Frost.com - Network Security Research http://www.frost.com/c/10402/home.do http://www.frost.com/c/10402/home.do - Network Security Research Frost & Sullivan Innovations in IoT Security, Network Security, and Cloud Security http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-1A-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-1A-00-00 This Cyber Security TOE provides a snapshot of the emerging security solutions for application areas such as connected devices, BYOD, smart cities, smart homes, and industrial networks that help companies mitigate threats and defend against modern attacks residing within cloud, endpoints, and various network layers. Cyber Security TechVision Opportunity Engine (TOE) s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. TechVision Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile & wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Key words: IoT security, BYOD security, smart home security, identity and access management, adaptive security, device management, endpoint security, network security, cloud security Fri, 2 Feb 2018 00:00:00 +0000 Global Bot Risk Management (BRM) Market Analysis, Forecast to 2022 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K246-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K246-01-00-00-00 The term "bot" evokes top-of-mind and longstanding cybersecurity concerns, from DDoS attacks and spam to fraudulent and nefarious activities. But the bot ecosystem is much more complex, encompassing a wide variety of bots including search engine crawlers, bots operated and used between business partners, and bots that operate in a legally or ethically grey area. While sophisticated credential stuffing bots introduce the concept of bot risk to many businesses, many others are awakening to the need for comprehensive bot management solutions capable of addressing the entire bot ecosystem. The Bot Risk Management (BRM) market has emerged in recent years as a critical new cybersecurity control point for online enterprises of all sizes. This market analysis establishes the scope of the market, and provides insights into sales trends, drivers, restraints, challenges, and key competitors. Wed, 31 Jan 2018 00:00:00 +0000 Analysis of the North America Managed & Professional Security Services Market, Forecast to 2021 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K1F4-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K1F4-01-00-00-00 The North American managed and professional security services market totaled $7.2 billion in 2016 and is projected to increase at double-digit rates annually almost throughout the entire forecast period. The increasing volume, diversity, and sophistication of cyber threats aimed at a broadening exposure footprint, and the mounting severity of direct and indirect implications attributed to inadequate or outdated security practices, plus challenges of in-house staffing and adaptation are durable contributors to market demand. The competitive landscape is highly diverse with providers from a myriad of backgrounds. The largest competitors, as measured by revenues, are firms with a deep history in serving the government and consulting firms. Their revenues are concentrated in professional security services. Next, with a mix of managed and professional security services, the fewer in number but sizable individually pure-play security service providers constitute the next tier. Much greater in number, communication service providers (telcos), security product vendors, local and regional IT services firms, cloud management providers, and managed Security-as-as-Service (SECaaS) providers round out the competitive landscape. Competition among providers will intensify, compelling providers to ratchet upward their investments in technological innovation, sales & marketing, and strategic acquisitions. Simultaneously, pricing pressure will intensify as will client expectations for tangible demonstrations of security services essentialness and business return. The managed and professional security services market is a high growth, dynamic market. The number and variety of competitors continue to increase. Consequently, the competitive playing field is intensifying. Although numerous durable factors driving market demand are present, there are also other factors that will dampen demand. For example, self-service, automation, containerization, and standardization, hallmarks of cloud services, will reduce market opportunities as organizations, justifiably or not, gain a stronger sense of prowess in cyber risk management with their cloud deployments. In turn, this segment of demand for managed and professional security services will not reach the level of security services demand in non-cloud environments. Profitability for service providers will also become more difficult to maintain as honing "means to serve" is an ever-present expenditure. Innovating through use of advanced technologies, building and re-building intellectual property, and marketing and sales investments must continue to remain a relevant provider. Also, like their clients, managed and professional security service providers confront the same challenging and expensive staffing issues (e.g., wage increases, periodic training, and retention). Finally, security services clients expect tangible results and outcomes that demonstrate they are receiving a favorable return on their expenditures