24
INFORMATION SECURITY BUSINESS (MIDDLE EAST - 2011) Arjun V Presales Consultant

Information Security Business Middle East 2011

Embed Size (px)

DESCRIPTION

A brief presentation about IT Security Market and Opportunity in Middle East.

Citation preview

Page 1: Information Security Business   Middle East 2011

INFORMATION SECURITY BUSINESS(MIDDLE EAST - 2011)

Arjun V

Presales Consultant

Page 2: Information Security Business   Middle East 2011

AGENDA

Introduction

IT Security Technologies

Market Drivers for IT Security

Market Size for IT Security

IT Security Market Players

Conclusion

Page 3: Information Security Business   Middle East 2011

Introduction

Page 4: Information Security Business   Middle East 2011

WHAT IS INFORMATION SECURITY

Information security means protecting data from

unauthorized access, use, disclosure, disruption

or modification

Information Security Goals

Confidentiality

Integrity

Availability

Page 5: Information Security Business   Middle East 2011

IT Security Technologies

Page 6: Information Security Business   Middle East 2011

IT SECURITY TECHNOLOGIES

Page 7: Information Security Business   Middle East 2011

Market Drivers for IT

Security Business

Page 8: Information Security Business   Middle East 2011

THE SECURITY TREAT LANDSCAPE

Malware increasingly targeted, sophisticated and primarily

motivated by financial gain

Web application attacks –(servers and users) most

prevalent (SANS Institute Top 20 Cyber Security Risks 2010)

Social networking blurs work and personal boundaries (Facebook: 500 million active users)

78% of data breaches as result of hacking and use of

malware (Verizon RISK team 2010)

95% of vulnerabilities exploitable over network

infrastructure (IBM X-Force Risk Report H1 2010)

Page 9: Information Security Business   Middle East 2011

ATTACK VECTOR EVOLUTION

Page 10: Information Security Business   Middle East 2011

LAYERED DEFENCE ARE MANDATORY

Page 11: Information Security Business   Middle East 2011

ENTERPRISE SECURITY INITIATIVES 2011

Assess, Reduce & Monitor Client-side Attack Surface

Use Multifactor Authentication

Eradicate Clear-text Traffic

Implement Application and Database Security

Virtually Patch Web Applications Until Fixed

Enforce Security Upon Third Party Relationships

Implement Network Access Control

Analyze All Events

Implement an Security Awareness Program

Page 12: Information Security Business   Middle East 2011

IT SECURITY OPPORTUNITY

Page 13: Information Security Business   Middle East 2011

Market size for IT Security

Page 14: Information Security Business   Middle East 2011

MARKET SIZE

The Middle East IT security software and appliances

market is anticipated to grow at a CAGR of more than 34%

between 2010 and 2013 (RNCOS Research)

IT spending in the Middle East, Turkey and Africa region

will go past US$ 60 billion in 2011, an increase (in constant

US$ terms) of 12.8% from the 2010. (IDC Research)

IT spending by the public sector in the 6 GCC countries to

grow by 14.3% in 2011 and reach US$ 2.6 billion,

contributing nearly 30% to the public sector IT spending in

the Middle East, Turkey and Africa. (IDC Research)

Page 15: Information Security Business   Middle East 2011

TOP 5 NETWORK SECURITY REVENUE

SEGMENTS (BUSD)

Page 16: Information Security Business   Middle East 2011

IT Security Market Players

Page 17: Information Security Business   Middle East 2011

TECHNOLOGY ‘VS’ MARKET PLAYERS (1)

End Point Security (Anti-X, Data Encryption)

Symantec

Mcafee

Trend Micro

Sophos

Kaspersky

Page 18: Information Security Business   Middle East 2011

TECHNOLOGY ‘VS’ MARKET PLAYERS (2)

Perimeter Security (UTM, FW, IPS)

Fortinet

Juniper

Cisco

Sonicwall

Watch Guard

NETASQ

IBM – ISS

Checkpoint

Page 19: Information Security Business   Middle East 2011

TECHNOLOGY ‘VS’ MARKET PLAYERS (3)

Core Security (NAC)

Juniper

Symantec

Mcafee

Cisco

Page 20: Information Security Business   Middle East 2011

TECHNOLOGY ‘VS’ MARKET PLAYERS (4)

Remote Security (VPN , 2-Factor Auth, PKI)

VPN

Juniper

Cisco

Citrix

Checkpoint

2 Factor Authentication

RSA

Aladdin

Vasco

Public Key Infrastructure (PKI)

RSA

Entrust

VeriSign

Page 21: Information Security Business   Middle East 2011

TECHNOLOGY ‘VS’ MARKET PLAYERS (5)

Niche Technology

Security and Event Mgmt ArcSight

LogLogic

RSA

Cisco

Application Security F5

Citrix

Cisco

WAN Optimization Riverbed

BlueCoat

Cisco

Page 22: Information Security Business   Middle East 2011

Conclusion

Page 23: Information Security Business   Middle East 2011

CONCLUSION

In 2010, the security landscape changed: Targets shifted towards endpoints and users

Individuals became easily identifiable to attackers

Malicious tools became more sophisticated

New attack vectors introduced as we innovate; old vectors never die

Information security is no longer a technology-focused problem. It has become the basis for business survival as much as any other issue.

Organization are now firmly committed to security to:

Stay resilient to attack

Reduce risk of data compromise

Protect sensitive data and reputation

With Attack vectors increasing exponentially it’s the right time to make a investment in information security business.

Page 24: Information Security Business   Middle East 2011

Thank You