Published on March 6, 2014
Cutting Edge Approaches to Vulnerability Management VM Value-Added Services Value- Chris Kissel, Industry Analyst IT & Network Security March 13, 2014 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
Sample of Key Highlights • In 2013, the global vulnerability management market reached $528.6 M. By 2018, the global vulnerability management market will total $973.9 M. • North America is the largest market globally while APAC is growing the most rapidly. • Vulnerability Management (VM) platforms are expanding to include secure configurations, log management, predictive analytics, and password authentication. • The leading vulnerability management solution providers are also incorporating Web application scanning onto their platforms. • In the last two years, vulnerability management fundamentally changed. The major industry players received money in one form or another. Tenable Network Systems and Rapid7 each received $50 million in funding; Qualys issued an IPO, and eEye Digital and nCircle were acquisition targets by BeyondTrust and Tripwire, respectively. Source: Frost & Sullivan analysis.
Drivers and Restraints Total Vulnerability Management Market: Key Market Drivers and Restraints, Global, 2014–2018 5 Years H H H Integration of features in vulnerability management platforms is helping customers harden their systems M M M Compliance reporting is increasing in importance to conform with regulatory requirements M M H The Internet of Things requires heterogeneous networks, and integrates new devices and security practices M H H Continuous threat monitoring is becoming requisite Market Restraints 3–4 Years The nature of cyber attacks is changing to include smaller businesses and threats are becoming more targeted Market Drivers 1–2 Years M H H Customers are concerned that vulnerability management is too thin of a slice of protection and worried about limits in the platform H H H Vulnerability management customers are prohibited from publishing scan results which reinforces the feeling from customers that they have trouble making value-based decisions M M M Syncing security measures to match changes in a network is difficult M M M Vulnerability management competes with other technologies for security solution dollars L L L Impact: High Medium Low Note: Drivers & Restraints are ranked in order of impact. Source: Frost & Sullivan
Integration with Secondary Technologies Log Management SSL Certificate Authentication SIEM Vulnerability Management Platform Privileged Identity Management Risk Management Secure Configurations Web Application Scanning Source: Frost & Sullivan
Register for this Webcast Live Webcast Thursday, March 13, 2014 3:00pm EDT/2:00 pm CDT https://www.brighttalk.com/webcast/5567/102273 5
Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter http://www.facebook.com/FrostandSullivan https://www.linkedin.com/groups?gid=4480787 http://www.slideshare.net/FrostandSullivan http://twitter.com/frost_sullivan 6
For Additional Information Britni Myers Information & Communications Technologies Corporate Communications (210) 477-8481 Britni.firstname.lastname@example.org Angie Montoya Global Webinar Marketing Coordinator Marketing (210) 247-2435 amontoya@Frost.com 7
Want to watch this again later? Sign in to add this video to a playlist. 1. Forefront Approaches to VulnerabilityCutting Edge Approaches to ...
ANALYST BRIEFING: Title: Analyst Briefing: Cutting Edge Approaches to Vulnerability Management: Analyst: Chris Kissel: Briefing Date: Mar 13 2014: Time: 3 ...
Vulnerability management is a technology that uses network scanners to detect potential weaknesses in network endpoints in the hopes of beating pernicious ...
Share New approaches to vulnerability management. ... for Development Organization and Management New Approaches. ... Cutting Edge Approaches to ...
View 1392 It Vulnerability Management posts, ... Cutting Edge Approaches to Vulnerability ... Institute of Disaster Management And Vulnerability Study.
Threat and Vulnerability Management Consultant, ... Threat and Vulnerability Management Consultant. Organization: ... • work with cutting edge ...
View 65783 Vulnerability Management posts, ... Vulnerability Threat Management and Incident Response at ... Cutting Edge Approaches to Vulnerability ...