1. Market Research
  2. > Software Market Trends
  3. > Public Vulnerability Research Market in 2014 

Public Vulnerability Research Market in 2014 

  • November 2015
  • -
  • Frost & Sullivan
  • -
  • 106 pages

Public Vulnerability Research Market in 2014 : The Evolving Threat Environment During the Internet of Things Era

The Frost & Sullivan analysis of the global public vulnerability research market in 2014 is part of a series of studies compiled from various public sources to analyze the public vulnerability landscape from 2013 to 2014. Vulnerability data is collected, queried, and segmented, resulting in a wealth of information that is intended to provide qualitative commentary on the research industry and to recognize the most prolific disclosers of new vulnerability reports. The top research companies are interviewed to provide industry and technology trends. Within this analysis, Frost & Sullivan has identified key market trends, competitive analysis, and growth opportunities to quantify and evaluate the public vulnerability research market.

Executive Summary—Key Findings

-software vulnerabilities were reported publicly by research organizations in 2014.

o In 2014, critical vulnerabilities that rated in severity amounted to % of vulnerabilities disclosed, which was down from the % reported in 2013.
o High-severity vulnerabilities accounted for % of disclosed vulnerabilities (down from % percent in 2013).
o Medium and low-severity vulnerabilities represented % and % of vulnerabilities disclosed, respectively in 2014. Highlighting that better security measures with improved time-to-patch rate is helping to improve vulnerability severity ratings in 2014.
o HPE had the most verified vulnerabilities reported with proving the veracity of the HPE Tipping Point contributor program.

-Hewlett-Packard Enterprise (HPE) found critical and high-severity vulnerabilities (vulnerabilities are labeled critical severity if they have a common vulnerability scoring system (CVSS) base score of and rated high severity with a CVSS base score of – ). All other disclosing companies accounted for high-severity vulnerabilities.

- Buffer overflow errors were the most common vulnerability flaw in 2013 and remained so in 2014. HPE found incidents of buffer overflow errors in 2014, followed by Verisign iDefense, which found vulnerabilities related to buffer overflow errors.

- In 2014, the top six applications with the most vulnerabilities were Microsoft Internet Explorer, Oracle Java Runtime Environment, Microsoft Windows, Adobe Flash Player, Apple QuickTime, and Adobe Reader.

- Frost & Sullivan counted vulnerabilities (or % of all vulnerabilities) directly related to Web applications.

- SCADA vulnerabilities increased from in 2013 to in 2014.

- Researchers are looking at more than just network-attached endpoints for vulnerabilities. Web applications and browsers, malware, mobile malware, SCADA, and the Internet of Things are increasingly scrutinized.

- Legacy systems and software that are no longer supported are a major concern for IT departments. On April 14, 2014, Microsoft discontinued its technical support for Windows XP on most devices and all PCs. There are an estimated 300 million PCs actively running on XP.

Source: Frost & Sullivan analysis. NFDF-74 11 Research Obj

Table Of Contents

Public Vulnerability Research Market in 2014 
1 EXECUTIVE SUMMARY

Executive Summary
1. Executive Summary—Key Findings

2 MARKET OVERVIEW

Market Overview
1. Research Objectives
2. Market Overview
3. Market Overview
4. Market Overview
5. Market Overview
6. Market Overview
7. Market Overview—Best Practices Public Vulnerability Disclosing
8. Market Overview—The Evolving Attacker
9. Market Overview—Terminology and Definitions
10. Market Overview—Terminology and Definitions
11. Market Overview—Terminology and Definitions
12. Market Overview—Key Questions This Insight Answers

3 RESEARCH METHODOLOGY

Research Methodology
1. Research Methodology
2. Research Methodology

4 CYBER THREAT ANALYSIS AND REPORTING

Cyber Threat Analysis and Reporting
1. Introduction to Cyber Threat Analysis and Reporting
2. The Internet of Things
3. The Internet of Things
4. The Internet of Things
5. SCADA
6. SCADA
7. Software?Java
8. Malware
9. Malware
10. Malware
11. Mobile Malware

