network security - time for a change perhaps?
DESCRIPTION
Frost & Sullivan Analyst Briefing on network security trendsTRANSCRIPT
![Page 1: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/1.jpg)
Network Security- Time for a Change Perhaps?
Aliza Kasim
Research Analyst
ICT Practice, Frost & Sullivan
![Page 2: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/2.jpg)
2
Table of Content
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
![Page 3: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/3.jpg)
3
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
![Page 4: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/4.jpg)
4
ANZ
Politically stable; strong
economy fuelled by primary
industries
Technologically advanced and
savvy region; IT as part of
business strategy
Early adopter of emerging
technologies and high receptivity
to managed security services
model
Japan• Weak Japanese economy,
coupled with recent slate of disasters
• Drive towards advanced technologies; security and virtualization
• Rising emphasis on CAPEX and OPEX value
• Strong focus on branding and client-oriented sales approach
South Korea• Stable political climate, albeit
with economy still recovering• Mature security market and
mindset; highly IT connected society
• Strong local vendors• Competitive replacement market
for security solutions
GCR• Politically stable, coupled with
excellent economic growth potential,
• Massive opportunities in governmental sector
• Competitive landscape with local and global vendors
• Abundance of greenfield opportunities; strong focus on threat research/Web security .
India• Rapidly recovering economic
growth; domestic market continues to expand
• Room for growth in technology adoption
• Rapid drive towards managed services model
ASEAN• Political and economic climate
gradually stabilizing• Disparate levels of security
adoption; immature levels of regulatory compliance
• Less receptive to new technologies; prefer tried/tested methods
• Lower barriers to entry for new market players
Understanding APAC
![Page 5: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/5.jpg)
5
What’s Driving IT Security
Increasing
sophistication
of threatsRegulatory &
Compliance
Maturing customer mindset
Infrastructure
growth and
expansion
Technology Convergence
Source: Frost & Sullivan.
![Page 6: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/6.jpg)
6<GPS>
Network Security MarketHistorical and Forecast Revenue Analysis 2007-2013
1,537.5
1,812.0 1,782.7 1,841.61,988.8
2,216.5
2,470.0
1,165.3
1,346.4 1,303.2 1,343.8
1,447.91,605.4
1,775.3
264.4331.7 351.9 363.6
396.1 447.6 508.1
107.8134.0 127.6 134.2
144.7 163.5186.6
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
2007 2008 2009 2010 2011 2012 2013
Total Network Security Market CAGR (2011-2013): 7.5%
FireWall/IPSec VPN CAGR (2011-2013): 7.0%
IDS/IPS CAGR (2011-2013): 8.7%
SSL VPN CAGR (2011-2013): 8.8%
Note: All figures are rounded; the base year is 2010. Source: Frost & Sullivan
Tota
l Re
ven
ue
(U
S$
Mill
ion
)
Network Security Market in Asia Pacific, 2007-2013
![Page 7: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/7.jpg)
7<GPS>
1,782.7 1,841.6
1,988.8
2,216.5
2,470.0
1,208.9
1,381.4
1,640.5
1,997.5
2,439.1
452.2 522.0 617.0739.6
891.6
81.1 93.4 112.9 140.5 181.0
46.9 60.2 83.9 119.8 167.925.1 37.9 60.6 98.1 153.9
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
2009 2010 2011 2012 2013
Network Security CAGR (2011-2013): 10.3%
MSS CAGR (2011-2013): 20.9%
SCM CAGR (2011-2013): 19.5%
SIEM CAGR (2011-2013): 24.7%
WAF CAGR (2011-2013): 40.7%
DLP CAGR (2011-2013): 59.6%
Note: All figures are rounded; the base year is 2010. Source: Frost & Sullivan
Tota
l Re
ven
ue
(U
S$
Mill
ion
)
Market Forecast for Security Segments in Asia Pacific, 2010-2013
Opportunities in the Security Arena
![Page 8: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/8.jpg)
8<GPS>
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
![Page 9: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/9.jpg)
9<GPS>
Facebook user, forum contributor
The Role of the Individual
Human Individual
Public Domain
Personal Domain
Professional Domain
Employee, mobile worker,
remote user
Home user, website blogger
![Page 10: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/10.jpg)
10<GPS>
What Does This Mean to Enterprises?
Guarding vs Leveraging
Technologies
Security as Business IssueConsumer Trends
Lack of ControlGrowing Threat
Exposure
Evolving Threats
![Page 11: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/11.jpg)
11<GPS>
Paradigm Shift
Infrastructure Security
Gateway vs Endpoint
Static perspective
Defensive approach
Information-centric Security
Data protection
External/Internal viewpoints
Preventive approach
User-centric Security
Application-centric
Dynamic control
Centralized management
![Page 12: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/12.jpg)
12<GPS>
#1 Treat Users as Your Endpoints!
