Frost.com - Network Security Research http://www.frost.com/c/10402/home.do http://www.frost.com/c/10402/home.do - Network Security Research Frost & Sullivan Cloud-, Blockchain-, and Machine Learning-based Security Innovations http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-20-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-20-00-00 This Cyber Security TOE provides a snapshot on emerging cyber security solutions powered by artificial intelligence/machine learning, cloud and blockchain-based innovations that help companies protect from threats, data breaches, phishing attacks, and defend against modern attacks residing within cloud, endpoints, and various network layers. Cyber Security TechVision Opportunity Engine (TOE) s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. TechVision Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile & wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Key words: Cyber security, machine learning, network security, blockchain, malware protection, virtual security assistant, E-mail security, cloud security, network security, anti-phishing, risk assessment, risk management, identity risk analytics Fri, 3 Aug 2018 00:00:00 +0100 Vulnerability Management (VM) Market Analysis, Global, Forecast to 2022 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K2A2-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K2A2-01-00-00-00 The increased volume and sophistication of cyber threats is matched only by the increase in risk as more business, personal and network information assets are targeted. Vulnerability to these threats must be known with confidence and a clear plan of action. Vulnerability Management is a foundational tool for identifying, prioritizing and reporting on these vulnerabilities. As suppliers build upon this foundation with new capabilities in analytics, automation, container technology, virtualization and cloud-based solutions, it will continue to be important to track the maturity and effectiveness of these solutions so businesses can decide which solution best suits their needs. Mon, 30 Jul 2018 00:00:00 +0100 Network Access Control (NAC) Market, Global, Forecast to 2022 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K28E-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K28E-01-00-00-00 The Frost & Sullivan report analyzes the global market for Network Access Control. The traditional focus of NAC has been Authentication, Authorization, and Accounting (AAA). At its core, NAC is all about enabling mobility and dynamic security. However, the enterprise network no longer sits within four secure walls. It extends to wherever employees and data travel. Mobility, digitization, and the IoT are changing the way we live and work. The result is that networks are expanding and resulting in increasing complexity of managing resources and disparate security solutions. NAC is evolving to have improved visibility and monitoring of network devices, more security features, orchestration with other security products such as Next-Generation Firewalls (NGFW), SIEM, Web Content Filters, etc. Today s NAC security solutions must deliver profiling, policy enforcement, guest access, BYOD onboarding and more to offer IT-offload, enhanced threat protection and an improved user experience. Growth is driven by growth of IoT, Bring Your Own Device (BYOD), increasing mobility, and organizations migrating workloads to the cloud. there is strong exponential growth of the number and diversity of endpoint devices and diverse operating systems (OSs). The increasing level of malware and cyber attacks is also driving further NAC investments. Network visibility is critical. Every device on a network is a potential attack or reconnaissance point that must be discovered and secured. A major trend is the convergence of IT and Operational Technology (OT), wherein NAC is helping break down silos. Fri, 27 Jul 2018 00:00:00 +0100 Innovations in Artificial Intelligence, Blockchain, Video Analytics, and Edge Computing http://www.frost.com/prod/servlet/sublib/display-report.do?id=D881-00-1F-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D881-00-1F-00-00 This edition of ITCC TOE provides a snapshot of the emerging ICT led innovations in artificial intelligence, video analytics, edge computing, and blockchain. This issue focuses on the application of information and communication technologies in alleviating the challenges faced across industry sectors in areas such as healthcare, content creation, hospitality, marketing automation, shipping sector, and social media. ITCC TechVision Opportunity Engine (TOE) s mission is to investigate emerging wireless communication and computing technology areas including 3G, 4G, Wi-Fi, Bluetooth, Big Data, cloud computing, augmented reality, virtual reality, artificial intelligence, virtualization and the Internet of Things and their new applications; unearth new products and service offerings; highlight trends in the wireless networking, data management and computing spaces; provide updates on technology funding; evaluate intellectual property; follow technology transfer and solution deployment/integration; track development of standards and software; and report on legislative and policy issues and many more. The Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile and wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Keywords: Artificial intelligence, blockchain, advanced sensors, edge-of-network, smart contracts, data security, video analytics, content discovery and photography-based marketing Fri, 20 Jul 2018 00:00:00 +0100 Innovations in IoT Security, Network Security, and Machine Learning http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-1F-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-1F-00-00 This Cyber Security TOE provides a snapshot of the emerging security solutions for application areas such as Internet of Things, smart homes, e-commerce, industrial networks, and sensitive installations that help companies protect from threats, data breaches, phishing attacks, and defend against modern attacks residing within the cloud, endpoints and various network layers. Cyber Security TechVision Opportunity Engine (TOE) s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. TechVision Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile & wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Key words: Machine learning, network security, data protection, IIoT security, E-mail security, cloud security, data security, endpoint protection, security automation, risk assessment service, advanced threat analytics Fri, 6 Jul 2018 00:00:00 +0100 Advanced Malware Sandbox (AMS) Solutions Market, Global, Forecast to 2022 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K27B-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K27B-01-00-00-00 The Advanced Malware Sandbox (AMS) is an important component of a network security architecture that delivers the ability to detect and block advanced threats. AMS solutions utilize virtualized computing environments to identify malicious behaviors and other indicators of malware. This model is unique and yields high fidelity threat information with minimal false positives. While AMS capabilities are in high demand, vendors face growing competition from emerging cyber security technologies, as well as pressure to adopt new models for delivering this technology to customers. Thu, 5 Jul 2018 00:00:00 +0100 Securing Connected and Autonomous Cars for a Smarter World http://www.frost.com/prod/servlet/sublib/display-report.do?id=D81D-01-00-00-00 http://www.frost.com/prod/servlet/sublib/display-report.do?id=D81D-01-00-00-00 Cars are continually incorporating more software and becoming more connected, opening up vulnerabilities to cyber security attacks. At present cars have approximately 100 ECUs and more than 100 million lines of code which provides a massive attack surface for hackers. Hackers can exploit and gain access to any vulnerable, peripheral ECU such as Bluetooth, to take control of critical core ECUs which controls brakes or engine. Hackers can disabled a vehicle s brakes or steering, can shut down the engine, or manipulate other on-board systems through denial of service attacks (DDoS), thereby endangering the vehicle occupants lives. Also, addition of any connected component to support vehicle infotainment systems, maintenance monitoring, and other systems, increases cyber-attack possibilities. Key security challenges faced by the automotive industry in IoT ecosystem are through following threat vectors: Vulnerable Connected Components Data Transmissions and Unauthorized Access Unsecured Software (OTA) Updates In brief, this research service covers the following points: 1. Connected Car Security An Overview 2. Security Challenges for Connected Cars 3. Technology Advancements in Connected Car Security Arena 4. Key Market Trends and Developments 5. Key Innovations related to OTA updates and ECU security 6. Patent, adoption trends and key funding initiatives Fri, 29 Jun 2018 00:00:00 +0100