges as a Stand-alone Segment; Predictive Analytics is the Secret Sauce for Monetization

U.S. Contract Research Outsourcing Market: Trends, Challenges and Competition in the New Decade. N8B7-52 December 2010

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Feature. Log Management: A Pragmatic Approach to PCI DSS

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

How To Understand And Understand The Emea Contact Centre Outsourcing Market

Compliance Management, made easy

Global Enterprise Content Management Market Mobile and Cloud Platforms are Driving Widespread Adoption

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Analyzing Logs For Security Information Event Management Whitepaper

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

1. North America CRM Analytics Markets

Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity

IBM Security Intelligence Strategy

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

Global CRM Software Market with Focus on Cloud Applications ( ) April 2016

Analyzing Logs For Security Information Event Management

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology

What is Driving Rapid Growth in the Australian Mobile Advertising Market?

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Global Customer Cloud App Market

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Transcription:

Asia Pacific Security Information and Event Management (SIEM) Market CY 2010 March 2011

Table of Contents Market Definition for Asia Pacific Security Information and Event Management (SIEM) Market CY 2010 7 Market Overview 12 Market Engineering Analysis 18 Revenue Forecasts 23 Geographical Analysis 26 Demand Analysis 35 Competitive Landscape 40 Strategic Recommendations About Frost & Sullivan 44 50 4

List of Figures SIEM Market: Market Drivers Ranked in Order of Impact (Asia Pacific), 2010-2014 20 SIEM Market: Market Restraints Ranked in Order of Impact (Asia Pacific), 2010-2014 21 SIEM Market: Competitive Structure (Asia Pacific), 2010 22 SIEM Market: Competitive Landscape Analysis (Asia Pacific), 2010 41-43 SIEM Market: Trends in Descending Order of Impact (Asia Pacific) 2010 49 5

List of Charts SIEM Market: Market Engineering Measurements (Asia Pacific), 2010 19 SIEM Market: Revenue Forecasts (Asia Pacific), 2009-2014 24 SIEM Market: Percent of Revenues by Geographic Region (Asia Pacific), 2010 27 SIEM Market: Growth Analysis by Geographic Region (Asia Pacific), 2009-2010 28 SIEM Market: Vertical Demand Analysis (Asia Pacific), 2010 36 SIEM Market: Horizontal Demand Analysis (Asia Pacific), 2010 38 6

Market Overview 12

Market Overview Key Highlights The Asia Pacific (APAC) Security Information and Event Management (SIEM) market witnessed a healthy growth momentum in 2010, compared to 2009. Market revenues in the segment grew xx.x percent from 2009, reaching a total market size of US $xx.x million in 2010. The CAGR during the forecast period is expected to hit xx.x percent, as enterprises began to recognize the value and importance that SIEM was able to contribute to their security posture. It is clear that whilst there is a growing relevance and need for a technology like SIEM, current market perceptions towards the technology remain confused in light of the technology s ongoing evolution. The first-generation SIEM technology was mainly designed to reduce the false positives generated by IDS/IPS devices and identify the most critical external threats by using rule-based correlation. In this way, the first-generation SIEM solutions were merely focusing on a subset of firewall and IDS/IPS events that were in violation of policy and helped to detect real attacks. Although the earlier SIEM solutions were effective in solving the big challenge of sorting through excessive false alerts and protect companies from external threats, theses solutions were costly and generally time-intensive and complex in terms of maintenance and management. The second and latter generations of SIEM technology offered capabilities beyond the detection of external threats; these more advanced platforms were also able to provide periodic reports of user activities and create forensics reports, with an emphasis on monitoring user activities rather than simply guarding against external threats. The lack of a clear market position of SIEM, a fact that is further exacerbated by the vendors unilateral approach in positioning the technology segment, as well as the interchangeable usage of terms such as SIEM, Security Information Management (SIM) and Security Event Management (SEM), means that the market remains highly fragmented, with both customers and vendors alike having different versions of what SIEM truly stands for. More importantly perhaps, the growing spotlight on what is essentially an ill-defined market has actually impeded the adoption rate of SIEM solutions across the APAC region. 13

Market Overview (Contd ) In this research service, we have sought to derive a clear definition of SIEM technology, whilst making clear the various myths and erroneous market positioning that have plagued the technology segment. Indeed, the notion of SIEM technology that we have adopted in this study is clearly defined across three main principles, namely, i) ability to collect, transport and store data/log information, ii) ability to aggregate and correlate the unstructured data into intelligence and iii) provide a real-time approach towards security event detection, reporting and remediation. Among these principles, correlation has emerged as the defining characteristic of SIEM technology in the later generations. Correlation establishes relationships between log entries/events that are generated by devices, systems or applications. A major benefit of correlation is that correlation filters out duplicate and redundant data in order to reduce event noise and allow administrators to address high priority issues immediately with the right information to make informed remediation decision. More importantly, correlation is able to intelligently assess the numerous and different threats that are encroaching upon the various access points and potential security loopholes across an enterprise s entire IT setup. In addition, SIEM technology requires the use of a centralized platform whereby all logs/information/events are collected, stored and analyzed across all possible locations and scenarios. The role of a centralized information engine is critical in providing consistency and ensuring all security loopholes are being catered to properly in a SIEM setup. With technology convergence largely characterizing the evolution in the IT security arena, it is no surprise to see growing enterprise demand for a solution providing SIEM capabilities. In many ways, the security intelligence and extensive coverage offered by SIEM across multiple domains and devices puts SIEM in a good position to emerge as a tool for convergence and ensure security synergies are being properly achieved in midst of more security and IT platforms converging together. 14

SIEM Flowchart Unstructured Information Collect Collect Transport Centralize SIM Aspect: With an Emphasis of Storage Capacity Aggregate Normalize Store Analyze Correlate Detect SEM Aspect: With an emphasis of Real-Time Manner Present Report Structured Knowledge 15

SIEM Approach Technology Collection Reporting Aggregation Visibility SIEM Centralization Storage Detection Correlation 16

Development of SIEM Technology First-generation SIEM technology was designed to reduce the false positives which caused by IDS/IPS and help surface the most critical external threats by using rule-based correlation. Second-generation SIEM technology not only detected external threats, but also provided periodic reports of user activities and create forensics reports, with an emphasis on monitoring user activities rather than external threats. Third-generation SIEM technology is being driven by more sophisticated threats, such as cyber-terrorism and insiders, which requires SIEM solutions to be aware of users/identities and detect suspicious or anomalous user behaviors. In other words, the objective is to always provide proactive visibility into threats. 17