STATE OF CLOUD SECURITY IN 2020: DDOS AND WAF2020 Cloud Security Report
intricately.com
To learn more about our platform, visit intricately.com/learnmoreintricately.com
INTRODUCTION
Which trends are driving the growth of DDoS mitigation and WAF products?
Why is unprotected application usage increasing among enterprises?
Who are the leading cloud security providers and how do they compare?
Where are adopters of cloud security solutions located globally?
Which geographies spend the most on cloud security solutions?
2
The global cloud security market is expected to grow from $5 billion USD in 2016 to $13 billion USD by 2022. But despite growing investments in security, unprotected application usage among enterprises is at an all-time high. Only 22% of enterprise applications are equipped to guard against DDoS attacks and other web-based threats.
The 2020 Intricately Cloud Security Market Report unpacks these trends and others surrounding the growth of application security.
Intricately maps and monitors the digital infrastructure of more than 7 million businesses, providing us with a view into tens of millions of deployed applications around the world. This report focuses on two types of cloud security products responsible for protecting these applications: DDoS (Distributed Denial of Service) and WAF (Web Application Firewall). We analyze application usage data collected by Intricately’s Global Sensor Network to answer questions such as:
To learn more about our platform, visit intricately.com/learnmoreintricately.com
TABLE OF CONTENTS
3
4
5
6
7
9
10
11
12
14
17
Methodology
Terminology
Chapter 1: Cloud Security Trends
Attack Surface Areas Are Growing
More Sensitive Business Information Lives in the Cloud
The Barrier to Entry for Cybercriminals Is Diminishing
The Top Tech Spenders Aren’t Prioritizing Security
Chapter 2: The Top DDoS and WAF Providers
Chapter 3: Cloud Security Buyer Demographics
Summary of Analysis
To learn more about our platform, visit intricately.com/learnmoreintricately.com
Intricately monitors the adoption, usage, and spend on 21,000 distinct cloud products and analyzes the digital infrastructure of more than seven million companies worldwide. Using its proprietary Global Sensor Network, deployed in more than 150 points of presence (PoPs), Intricately has a comprehensive view into how organizations deploy, utilize, and invest in their digital products, applications, and ecosystems.
The Intricately data platform powers the go-to-market strategy for some of the world’s leading cloud providers. These organizations rely on Intricately to forecast market potential, prioritize ideal-fit companies, and engage prospects at the right time with the right message.
This report analyzes historical data from 2016 through December 2019 on cloud application security adoption and providers worldwide. The report focuses on DDoS mitigation and WAF solutions visible to Intricately’s Global Sensor Network and does not consider CDN, DNS, and other infrastructure solutions which may be configured to protect against DDoS and other forms of cyberattacks.
METHODOLOGY7 million companies evaluated
DEFINITIONS
Enterprise 1,000+ employees
Mid-Market100 - 1,000 employees
SMB10 - 100 employees
21,000 unique products monitored
4
To learn more about our platform, visit intricately.com/learnmoreintricately.com
TERMINOLOGY
5
A distributed denial-of-service (DDoS) mitigation solution protects servers and networks from DDoS attacks.
DDoS Mitigation
A company’s estimated monthly spend on cloud products and services.
Cloud Spend
A web application firewall (WAF) filters, monitors, and blocks HTTP/S traffic to and from a web app-lication.
WAFA piece of software with access to the public internet.
Application
The totality of a company’s digital presence, including applications, cloud and data center points of presence, and products, which an attacker can attempt to compromise.
Attack Surface Area
An application that uses a DDoS mitigation or WAF solution to stay protected against cyberattacks.
Protected Application
An application that has no pro-tection in place from DDoS or WAF attacks.
Unprotected Application
An application that supports a data analytics use case. Examples include front-end data visualization solutions and end-user analytics that provide insights into end-user behavior ex-perience.
Analytics ApplicationInfrastructure that powers analy-tics applications. Types of big data applications include data warehouses, data processing toolsets, and machine learning frameworks.
Big Data Application
The following terms are referenced throughout the report.
6
CLOUD SECURITY TRENDSChapter 1
intricately.com
To learn more about our platform, visit intricately.com/learnmoreintricately.com
Every app or infrastructure deployment widens a company’s attack surface area* and exposure to cyberattacks. Applications are easier to build and deploy than ever before, which means that the number of exposure points is increasing sub-stantially. A Hiscox study found that 61% of businesses reported a cyber incident in 2019, up from 45% in 2018.
This chart illustrates the relationship between overall application deployments and the rate of applications secured by DDoS mitigation or WAF products. In 2016, applications without protection comprised 84% of total applications. Today, 92% of applications are unprotected. Of the 55.5 million applications Intricately monitors today, only 8% have DDoS or WAF protection.
