2011 Trends to Watch: Security
License Price: US$ 4,740.00
Introduction
Security needs are growing fast. Business faces a large-scale and well-resourced criminal network. Additionally there is a growing threat of cyber espionage and a need to meet ever more stringent compliance benchmarks. At the same time, businesses are becoming more inherently vulnerable through the greater use of autometed collaborative processes, and more flexible and mobile workforces.
Features and benefits
Enterprises face a pincer movement between the demands of regulatory compliance and the threats that are present in the cyber environment. Cloud services add their own particular challenges to this picture. We see examples, such as banking, where enterprises are turing to their customers to help provide security to the business environment.
Your key questions answered
Introduction
Security needs are growing fast. Business faces a large-scale and well-resourced criminal network. Additionally there is a growing threat of cyber espionage and a need to meet ever more stringent compliance benchmarks. At the same time, businesses are becoming more inherently vulnerable through the greater use of autometed collaborative processes, and more flexible and mobile workforces.
Features and benefits
- Understand how the security priorities are changing for businesses
- Understand what you need to do to maintain and improve your security posture
Enterprises face a pincer movement between the demands of regulatory compliance and the threats that are present in the cyber environment. Cloud services add their own particular challenges to this picture. We see examples, such as banking, where enterprises are turing to their customers to help provide security to the business environment.
Your key questions answered
- What are the curren trends in security provision and need
- How is the industry responding to these needs
SUMMARY
Catalyst
Ovum view
Key messages
BUSINESS TRENDS AND TECHNOLOGY ENABLERS
Security technologies are focused horizontally
COMPLIANCE REQUIREMENTS PLACE ADDITIONAL BURDENS ON SECURITY
Meeting existing requirements
Emerging requirements
CLOUD SERVICES BRING NEW SECURITY CHALLENGES
The challenges
The response
Security requirements
VIRTUALIZATION BRINGS BOTH OPPORTUNITIES AND CHALLENGES FOR IMPROVING SECURITY
Virtualization on the server
End-point virtualization
ENTERPRISES SUCH AS BANKS ARE PROVIDING SECURITY FOR USERS OUTSIDE THE ORGANIZATION
Partnership between entities becomes real
Online banking customers receive help from their banks
Service providers can deliver clean-pipe protection for their customers
THE HOLISTIC VIEW OFFERS HOPE FOR IMPROVED SECURITY
The security industry has to collaborate more than the attackers do
Technology has to be agile
THE RANGE OF THREATS CONTINUES TO GROW
Defenders continue to be hampered by not knowing when they are attacked
State-sponsored cyber attacks are now a threat to the commercial world
DEMAND FOR SECURITY ON EMBEDDED DEVICES IS GROWING
The embedded security market is being driven by smart phones
Concern is increasing around the use of process-control chips
RECOMMENDATIONS
Recommendations for enterprises
Recommendations for vendors
APPENDIX
Further reading
Methodology
Authors
Ovum Consulting
Disclaimer
Catalyst
Ovum view
Key messages
BUSINESS TRENDS AND TECHNOLOGY ENABLERS
Security technologies are focused horizontally
COMPLIANCE REQUIREMENTS PLACE ADDITIONAL BURDENS ON SECURITY
Meeting existing requirements
Emerging requirements
CLOUD SERVICES BRING NEW SECURITY CHALLENGES
The challenges
The response
Security requirements
VIRTUALIZATION BRINGS BOTH OPPORTUNITIES AND CHALLENGES FOR IMPROVING SECURITY
Virtualization on the server
End-point virtualization
ENTERPRISES SUCH AS BANKS ARE PROVIDING SECURITY FOR USERS OUTSIDE THE ORGANIZATION
Partnership between entities becomes real
Online banking customers receive help from their banks
Service providers can deliver clean-pipe protection for their customers
THE HOLISTIC VIEW OFFERS HOPE FOR IMPROVED SECURITY
The security industry has to collaborate more than the attackers do
Technology has to be agile
THE RANGE OF THREATS CONTINUES TO GROW
Defenders continue to be hampered by not knowing when they are attacked
State-sponsored cyber attacks are now a threat to the commercial world
DEMAND FOR SECURITY ON EMBEDDED DEVICES IS GROWING
The embedded security market is being driven by smart phones
Concern is increasing around the use of process-control chips
RECOMMENDATIONS
Recommendations for enterprises
Recommendations for vendors
APPENDIX
Further reading
Methodology
Authors
Ovum Consulting
Disclaimer
TABLES
Table: Horizontal trends to watch: security
Table: Horizontal trends to watch: security