5 MARKET TRENDS IN PUBLIC VULNERABILITIES

Market Trends in Public Vulnerabilities
1. Vulnerabilities Reported by Year
2. Vulnerabilities Reported by Quarter
3. Market Trends
4. Market Trends
5. Vulnerability Disclosure
6. Vulnerability Disclosure
7. Vulnerability Disclosure
8. Vulnerability Disclosure by Organization Type
9. Vulnerability Disclosure by Organization Type
10. Vulnerability Disclosure by Organization Type

6 ANALYSIS OF VULNERABILITIES BY SEVERITY

Analysis of Vulnerabilities by Severity
1. Analysis of Vulnerabilities by Severity
2. Analysis of Vulnerabilities by Severity
3. Analysis of Vulnerabilities by Severity
4. Analysis of Vulnerabilities by Severity
5. Analysis of Vulnerabilities by Severity
6. Analysis of Vulnerabilities by Severity
7. Analysis of Vulnerabilities by Severity
8. Analysis of Vulnerabilities by Severity
9. Analysis of Vulnerabilities by Severity

7 COMPARISON OF TARGETED APPLICATIONS

Comparison of Targeted Applications
1. Targeted Applications
2. Analysis of Targeted Applications
3. Top Targeted Types of Applications
4. Disclosing Institutions: Web Browser Vulnerabilities
5. Disclosing Institutions: Media Applications Vulnerabilities
6. Disclosing Institutions: Server Vulnerabilities
7. Disclosing Institutions: Business Applications Vulnerabilities
8. Analysis of Targeted Applications by Type
9. Analysis of Targeted Applications by Type

8 ANALYSIS OF TARGETED APPLICATIONS BY TYPE (CONTINUED)

Analysis of Targeted Applications by Type
1. Targeted Web Browser Type
2. Targeted Web Browser Type
3. Analysis of Targeted Web Browser Type

9 VULNERABILITY ANALYSIS

Vulnerability Analysis
1. Vulnerability Definitions
2. Vulnerability Definitions
3. Vulnerabilities Reported by Flaw Type 2013
4. Vulnerabilities Reported by Flaw Type (For 2014)
5. Disclosing Institutions: Buffer Overflow Errors
6. Disclosing Institutions: Code Injection Errors
7. Top Impact Type
8. Top Impact Types
9. Analysis of Impact Types

10 COMPETITIVE ANALYSIS

Competitive Analysis
1. Competitive Analysis Verified Vulnerabilities
2. Competitive Analysis Verified Vulnerabilities
3. Competitive Analysis Verified Vulnerabilities
4. Competitive Analysis Verified and Unverified Vulnerabilities
5. Competitive Analysis

11 THE STATUS OF PUBLIC VULNERABILITY REPORTING

The Status Of Public Vulnerability Reporting
1. The Status of Public Vulnerability Reporting
2. The Status of Public Vulnerability Reporting
3. The Status of Public Vulnerability Reporting

12 CONCLUSIONS

Conclusions
1. Conclusions

13 APPENDIX

Appendix
1. Vulnerability Database Sources (for 2014)
2. List of Publications Cited in This Report
3. Legal Disclaimer

14 THE FROST and SULLIVAN STORY

The Frost and Sullivan Story
1. The Frost and Sullivan Story
2. Value Proposition: Future of Your Company and Career
3. Global Perspective
4. Industry Convergence
5. 360º Research Perspective
6. Implementation Excellence
7. Our Blue Ocean Strategy

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
2016 North American Mobile Enterprise Applications

2016 North American Mobile Enterprise Applications

  • $ 10000
  • Industry report
  • October 2016
  • by Frost & Sullivan

Opportunities within Enterprises The overall research objective was to measure the current use and future decision-making behavior toward mobile enterprise applications, including some specific focus on ...

The Analytics software systems: worldwide forecast 2016–2020

The Analytics software systems: worldwide forecast 2016–2020

  • $ 7999
  • Industry report
  • October 2016
  • by Analysys Mason

This report provides forecasts for communications service provider (CSP) spending on telecoms-specific analytics software systems. It provides details of how spending will vary by delivery type, service ...

The Analytics software systems: worldwide market shares 2015

The Analytics software systems: worldwide market shares 2015

  • $ 7999
  • Industry report
  • September 2016
  • by Analysys Mason

"The telecoms industry is increasing its spending on analytics software systems, but not to the extent that we predicted last year." This report assesses which vendors are leading in the analytics software ...


ref:plp2015

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.