advertisement

Cutting Edge Approaches to Vulnerability Management

40 %
60 %
advertisement
Information about Cutting Edge Approaches to Vulnerability Management
Technology

Published on March 6, 2014

Author: FrostandSullivan

Source: slideshare.net

Description

REGISTER NOW:
https://www.brighttalk.com/webcast/5567/102273

Why You Should Attend:

- Learn how key network security management solution providers are expanding vulnerability assessments to include more than just network endpoints
- Gain a sneak peek of the newest tools and technologies in assessment precision and remediation
- Understand how vulnerability reporting is vital to the interests of compliance, IT and C-level management
advertisement

Cutting Edge Approaches to Vulnerability Management VM Value-Added Services Value- Chris Kissel, Industry Analyst IT & Network Security March 13, 2014 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.

Sample of Key Highlights • In 2013, the global vulnerability management market reached $528.6 M. By 2018, the global vulnerability management market will total $973.9 M. • North America is the largest market globally while APAC is growing the most rapidly. • Vulnerability Management (VM) platforms are expanding to include secure configurations, log management, predictive analytics, and password authentication. • The leading vulnerability management solution providers are also incorporating Web application scanning onto their platforms. • In the last two years, vulnerability management fundamentally changed. The major industry players received money in one form or another. Tenable Network Systems and Rapid7 each received $50 million in funding; Qualys issued an IPO, and eEye Digital and nCircle were acquisition targets by BeyondTrust and Tripwire, respectively. Source: Frost & Sullivan analysis.

Drivers and Restraints Total Vulnerability Management Market: Key Market Drivers and Restraints, Global, 2014–2018 5 Years H H H Integration of features in vulnerability management platforms is helping customers harden their systems M M M Compliance reporting is increasing in importance to conform with regulatory requirements M M H The Internet of Things requires heterogeneous networks, and integrates new devices and security practices M H H Continuous threat monitoring is becoming requisite Market Restraints 3–4 Years The nature of cyber attacks is changing to include smaller businesses and threats are becoming more targeted Market Drivers 1–2 Years M H H Customers are concerned that vulnerability management is too thin of a slice of protection and worried about limits in the platform H H H Vulnerability management customers are prohibited from publishing scan results which reinforces the feeling from customers that they have trouble making value-based decisions M M M Syncing security measures to match changes in a network is difficult M M M Vulnerability management competes with other technologies for security solution dollars L L L Impact: High Medium Low Note: Drivers & Restraints are ranked in order of impact. Source: Frost & Sullivan

Integration with Secondary Technologies Log Management SSL Certificate Authentication SIEM Vulnerability Management Platform Privileged Identity Management Risk Management Secure Configurations Web Application Scanning Source: Frost & Sullivan

Register for this Webcast Live Webcast Thursday, March 13, 2014 3:00pm EDT/2:00 pm CDT https://www.brighttalk.com/webcast/5567/102273 5

Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter http://www.facebook.com/FrostandSullivan https://www.linkedin.com/groups?gid=4480787 http://www.slideshare.net/FrostandSullivan http://twitter.com/frost_sullivan 6

For Additional Information Britni Myers Information & Communications Technologies Corporate Communications (210) 477-8481 Britni.myers@frost.com Angie Montoya Global Webinar Marketing Coordinator Marketing (210) 247-2435 amontoya@Frost.com 7

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Cutting Edge Approaches to Vulnerability Management - YouTube

Want to watch this again later? Sign in to add this video to a playlist. 1. Forefront Approaches to VulnerabilityCutting Edge Approaches to ...
Read more

Analyst Briefing: Cutting Edge Approaches to Vulnerability ...

ANALYST BRIEFING: Title: Analyst Briefing: Cutting Edge Approaches to Vulnerability Management: Analyst: Chris Kissel: Briefing Date: Mar 13 2014: Time: 3 ...
Read more

Frost & Sullivan: Cutting Edge Approaches to Vulnerability ...

Vulnerability management is a technology that uses network scanners to detect potential weaknesses in network endpoints in the hopes of beating pernicious ...
Read more

New approaches to vulnerability management - Education

Share New approaches to vulnerability management. ... for Development Organization and Management New Approaches. ... Cutting Edge Approaches to ...
Read more

It Vulnerability Management | LinkedIn

View 1392 It Vulnerability Management posts, ... Cutting Edge Approaches to Vulnerability ... Institute of Disaster Management And Vulnerability Study.
Read more

Threat and Vulnerability Management Consultant ... - OWASP

Threat and Vulnerability Management Consultant, ... Threat and Vulnerability Management Consultant. Organization: ... • work with cutting edge ...
Read more

Vulnerability Management | LinkedIn

View 65783 Vulnerability Management posts, ... Vulnerability Threat Management and Incident Response at ... Cutting Edge Approaches to Vulnerability ...
Read more