Frost.com - Network Security Research http://www.frost.com/c/10402/home.do - Network Security Research Thu, 24 May 2018 9:04:56 Global Holistic Web Protection Market Analysis, Forecast to 2022 http://www.frost.com/prod/servlet/sublib/display-report.do?id=K2BE-01-00-00-00 Websites, web applications, and APIs are more important than ever in the digital age. Businesses of all sizes and in every industry and geography rely on the web to engage with customers, employees, and partners. The ability for these end users to reach websites and applications in a reliable and fast manner is a fundamental business requirement in the era of digital transformation. Furthermore, businesses must ensure that their websites and applications are secure in order to foster end user trust and encourage greater customer interaction. Put simply: websites must be secure, fast, and available. To ensure that web applications are reliable, usable, and trustworthy has traditionally required an investment in specialized products and services such as distributed denial-of-service (DDoS) mitigation, web application firewall (WAF), bot risk management (BRM), and content delivery network (CDN) services. While these point solutions are effective at addressing their specific threat vector, they also operate in silos, and without broader understanding of the threat landscape or contextual information might miss more complex or coordinated multi-vector attacks. Additionally, the use of disparate tools provided by different vendors requires an added level of overhead in terms of processing power and transit times that may be problematic for online organizations with sensitive performance requirements. The answer to these challenges lies in Holistic Web Protection solutions. Holistic Web Protection vendors integrate essential security technologies such as DDoS mitigation, WAF, and BRM to deliver comprehensive protection of web applications and infrastructure. Deep integration of these technologies enables Holistic Web Protection vendors to improve security efficacy and enhance performance. By building these technologies into a performance optimization platform such as a CDN, vendors can deliver a strong value proposition to online businesses of all sizes: better web security with better web performance. The Holistic Web Protection market represents an emerging market with high growth rates. As the market takes shape, leaders are emerging and helping to define the market and set customer expectations. As demand for Holistic Web Protection grows, interest is expanding rapidly among vendors, industry participants, and customers alike. This market study is the first to define the Holistic Web Protection market, covering cloud services that deliver an integrated solution spanning availability protection, web security, and performance optimization. The study will provide market size and forecasts, analysis of market growth factors, as well as analysis by market segment, and will compare and profile the various vendors and vendor offerings that comprise the Holistic Web Protection market. Wed, 16 May 2018 00:00:00 +0100 Movers & Shakers Interview with Jean-Claude Broido Vice President of IBM Security, Asia Pacific http://www.frost.com/prod/servlet/sublib/display-market-insight.do?id=298525328 Fri, 11 May 2018 06:26:05 +0100 Movers & Shakers Interview with Darren Anstee Chief Technology Officer, NETSCOUT Arbor http://www.frost.com/prod/servlet/sublib/display-market-insight.do?id=298525316 Fri, 11 May 2018 06:11:58 +0100 Innovations in Endpoint Protection, IoT Security, Machine Learning, and Cloud-based Security http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-1D-00-00 This Cyber Security TOE provides provides a snapshot of the emerging security solutions for application areas such as connected environment, healthcare, industrial systems, asset management, and other enterprise applications that help companies mitigate threats and defend against modern attacks residing within cloud, endpoints, and various network layers. Cyber Security TechVision Opportunity Engine (TOE) s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. TechVision Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile & wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Key words: Web application firewall, application security, machine learning, network security, artificial intelligence, cloud security, endpoint protection, security information, event management, bot protection, behavior analytics Fri, 4 May 2018 00:00:00 +0100 2018 Top Information and Communication Technologies http://www.frost.com/prod/servlet/sublib/display-report.do?id=D83A-01-00-00-00 The proliferation of digital technologies has remained substantial over the past two decades. With intelligence being seen as the next evolution post digitization, disruptive technology innovations in the ICT space are being developed around the world and have deeply permeated various applications and markets. The research service delves deeper into information and communication technologies from various technology and market attractiveness metrics such as innovation landscape, patent, funding, market potential, applications impact, regional adoption and disruptive potential. Technologies covered in this report include: Deep Learning, Blockchain, 5G, Cognitive Security, Haptic Reality, Conversational Computing, Small Data, Hyperimaging Analytics, XaaS (Everything-as-a-Service) and Edge Intelligence Mon, 30 Apr 2018 00:00:00 +0100 ICT Technologies Transfoming the Future of Automotive Sector http://www.frost.com/prod/servlet/sublib/display-report.do?id=D81E-01-00-00-00 ICT has led to transformational breakthroughs in the automotive landscape, enabling companies to gain a competitive advantage, creating new ways of generating revenue, and convergence of technologies that has disrupted the status quo. This report outlines the different types of information and communication technologies disrupting the automotive space, the factors driving their adoption, barriers to adoption, the use cases, emerging business models, and new revenue streams. This report covers disruptive Information and Communication Technologies disrupting the automotive sector, including - Machine Learning - Computer Vision - Cybersecurity - Blockchain - Advanced Analytics - Augmented Reality - Virtual Reality In brief, this research service provides the following: 1. A brief overview of ICT transforming the automotive sector 2. Technology overview and driver and challenges 3. An overview of how each technology impacts the automotive space 4. Who are the major players in each technology area? 5. Relevant use cases of industry players 6. Convergence Scenarios 7. Emerging business models 8. Key finding and analyst POV Fri, 27 Apr 2018 00:00:00 +0100 Innovations in IoT Security, Endpoint Protection, Machine Learning, and Cloud-based Security http://www.frost.com/prod/servlet/sublib/display-report.do?id=D983-00-1C-00-00 This Cyber Security TOE provides a snapshot of the emerging security solutions for application areas such as connected environment, mobile transactions, financial institutions, industrial networks, and sensitive installations that help companies mitigate threats and defend against modern attacks residing within cloud, endpoints, and various network layers. Cyber Security TechVision Opportunity Engine (TOE) s mission is to investigate new and emerging developments that aim to protect the network infrastructure and the resources operating in the network. NST offers strategic insights that would help identify new business opportunities and enhance technology portfolio decisions by assessing new developments and product launches in: anti-spam, anti-virus, phishing, identity management, disaster recovery, firewalls, virtual private networks, end-point security, content filtering, Web application security, authentication and access control, intrusion prevention and detection systems, encryption algorithms, cryptographic techniques, and pattern recognition systems for network security. Highlights of this service include technology roadmapping of network security technologies; IP portfolio analysis; information on funding and investment opportunities; evaluation of commercial opportunities from technology developments; technology assessment; analysis of technology accelerators and challenges and many more. TechVision Information & Communication Technology cluster provides global industry analysis, technology competitive analysis, and insights into game-changing technologies in the wireless communication and computing space. Innovations in ICT have deeply permeated various applications and markets. These innovations have profound impact on a range of business functions for computing, communications, business intelligence, data processing, information security, workflow automation, quality of service (QoS) measurements, simulations, customer relationship management, knowledge management functions and many more. Our global teams of industry experts continuously monitor technology areas such as big data, cloud computing, communication services, mobile & wireless communication space, IT applications & services, network security, and unified communications markets. In addition, we also closely look at vertical markets and connected industries to provide a holistic view of the ICT Industry. Key words: IoT security, network security, cloud security, data security, endpoint protection, security automation, risk monitoring, digital risk management, smart key service, Gen V Cyber attacks Fri, 6 Apr 2018 00:00:00 +0100