Table of Contents
Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology
This research service provides insight into the vulnerability management market, which provides products that scan enterprise network infrastructure and identify and prioritize critical security issues so customers can address them. This global and regional market analysis includes forecasts for 2014-2018. The report details what the leading vulnerability management providers are doing to enhance their platforms. Technology and pricing trends are detailed and key drivers and restraints identified. The key competitors are profiled and main distribution channels and market verticals are forecast. The combined information reveals the market’s key growth opportunities.
•In 2013, the global vulnerability management market reached $X M. At the end of the study period, 2018, the global vulnerability management market will total $X M.
•North America is the largest market globally while APAC is growing the most rapidly.
•Vulnerability Management (VM) platforms are expanding to include secure configurations, log management, predictive analytics, and password authentication.
•The leading vulnerability management solution providers are also incorporating Web application scanning onto their platforms.
•In the last two years, vulnerability management fundamentally changed. The major industry players received money in one form or another. Tenable Network Systems and Rapid7 each received $X million in funding; Qualys issued an IPO, and eEye Digital and nCircle were acquisition targets by BeyondTrust and Tripwire, respectively.
•In terms of year-over-year (YoY) revenue growth over the historical and forecast periods, 2011 is the best at X percent growth.
•Per unit pricing is declining slightly each year in the forecast period, but this is somewhat an illusion as the mix of product categories are changing.
•There are three VM product categories: Software as a Service (SaaS), enterprise software, and appliances. SaaS, in its current form, is the least expensive solution and appliances are the most expensive.
•The price for each product group is edging up every year. However, SaaS is being used more frequently and the average license is moving more toward ROBO and mid-markets.
•Versatility in reporting is a crucial feature in vulnerability management. There need to be reports geared for different audiences: IT teams, the CEO, and auditors.
•Compliance reporting is an important feature set in the United States. However, aside from PCI-DSS, compliance reporting is not as emphasized in Europe or APAC.
•The Affordable Care Act in the United States is a driver of sales.
•The nature of cyber attacks is changing with a higher frequency of attacks directed at smaller businesses.
1. Malicious threats are non-discriminatory; they target businesses of all sizes.
2. Vulnerability management is being integrated with analytics, and configuration and log management.
3. Compliance requirements are a major driver for the purchase of new vulnerability management products.
4. Networks are more complex and BYOD and virtualization require new security postures.
5. Increased attention is being paid to vulnerability threat scoring to quicken remediation.
•Vulnerabilities are defined as errors or weaknesses within a software program that enable an unauthorized user to access sensitive data, gain control, or deny access to authorized users.
•Vulnerability management has evolved significantly from its late1990s origins as simple network scanners.
•Originally, these scanners offered the ability to scan all network-attached endpoints for vulnerabilities and provided long lists of vulnerable systems as well as vulnerabilities within the system.
•Vulnerability management now has much more concise reporting platforms. Ranking vulnerabilities in terms of remediation is an important efficacy aspect of vulnerability management. Nearly all devices and systems will show a vulnerability. This makes vulnerability prioritization important. A security team needs to know which threats should be addressed first. The ability to identify and remediate a threat at its earliest stages prevents the likelihood of an advanced persistent threat in the future.
•Risk and vulnerability prioritization is a key competitive factor among vulnerability management products. Placing the value of prioritization into context, Frost & Sullivan’s study entitled Global Analysis of the Public Vulnerability Research Market showed X software vulnerabilities were reported publicly by research organizations.
•Depending on the size of an organization’s network, a vulnerability scan can uncover hundreds or thousands of issues and alerts. Vulnerability management products must enable IT staff to focus remediation efforts on a combination of most valuable systems and most severe threats.
•Vulnerability management vendors have also expanded product capabilities to scan Web applications, databases, and configurations. This expanding scanning capability is essential as the focus of hackers has shifted from operating systems and server-side vulnerabilities to client-side and application vulnerabilities.
•Vulnerability management vendors are now focusing their product development strategies on new technologies that companies, which rely heavily on Web applications, are beginning to adopt.
•Heterogeneous networks are the norm, not the exception. Networks utilizing multiple operating systems and different types of devices create security management difficulties for the IT department.
•Fear of high-profile security breaches and the introduction of new regulations and technologies have driven customer interest in vulnerability management products.
•Remote office/branch office (ROBO) customers refer to businesses with fewer than X endpoints. This segment includes small office sales.
•Mid-market refers to businesses with X or more endpoints but fewer than X endpoints.
•Enterprise refers to businesses with X or more endpoints but fewer than X endpoints.
•Large enterprise refers to businesses with X or more endpoints.
•The Americas region includes countries in North America, South America, and Latin America.
•The Europe, Middle East, and Africa (EMEA) includes countries in West, Central, and Eastern Europe, the West Asia, and Africa.
•The Asia-Pacific (APAC) region includes countries in South Asia, East Asia, Southeast Asia, and Oceania.
•Products are segmented by Service-as-Software (SaaS), software, and appliance. SaaS is a product category where the customer pays a monthly fee and the vulnerability management solution operates without an agent and is accessed through a Web application.
•Unlike SaaS, software and appliance solutions are both ported onto on-premise servers, also known as on-premise agents. The biggest difference is that an appliance is designed with dense customization and with more rigorous scan criteria.
Key Questions This Study Will Answer
Is the vulnerability management market growing; how long will it continue to grow and at what rate?
Which competitors are leading the market and which are emerging? Which competitors are growing and why?
What are the most important features being added to vulnerability management platforms?
What is the role of reporting? In what market verticals is compliance reporting an imperative?
Which companies have the best practices?
What market segments, regional markets, or vertical markets will have the most growth?
Get Industry Insights. Simply.
Talk to Veronica
+1 718 514 2762
“Demand for actionable insights derived from the ever-increasing data pool of video streams in organizations is one of the major drivers for the growth of the video analytics market” The video analytics ...
“The growing demand for digital signature applications, strategic business processes, and the need for securing transactions are driving the digital signature market” The digital signature market ...
“The increasing risk of terrorism and infiltration is expected to drive the perimeter intrusion detection systems market” The perimeter intrusion detection systems market size is estimated to grow ...