Date post: | 01-Jun-2015 |
Category: |
Technology |
Upload: | voyager-networks |
View: | 104 times |
Download: | 0 times |
An IDC Infographic, sponsored by Blue Coat
Identity and access management; Advanced authentication; Web single sign-on; Enterprise single sign-on; Legacy authorization; User provisioning; Personal portable security devices; Software licensing authentication token; Uni�ed threat management; Intrusion detection and prevention; Virtual private network; Security and vulnerability management; Security information and event management; Proactive endpoint risk management; Forensics and incident investigation; Security device and systems management; Vulnerability assessment...
$20 million1999 Worldwide PC shipments
1999 Worldwide Security Software 2012 Worldwide Security Software
$3.8 Billion $19.3 Billion
2012 Worldwide PC shipments
$371.1 million
43157
644774
2000 2001 2002 2003 2004 2005 2006 2007 2008
$357.4B
$6,884B
DataLossDB.org incidents2004-2007
Worldwide E-Commerce Spending (B2B & B2C) $B
8000
7000
6000
5000
4000
3000
2000
1000
0
Which if any of the following is your company currently using/likely to purchase
or implement during the next 12 months?
Any potential security risks cloud computing or SaaS introduce are
far outweighed by the bene�ts.
Employees using personal smartphones at work understand the risks, and are aware of security proper security practices.
45%33%22%
AGREE
DISAGREE
NEUTRAL
63%23%14%
from pain to empowerment
Antiviral, Firewall, Encryption, Security AAA
Security submarkets tracked by IDC 2013
Security submarketstracked by IDC 1999
I LOVE YOUEmerges
Code Red costs top
$2B
Slammer Worminfects an
estimated 150,000to 200,000 servers
worldwide
How would you describe your mobile device environment?
63%BYOD
37%IT-CONTROLLED
Worldwide cloud revenue ($B)
2012 2013 2014 2015 2016
659 SMARTPHONE SHIPMENTS (M) 1,161
$29B$67B
Employee Monitoring Solutions: 57%Network Admission Control: 57%Data loss prevention: 62%
Complexity of security solutions
Increasing sophistication of attacks
Increasing volume of threats and/or attacks
Web grows as a top threat sourceTop security challenges facing large enterprises over the next 12 months
Top rated enterprise security challenges(a �ve year comparison)
DIFFICULTY SECURING WEB APPS
64%EMPLOYEE
USE OF WEB 2.0
60%
45%45%41%
53%61%63%
2007 2008 2009 2010 2011
Does your organization have a formal documented
security policy?
Yes
65%No35%
Yes55% No
45%
1999 2016Era Before Security Era of Pain Era of Obtrusive Security Era of Empowerment
Cloud, mobile and consumerization disrupt IT. Security empowers business.
Web commerce grows; hackers take notice, mischief turns to theft
Enterprises lock-down infrastructures. Breaches mount.
Not Much Online Commerce, Not Much thinking About Security