Blurring of responsibilities
Increasingly tech-savvy
Adoption vs Compliance
User education & enforcement
Consumer vs Enterprise
devices
Mobile Computing
![Page 13: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/13.jpg)
13<GPS>
#2 Get Back the Power of Control!
Understanding
Managing
Power of Control
+ =
![Page 14: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/14.jpg)
14<GPS>
#3 It Isn’t Just Defending!
Dynamic Security vs Defensive Security
Proactive vs Reactive
Assess Both External and Internal Threats
Attack Potential Security Loopholes
![Page 15: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/15.jpg)
15<GPS>
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
![Page 16: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/16.jpg)
16<GPS>
The Dynamic Application-Fluent Firewall
Static vs Dynamic
Understands the Application
language
Multi-faceted Converged
Platform
Flexible and Scalable
Centralized Reporting and Enforcement
User Identification
Software Performance Management
![Page 17: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/17.jpg)
17<GPS>
Next Stop: Intelligent Convergence
Network Security
Effective security management requires intelligent interactionbetween the different components
Content Security
Application Security
Endpoint Security
Access Control
Data Security
![Page 18: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/18.jpg)
18<GPS>
The Security Customer of the Future
ScalabilityPerformance
Application-centric
A need for a holistic view towards IT security that caters to multi-faceted
technology and business needs
Convergence
![Page 19: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/19.jpg)
19
Security Trends
Mobile Security
Converged Platform
Forensic & Event Management
Compliance
Virtualized Security
Application-Centric Security
Upcoming Security Trends
![Page 20: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/20.jpg)
20
Source: Frost & Sullivan.
Network Security Landscape in APAC
Mindset Shift in Network Security
Marriage of People, Process & Technology
Get on the Change Bandwagon
![Page 21: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/21.jpg)
21<GPS>
Risk Management
Threat Management
Technology People Process
Moving Towards Risk Management
![Page 22: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/22.jpg)
22<GPS>
TacticalTactical
Aligning security strategy with business strategy
Strategic
Technology, people and processTechnology drivenTechnology driven
IT responsibilityIT responsibility Business + IT shared responsibility
ROI is difficult to measureROI is difficult to measure Easier ROI measurement
Viewing Threats to Assessing Risk
![Page 23: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/23.jpg)
23<GPS>
Failure to approach security at an Organizational level
Reactive and purely technology/product based approach
Treating security as an expense/sunk cost
Failure to integrate people, processes and products
View security as purely a technology & not business issue
1
5
43
2
5 Common Mistakes of Security Management
![Page 24: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/24.jpg)
24<GPS>
Strategizing
Adapting
Controlling
Implementing
Planning
• Business Risk Perspective• Integration into Corporate Governance Framework• People, Process, Technology
• Dynamic Boundaries• Technology-Centric Businesses
• User Empowerment vs User Misuse• Beyond Systems to Individuals
• Intelligent Convergence• Security Platforms• Dynamic, Scalable• Need for Performance
• ‘Security is a process’• Sustaining Manageability• Centralized Approach• Long-term Cost Viability
A Framework for Change
![Page 25: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/25.jpg)
25<GPS>
Value Operationalization
Improving Customer Experiences
Selling Products
Changing the Customer Approach
Mapping SolutionsPrice Competition
IT-centric Business-centricTechnical Discussions
Business Interactions
Listen First, Sell Later
![Page 26: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/26.jpg)
26<GPS> 26
Global Support
Localization
Integrated Solutions
R&D Expertise/ Tech Roadmap
Preferred Partner
Brand Strength
Financial stability
Choosing the Right Vendor
![Page 27: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/27.jpg)
27<GPS>
http://twitter.com/frost_sullivan
Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter
http://www.facebook.com/pages/Frost-Sullivan/249995031751?ref=ts
http://www.linkedin.com/companies/4506
http://www.slideshare.net/FrostandSullivan
![Page 28: Network Security - Time for a Change Perhaps?](https://reader037.vdocuments.us/reader037/viewer/2022110118/5550ade3b4c905fa618b4654/html5/thumbnails/28.jpg)
28<GPS>
For Additional Information
Donna JeremiahCorporate CommunicationsAsia Pacific+603 6204 [email protected]
Carrie LowCorporate CommunicationsAsia Pacific+603 6204 [email protected]
Aliza KasimResearch AnalystICT+603 6204 [email protected]