Skip to main content

Enterprise IT Security Demand Creates $8.6B Upside

In hindsight, the reported ongoing IT security breaches during 2015 have paved the way for a significant cyber security solutions marketplace in 2016 and beyond. Savvy IT leaders have already started to address the need for real-time policy updates, ongoing employee training and an evolving systems architecture.

Data trends show that the global cyber threat and Vulnerability Management (VM) market is expected to grow from $5.3 billion in 2015 to $8.6 billion in 2020, according to the latest worldwide market study by ABI Research.

This study was launched to uncover the commercial implications of newly discovered ICT security vulnerabilities, while also assessing current solutions to the known people, process and technology-related challenges that most CIOs must address with proactive enterprise security measures.

"Each day, organizations are deluged with warnings about newly discovered security vulnerabilities," says Monolina Sen, senior analyst at ABI Research. "While well-known security flaws, such as Heartbleed, affected industries globally, lesser-known vulnerabilities have just as much impact on critical systems in a particular enterprise."

ABI reports that the increasing use of next generation technologies -- such as mobile applications, internet of things, cloud computing and big data -- are bound to introduce the potential for new types of vulnerabilities.

According to the market study, software as a service (SaaS) providers have the highest number of vulnerabilities on average, followed by the financial services industry. The ABI assessment identified two key factors that led to the growing demand for cyber threat and VM solutions.

Impact of Design Flaws and Weaknesses: These affect a software vendor's reputation, as well as an IT systems and enterprise networking supplier's bottom line, as frequent OS updates and application patches represent a major financial burden.

Government and Industry Regulation Mandates: Groups such as HIPAA (the Health Insurance Portability and Accountability), HITECH (Health Information Technology for Economic and Clinical Health), PCI DSS (Payment Card Industry Data Security Standard) and Sarbanes-Oxley (SOX) mandate rigorous VM practices.

ABI believes that VM is key to attaining risk management goals. It provides policy and compliance context, and it mines the network for vulnerability information, remediation opportunities, and ultimately, provides a comprehensive view of enterprise risk.

The VM market covers a wide area of solutions that function as the backbone of the security organization. The ideal VM solution would include capabilities for asset management, vulnerability assessment, configuration management, patch management, remediation, reporting and monitoring.

ABI says that it would also integrate well with third-party technologies. Leading vendors providing VM solutions include Tenable Network Security, Qualys, Core Security, IBM, Rapid7, AlienVault, Tripwire, Skybox Security, HP Enterprise, Intel Security, EMC, Symantec and Secunia.

Popular posts from this blog

Wireless Solutions Advance Work from Home Trends

Despite a challenging backdrop from the ongoing effects of the global COVID-19 pandemic, the negative impact on fifth-generation (5G) wireless supply chains has been minimal compared to the wider mobile smartphone market. This led to 5G mobile devices becoming more diverse, brought to market quickly at a variety of price points, thereby accelerating affordability and adoption. The mobile market is transitioning to 5G and many leading vendors are now exploring the low-priced 5G smartphone segment. According to the latest worldwide market study by ABI Research, 681 million 5G handsets will be shipped in 2022. Therefore, the race is on for OEMs to find that all-important level of differentiation in their flagship portfolios to help boost margins and improve market share. 5G Wireless Market Development Vendors continue to drive the adoption of new product designs, screen technology, chipsets, and camera setups -- notably within the flagship smartphone segment. Meanwhile, the leaders seek a

Software-Defined Infrastructure: The Platform of Choice

As more organizations adapt to a hybrid working model for their distributed workforce, enterprise CIOs and CTOs are tasked with delivering new productivity-enabling applications, while also seeking ways to effectively reduce IT cost, complexity, and risk. Traditional IT hardware infrastructure is evolving to more software-based solutions. The worldwide software-defined infrastructure (SDI) combined software market reached $12.17 billion during 2020 -- that's an increase of 5 percent over 2019, according to the latest market study by International Data Corporation (IDC). The market grew faster than other core IT technologies. The three technology pillars within the SDI market are: software-defined compute (53 percent of market value), software-defined storage controller (36 percent), and software-defined networking (11 percent). "Software-defined infrastructure solutions have long been popular for companies looking to eliminate cost, complexity, and risk within their data cente

Digital Identity Verification Market to Reach $16.7B

As more enterprise organizations embrace the ongoing transition to digital business transformation, CIOs and CTOs are adopting new technologies that enable the secure identification of individuals within their key stakeholder communities. A "digital identity" is a unique representation of a person. It enables individuals to prove their physical identity during transactions. Moreover, a digital identity is a set of validated digital attributes and credentials for online interactions -- similar to a person's identity within the physical world. Individuals can use a 'digital ID' to be verified through an authorized digital channel. Usually issued or regulated by a national ID scheme, a digital identity serves to identify a unique person online or offline. Digital Identity Systems Market Development Complementary to more traditional forms of identification, digital identity verification systems can enhance the authenticity, security, confidentiality, and efficiency of