IDC - Security : From Pain To Empowerment

Post on 19-Jul-2015

366 views 1 download

Tags:

transcript

An IDC Infographic, sponsored by Blue Coat

Identity and access management; Advanced authentication; Web single sign-on; Enterprise single sign-on; Legacy authorization; User provisioning; Personal portable security devices; Software licensing authentication token; Uni�ed threat management; Intrusion detection and prevention; Virtual private network; Security and vulnerability management; Security information and event management; Proactive endpoint risk management; Forensics and incident investigation; Security device and systems management; Vulnerability assessment...

$20 million1999 Worldwide PC shipments

1999 Worldwide Security Software 2012 Worldwide Security Software

$3.8 Billion $19.3 Billion

2012 Worldwide PC shipments

$371.1 million

43157

644774

2000 2001 2002 2003 2004 2005 2006 2007 2008

$357.4B

$6,884B

DataLossDB.org incidents2004-2007

Worldwide E-Commerce Spending (B2B & B2C) $B

8000

7000

6000

5000

4000

3000

2000

1000

0

Which if any of the following is your company currently using/likely to purchase

or implement during the next 12 months?

Any potential security risks cloud computing or SaaS introduce are

far outweighed by the bene�ts.

Employees using personal smartphones at work understand the risks, and are aware of security proper security practices.

45%33%22%

AGREE

DISAGREE

NEUTRAL

63%23%14%

from pain to empowerment

Antiviral, Firewall, Encryption, Security AAA

Security submarkets tracked by IDC 2013

Security submarketstracked by IDC 1999

I LOVE YOUEmerges

Code Red costs top

$2B

Slammer Worminfects an

estimated 150,000to 200,000 servers

worldwide

How would you describe your mobile device environment?

63%BYOD

37%IT-CONTROLLED

Worldwide cloud revenue ($B)

2012 2013 2014 2015 2016

659 SMARTPHONE SHIPMENTS (M) 1,161

$29B$67B

Employee Monitoring Solutions: 57%Network Admission Control: 57%Data loss prevention: 62%

Complexity of security solutions

Increasing sophistication of attacks

Increasing volume of threats and/or attacks

Web grows as a top threat sourceTop security challenges facing large enterprises over the next 12 months

Top rated enterprise security challenges(a �ve year comparison)

DIFFICULTY SECURING WEB APPS

64%EMPLOYEE

USE OF WEB 2.0

60%

45%45%41%

53%61%63%

2007 2008 2009 2010 2011

Does your organization have a formal documented

security policy?

Yes

65%No35%

Yes55% No

45%

1999 2016Era Before Security Era of Pain Era of Obtrusive Security Era of Empowerment

Cloud, mobile and consumerization disrupt IT. Security empowers business.

Web commerce grows; hackers take notice, mischief turns to theft

Enterprises lock-down infrastructures. Breaches mount.

Not Much Online Commerce, Not Much thinking About Security