Source: Intricately Data Platform, Dec 2019Year2016 2017 2018 2019
60M
36M
12M
24M
48M
0
5M
3M
4M
2M
1M
0
The Growth of Protected Vs. Unprotected ApplicationsCumulative total of protected vs unprotected applications (2016-2019)
*Intricately measures surface area by total spend, applications, domains, products, and traffic.
7
TREND #1: ATTACK SURFACE AREAS ARE GROWING
Total Unprotected Applications
Total Protected Applications
TREND #1: ATTACK SURFACE AREAS ARE GROWING
To learn more about our platform, visit intricately.com/learnmoreintricately.com
The growth of unprotected applications has far outpaced the prevalence of applications with WAF and DDoS protections in place. But how do these rates compare across company size?
This chart demonstrates a weak correlation between the size of a company and application security.
The rate of unprotected application development has proliferated among SMBs and mid-market companies. Today, 93% of SMB applications and 92% of mid-market applications do not have DDoS or WAF protection in place.
While small companies often lack the resources to invest in application security, the number of mature organizations putting their customers at risk is alarming. 78% of enterprise applications are unprotected today. As the number of vulnerable applications increases, cybercriminals gain additional entry points to steal private business and customer data.
Source: Intricately Data Platform, Dec 2019
Year 2016 2017 2018 2019
100%
75%
50%
25%
0%
% of Applications Deployed
8
The Percentage of Unprotected Applications Deployed by Company SizePercentage of unprotected applications by company size (2016-2019)
Enterprise Mid-Market SMB
TREND #2: MORE SENSITIVE BUSINESS INFORMATION LIVES IN THE CLOUD
To learn more about our platform, visit intricately.com/learnmoreintricately.com
Cloud application usage has grown by an average of 41% YoY since 2013. And as more companies move data from on-premises applications to the cloud, risk increases. Cloud applications are highly susceptible to DDoS attacks, advanced persistent threats (APTs), and other web-based attacks.
Companies that invest in BI and analytics are moving their data into cloud applications that make them more vulnerable to these data breaches and attacks. Today, there are more than 783K big data applications and 11.9M analytics applications in use among businesses. These applications process and house sensitive information like financial data, customer records, legal documents, and intellectual property — all of which can cripple a business if they fall into the wrong hands.
Intricately helps cloud security companies identify prospects who are using big data and analytics applications and deploying sensitive information — customers in need of security products. Schedule a demo to learn how Intricately can help you target your ideal customer prospects.
The Growth of Big Data and Analytics ApplicationsGrowth of cloud-based big data and analytics applications (2016-2019)
12.5M
10M
7.5M
5M
2.5M
0Total Analytics Applications
800K
640K
480K
320K
160K
0
Total Big Data Applications
Source: Intricately Data Platform, Dec 2019Year2016 2017 2018 2019
9
Cloud computing has paved the way to faster, cheaper technology deployments for companies of all sizes — but cybercriminals also benefit. Spinning up a virtual machine and launching attacks is simpler and less expensive than ever.
According to research by Symantec, poor con-figuration is a top catalyst for most cloud-based security incidents, and numerous free tools exist that identify misconfigured cloud applications on the internet. Unless organizations take action to properly secure their cloud resources, they leave themselves vulnerable to attacks.
Deloitte estimates that a low-end cyberattack can cost just $34 per month and return $25,000. On the business side, the average total cost of a data breach is $3.92 million, according to IBM.
intricately.com
TREND #3: THE BARRIER TO ENTRY FOR CYBERCRIMINALS IS DIMINISHING
A number of factors are to blame for the growing simplicity of cyberattacks:
Larger attack surface area
Rise of sensitive business information stored in vulnerable applications
Low cost of entry
Distributed nature of cloud tools
High return for attackers
10To learn more about our platform, visit intricately.com/learnmore
TREND #4: THE TOP TECH SPENDERS AREN’T PRIORITIZING SECURITY
To learn more about our platform, visit intricately.com/learnmoreintricately.com
Companies with substantial cloud budgets are still deploying unprotected applications, putting their customers, partners, and employees at risk. As enterprises process and store larger quantities of data, they’re deploying BI and analytics applications without proper security configurations in place.
Despite being unprotected, there are scenarios where a company doesn’t need to protect its applications; for example, a company’s applications simply may not be a good target for cybercriminals. Another common scenario is that companies won’t prioritize DDoS & WAF solutions until after it’s too late and an attack has already happened.
