1. Market Research
  2. > Computer Security Market Trends

Network Security Manageability Tools: The Three Phases of Evolution

  • January 2014
  • 17 pages
  • Frost & Sullivan
Report ID: 1941687

Summary

Table of Contents

Introduction

The Internet, as a communication medium, has been evolving. This evolution, unfortunately, has brought with it growth in Internet-based attacks, and corresponding growth in security technologies to fight these attacks. But, with this growth in security technologies, unintended complexity for security professionals has intensified. Described in this study are the factors contributing to security management complexity; why enhanced manageability tools are the right remedy; and the phases through which these management tools will evolve.

A Richer World of Internet-Based Communication

How people interact and communicate via the Internet has changed with social media and other forms of communication, computing, and collaboration. Gone are the days in which a Web browser was used as a one-way tool to obtain information from the Internet; and interactive information was only exchanged via e-mail. Web browsers are now the bi-directional interface for a number of communication channels, including Facebook, LinkedIn, Twitter, Skype, and many others. The growth of Internet communication channels is exacerbated by the proliferation of mobile computing platforms and the corresponding availability of mobile and Web applications, providing a wealth of personal and corporate identifiable information to cyber miscreants.

Increasingly Worrisome Vulnerabilities, Threats, and Attacks

This new world of rich and dynamic Internet-based communication channels has brought with it a host of new vulnerabilities. While each vulnerability is a cause for concern, that concern is greater when the intent of malicious actors is financial gain. Furthermore, with profit as a motive, the actors have become more sophisticated (multi-variable exploits) and stealthier than were the earlier perpetrators of malicious activity, which were driven by the quest for notoriety.
No surprise that information security professionals are feeling the impact.

Increasing Complexity Created by a Multitude of Security Technologies

The increasing sophistication and breadth of threats has driven an evolution in the type and number of security technologies. Among those security technologies are:
- Anti-virus software is used to prevent, detect, and remove malware from client devices such as PCs, tablets, and smartphones.
- Web content security protects users and their organizations from Web-based malware, corporate-unsanctioned content, and malicious URLs.
- E-mail content security filters and strips e-mail of phishing schemes, spam, malicious links, inappropriate images or content, and malware.
- Intrusion prevention systems (IPS) monitor network traffic for malicious activity and provide security professionals with mitigation tools.
- Data loss prevention (DLP) detects and lessens instances of nefarious and unintended outward flow of sensitive data
- Distributed denial of service (DDoS) identification and mitigation technologies provide protection against resource-robbing and Web site-disrupting attacks.
- Encryption encodes data or information in such a way that third parties cannot read it, but authorized parties can.
- Network Access Control (NAC) manages device access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do.
- Stateful inspection and next generation, context-aware firewalls create a barrier between trusted, secure internal network and the Internet.

Network and Information Security Professionals Need Help

The security industry has been commendable in creating new point solutions to address the evolving threat landscape. However, an unforeseen consequence has developed. As the complexity of the threats being combatted increased, the complexity of the security technologies used to combat the threats also increased. Additionally, as the number of security technologies grew, so did management complexity in terms of controls and data. This problem of complexity is further exacerbated by an expanding universe that security professionals are tasked to secure as more organizations supplement their IT resources with cloud services, and employees increasingly access corporate resources through their personal mobile devices—a trend often referred to as bring your own device (BYOD).
The increasing complexity of network and information security is being addressed by security teams that are already overtaxed. In a recent survey conducted by Frost & Sullivan of over information security professionals, percent report that their organizations have too few information security workers.

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 60 Million searchable statistics with tables, figures & datasets
  • More than 25,000 trusted sources
  • Single User License — provides access to the report by one individual.
  • Department License — allows you to share the report with up to 5 users
  • Site License — allows the report to be shared amongst all employees in a defined country
  • Corporate License — allows for complete access, globally.

Ahmad helps you find the right report:

Testimonials

The research specialist advised us on the best content for our needs and provided a great report and follow-up, thanks very much we shall look at ReportLinker in the future.

Kate Merrick

Global Marketing Manager at
Eurotherm by Schneider Electric

We were impressed with the support that ReportLinker’s research specialists’ team provided. The report we purchased was useful and provided exactly what we want.

Category Manager at
Ikea

ReportLinker gave access to reliable and useful data while avoiding dispersing resources and spending too much time on unnecessary research.

Executive Director at
PwC Advisory

The customer service was fast, responsive, and 100% professional in all my dealings (...) If we have more research needs, I'll certainly prioritize working with ReportLinker!

Scott Griffith

Vice President Marketing at
Maurice Sporting Goods

The research specialist provided prompt, helpful instructions for accessing ReportLinker's product. He also followed up to make sure everything went smoothly and to ensure an easy transition to the next stage of my research

Jessica P Huffman

Research Associate at
American Transportation Research Institute

Excellent customer service. Very responsive and fast.

Director, Corporate Strategy at
Ingredion

I reached out to ReportLinker for a detailed market study on the Air Treatment industry. The quality of the report, the research specialist’s willingness to solve my queries exceeded my expectations. I would definitely recommend ReportLinker for in-depth industry information.

Mariana Mendoza

Global Platform Senior Manager at
Whirlpool Corporation

Thanks! I like what you've provided and will certainly come back if I need to do further research works.

Bee Hin Png

CEO at
LDR Pte Ltd

The research specialist advised us on the best content for our needs and provided a great report and follow-up, thanks very much we shall look at ReportLinker in the future.

Kate Merrick

Global Marketing Manager at
Eurotherm by Schneider Electric

Purchase Reports From Reputable Market Research Publishers

Asia-Pacific Network Security Market, CY 2016

  • $ 15000
  • Industry report
  • June 2017
  • by Frost & Sullivan

Government-led Initiatives Setting the Stage for Robust Growth in Security The Asia-Pacific network security market recorded a revenue of $3.13 billion and a year-on-year (YoY) growth of 13.9% in 2016, ...

Next-Generation Firewall Market by Delivery Type, Service, and Managed, Organization Size, Vertical, and Region - Global Forecast to 2022

  • $ 5650
  • Industry report
  • June 2017
  • by MarketsandMarkets

Increasing adoption of BYOD and IoT trend is expected to drive the NGFW market The Next-Generation Firewall (NGFW) market size is estimated to grow from USD 2.39 billion in 2017 to USD 4.27 billion by ...

Sandboxing Market by Component, Delivery Type, Organization Size, Industry Vertical, and Region - Global Forecast to 2022

  • $ 5650
  • Industry report
  • June 2017
  • by MarketsandMarkets

“Increasing sophistication in the attacking techniques is expected to drive the growth of the sandboxing market.” The sandboxing market size is expected to grow from USD 2.90 billion in 2017 to USD ...


ref:plp2014

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.