on managed and professional security services. As with any fixed-term service arrangement, each service provider is at risk of not having its contract renewed, being replaced by another provider, or not considered for additional service engagements. Earning customer trust and appreciation must be a top priority in order to thrive as a managed and professional security service provider. In Analysis of the North America Managed & Professional Security Services Market, Forecast 2021 - Expansive Market Opportunities, But Competition Looms Large, Frost & Sullivan delves into the drivers and restraints of the managed and professional security services market, estimates its current size and forecasts its growth, and adds color to the competitive landscape. Tue, 30 Jan 2018 00:00:00 +0000 Innovations in Biometrics, Data Security, Machine Learning, and Cloud-based Security http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-19-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-19-00-00 This Cyber Security TOE provides a snapshot of the emerging security solutions based on machine learning, biometrics, and other new technologies that help companies mitigate threats and defend against modern attacks residing within cloud, endpoints and various network layers. Cyber Security TechVision Opportunity Engine (TOE) s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. TechVision Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile & wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Key words: Behavior analytics, multi-factor authentication, machine learning, deep packet inspection (DPI), cognitive computing, multi-layered threat detection, biometrics, contactless bio-sensing technology, mobile threat detection Fri, 5 Jan 2018 00:00:00 +0000 Technologies Impacting the Future of Cybersecurity http://www.frost.com/prod/servlet/sublib/display-report.do?id=D7D8-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D7D8-01-00-00-00 The growing number of cyber attacks and cyber crimes has resulted in compromise of data important computing and resources, and network outages. With the implementation of information and communication technologies (ICT) in almost every sector, attacks have been increasing at an alarming rate. Penetration of the connected ecosystem is further increasing the loopholes and increasing the attack surfaces for cyber attackers. The need for efficient cyber security solutions is evident in every sector. This research service identifies the key technology development areas within cyber security space and explores the benefits of such technology development. The report also highlights the key developers in the identified technology segments to give an overview of the technology advancements. In brief, this research service provides the following: A brief snapshot of the benefits of implementation of cyber security solutions Key challenges faced by organizations with respect to cyber security The key technology trends in cyber security space Potential of the technologies to address the existing challenges in the cyber security space Key participants under each of the enabling technology segments along with some use cases across industries Wed, 27 Dec 2017 00:00:00 +0000 User & Entity Behavioral Analytics in Incident Detection & Response, 2017 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K266-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K266-01-00-00-00 The report is about User and Entity Behavioral Analytics (UEBA) platforms used in the Incident Detection and Response (IDR) lifecycle and machine learning in various procedures in cybersecurity technologies. UEBA platforms apply algorithms over unstructured data sets to locate anomalies. By using a algorithm-based approach, UEBA is not limited to what can be learned from signatures or from techniques that require packet parsing. Divorced from signatures and packets, UEBA platforms are positioned to detect threats not possible in traditional cyber defense tools. UEBA platforms are deployed (typically) as plug-ins to network ingress/egress points and do not require agents or sensors (although additional visibility and endpoint management with the deployments of agents could be gained).If a UEBA platform is trusted, it can reduce agent management, and more importantly, reduce the number of alerts facing SOC analysts.--BEGIN PROMO--

Research Highlights

The report is about User and Entity Behavioral Analytics (UEBA) platforms used in the Incident Detection and Response (IDR) lifecycle and machine learning in various procedures in cybersecurity technologies.

UEBA platforms are attractive on several levels:

  • UEBA platforms apply algorithms over unstructured data sets to look for anomalies.
  • By using a math-based approach, UEBA is not limited to what can be learned from  signatures or from techniques that require packet parsing.
  • Divorced from signatures and packets, UEBA platforms may be able to detect threats not possible in traditional cyber defense tools.
  • UEBA platforms are deployed (typically) as plug-ins to network ingress/egress points and do not require agents or sensors (although additional visibility and endpoint management with the deployments of agents could be gained).
  • If a UEBA platform is trusted, it can reduce lightweight agent management, and more importantly, reduce the number of alerts facing SOC analysts.
Tue, 26 Dec 2017 00:00:00 +0000