Unprotected Applications Deployed By Companies With Cloud Spend
11
Quantity of unprotected applications deployed by companies with estimated cloud spend greater than $20k+/month on technology
*Unprotected applications deployed by companies with an estimated cloud spend of $20K/month.
Source: Intricately Data Platform, Dec 2019Year2016 2017 2018 2019
20M1.5M
12M
8M
16M
0.9M
0.6M
1.2M
4M0.3M
00
Total Unprotected Applications
Total Protected Applications*
12
THE TOP DDOS AND WAF PROVIDERSChapter 2
intricately.com
OVERVIEW: THE TOP DDOS AND WAF PROVIDERS
To learn more about our platform, visit intricately.com/learnmoreintricately.com 13
Total Security Customers
The largest DDoS and WAF providers by total customersWho Are the Top DDoS and WAF Providers?
0 10K 20K 30K 40K 50K 60K 70K 80K
F5
Barracuda
Imperva
Neustar
Fortinet
Cisco
Sophos
Akamai
Check Point
Trustwave
AliCloud
BeeWare
Radware
Source: Intricately Data Platform, Dec 2019
According to data collected by Intricately’s Global Sensor Network, these are the largest WAF and DDoS providers based on total number of security customers.
This report focuses on DDoS miti-gation and WAF solutions visible to Intricately’s Global Sensor Network and does not consider CDN, DNS, and other infrastructure solutions, which may be configured to protect against DDoS and other forms of cyberattacks.
14
CLOUD SECURITY BUYER DEMOGRAPHICSChapter 3
intricately.com
To learn more about our platform, visit intricately.com/learnmoreintricately.com 15
REGIONAL DISTRIBUTION: WHERE ARE CLOUD SECURITY BUYERS LOCATED?
This chart represents the global distribution of companies that have active DDoS and WAF security products deployed. 54% of companies that purchase cloud security products are located in North America.
*Cloud security buyers are defined as companies that purchase and deploy WAF and DDoS products. Source: Intricately Data Platform, Dec 2019
North America 50,860 Security Buyers
Latin America 5,703 Security Buyers
23,040 Security BuyersEurope, Middle
East & Africa
Asia-Pacific 13,939 Security Buyers
HOW MUCH DO COMPANIES SPEND ON CLOUD SECURITY?
To learn more about our platform, visit intricately.com/learnmoreintricately.com 16
Total Customers*
Customer detail by estimated monthly cloud spend tierHow Much Do Companies Spend On DDoS and WAF Solutions?
Source: Intricately Data Platform, Dec 2019
52% of companies that spend more than $100k monthly on WAF and DDoS products are located in North America.
North America 9% 69% 13% 9%
9% 56% 23% 12%
9% 70% 14% 7%
4% 69% 17% 10%
Latin America
Europe, MiddleEast & Africa
Asia-Pacific
*Percentage of customers in each spend tier.
$100K+/mo.
$10K - $100K/mo.
$1k - $10K/mo.
< $1K/mo.
To learn more about our platform, visit intricately.com/learnmoreintricately.com
SUMMARY OF ANALYSIS
Companies that handle sensitive customer data cannot afford to skimp on cloud security. Despite the risks, 78% of enterprise applications remain unpro-tected today. Cybercriminals are constantly inventing new ways to infiltrate cloud applications, making it a persistent challenge for companies to properly secure their cloud resources.
Vendors in the cloud security space need to focus their marketing and sales efforts on the vast majority of enterprises that have already migrated to the cloud, but are not yet comprehensively protecting their application infrastructure, which represents the fastest growing segment of security buyers.
17
intricately.com
KNOW WHERE YOU ARE IN THE CLOUD SECURITY MARKETThe leading companies in cloud security rely on the Intricately platform to focus and accelerate their marketing and sales efforts.
Our customers rely on our products to:
Prospect companies that can use your product immediately
Identify markets with the largest growth opportunity
Forecast and plan territories
Assess performance against competitors
Prioritize efforts on the most qualified opportunities
Get a detailed view into a prospect’s spend potential and product usage
650-600-1834
Contact us at:
18
Schedule a demo to learn how Intricately can help your team engage more prospects, prioritize opportunities, monitor your competition, and more.
intricately.com
ABOUT INTRICATELY
Intricately gives cloud sales and marketing teams an unfair advantage in finding and acquiring new customers, building advanced scoring models, getting proactive notification of sales cycles, spotting churn before it happens, and more.
Our sophisticated data platform provides a detailed picture of your prospects’ cloud products and technology contracts so you can target your ideal buyers when they’re ready to purchase.
Some Of Our Customers
We show you the true spending potential of your target customers.
19