Trends that are driving Network Security Market in 2013. R.S Market Research Solutions quoted in CRN a leading magazine in IT space. Kalyan Banga can be reached at kalyanbanga@gmail.com or 9433948532
Best Regards,
Kalyan Banga
Founder & Principal Analytics Consultant
Hello: +91-9433948532
Web: http://fusionanalyticsworld.com
LinkedIn: http://www.linkedin.com/company/fusion-analytics-world
Facebook: http://www.facebook.com/AnalyticsFusion
Twitter: http://twitter.com/analyticsfusion
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Trends that are_driving_network_security_market_India 2013
1. Trends That Are Driving Network Security Market
ByByByBy Sonal DesaiSonal DesaiSonal DesaiSonal Desai, , Aug 12, 2013, , Aug 12, 2013, , Aug 12, 2013, , Aug 12, 2013
Targeted attacks, APTs, Web application and server protection, IPv6, cloud security and mobility are driving the demand
for network security
The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012----13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in
FY2013FY2013FY2013FY2013----14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,
the midthe midthe midthe mid----market 8.2market 8.2market 8.2market 8.2 percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.
“While the IT-ITeS segment has to comply with Sarbanes-Oxley, India-specific regulatory mandates are also an
increasing concern. The Information Technology Act of India, and RBI, in 2012, introduced several compliance
measures. Over the next two years Indian FSIs will need to comply with these mandates,” observes Pinakin Dave,
National Manager, Channels & Alliances, McAfee India.
According to Manatosh Das, Senior Analyst, Forrester Research, targeted attacks, APTs, Web application protection, Web
server protection, cloud security, mobility and encryption are the major trends driving the demand.
Targeted attacks and APTsTargeted attacks and APTsTargeted attacks and APTsTargeted attacks and APTs
According to CERT-In, an estimated 14,392 websites were hacked in 2012 till October. “2012 saw an increase in
targeted attacks, and the trend will continue. Such attacks make it difficult to ensure effective incident response
because hackers attack any hardware on the way out,” Dave cautions.
Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru, agrees. “Many of our large enterprise customers have allowed
employees to use social media, but they are unable to track the origin and persistence of zero-day attacks. We are
deploying context-aware intelligent network security solutions for these customers.”
“The exhaustion of IPv4 addresses, evolution of IPv6, and the emergence of the Internet of Things will boost
network security in a big way”
Diwakar Dayal, Lead, Security, Borderless Networks Sales, Cisco India & Saarc
Web application and server protectionWeb application and server protectionWeb application and server protectionWeb application and server protection
Money and spying are the two main motivators for cyber attacks targeting Web servers.
“Consider a scenario of high performance networking. How many data centers have the capability to mitigate advanced
targeted attacks, zero-day vulnerabilities and malwares, and provide CXOs visibility and control over their DCs?” asks
Vishak Raman, Senior Regional Director, Fortinet, India & Saarc.
Hyderabad-based Locuz Enterprise Solutions has set up PoCs with select customers for identity and access
management (IAM). “So far we have deployed five projects, each worth $50,000. The lead-time for these projects is 3-5
months, but once deployed IAM acts as a gateway between the user and the applications,” says Durganadh Venkata,
Senior VP, Business Development & Operations, Locuz.
In a project worth $100,000, Gurgaon-based ACPL Systems consolidated the firewall of a large BFSI customer which was
scattered over 60-70 different locations. “The RoI was clear. We conducted a network audit and showed the company
2. not only the source of attacks but also the kind of attacks that were entering their network. Once the solution was
deployed, the malicious attacks stopped,” informs Vishal Bindra, CEO, ACPL, Delhi.
IPv6IPv6IPv6IPv6
The Indian government recently updated its IPv6 roadmap which details some pilot projects and a new set of
deliverables to make a complete transition to IPv6 by 2017.
Since IPv6 requires a major upgradation of the network infrastructure, security is a major concern. “The exhaustion of
IPv4 addresses, the evolution of IPv6-oriented technologies, government initiatives to push the transition to IPv6, year-
on-year explosive growth of mobile devices, and the emergence of the Internet of Things will boost network security in
a big way,” forecasts Diwakar Dayal, Lead, Security, Borderless Networks Sales, Cisco India & Saarc.
In addition, organizations with multiple location presence are looking at GRC, SIEM and database security to comply
with multiple regulations. Remarks Prabhu, “They have invested in tools, but don’t have the means to implement a
solution. For instance, I know many large enterprise customers who maintain compliance data in Microsoft Excel sheets.
They are now scouting for GRC solutions but want a cost-effective mechanism.”
Venkata adds, “Many enterprises which are up for upgrade are evaluating IPv6, and that is a huge opportunity.
Migration to IPv6 requires a customer to revisit his security infrastructure and may even require an overhaul if the
networking is too old.”
Cloud securityCloud securityCloud securityCloud security
According to Ashish Dhawan, MD, Asia, Juniper Networks, strict IT budgets, an increasing number of SMBs, broadband
penetration and enterprise mobility are prompting cloud service providers to look at cloud security in a holistic
manner.
“Many CIOs are not conversant with network security. They have to work with constrained budgets, and
therefore, do not provide for network security in their budgets”
Vishal Bindra, CEO, ACPL
Bindra explains that data privacy and the need to adhere to regulations, especially by customers in the pharma and
manufacturing segments, or multi-group companies which have adopted SaaS, are forcing cloud service providers to
invest in network security.
Locuz, which has a cloud services portfolio, helps customers in security assessments before they move to the cloud.
“We are running PoCs with six customers whereby we are helping them to assess their network security. Once they
come on board, detailed network security assessment projects starting at $10,000 add to our services revenue pie,”
reveals Venkata.
MobilityMobilityMobilityMobility
Ambarish Deshpande, MD, India Sales, BlueCoat, quotes from a recent survey which the company undertook. “We
learned that organizations wanted to enable a BYOD policy but were hindered by the fear of data leakage.”
Adds Dhawan, “Mobile devices are an attractive target for cyber-criminals, but organizations cannot restrict customers
3. or internal stakeholders from accessing mobile devices. Instead, organizations need to improve security by exerting
greater control over their mobile exposure.”
The need of the hour is context-aware intelligent security solutions that recognize the user’s behavior based on the
device and the role of the user. Raman notes that many large enterprises are testing the waters with sand-boxing as a
built-in feature.
ChallengesChallengesChallengesChallenges
Even as vendors launch new products to satisfy their customers’ need to protect their network from newer and
persistent attacks, they admit that partners need to adopt a solutions-based approach to bag large-ticket deals. They
also believe that partners will have to up their ante, train their executives, and develop adequate skill-sets to participate
in bigger projects.
Says Raman, “Many partners do not invest in skill-sets because of the fear of losing the resource to a rival or vendor.
But network security is a complicated process, and partners have to invest significantly to participate in larger projects.
They need to develop a reputation.”
According to Sunil Sharma, VP, Sales & Operations, Cyberoam, “Educating customers is vital. A partner will be able to do
that only if he is clear about the concepts. Once he can convince customers about the importance of network security
he can up-sell and cross-sell solutions. This would help him to form long-lasting relationships.”
Partners however complain that they do not get adequate support from vendors, who prefer to work with tier-1 systems
integrators in large-ticket deals. They also accuse vendors of leveraging the ignorance of CIOs to push their products to
meet targets.
Comments Bindra, “A majority of CIOs are not conversant with the concept of network security. Many have to work with
constrained budgets, and do not even provide for network security in their IT budgets. If anything goes amiss, they
change the product—without going into the reason behind the problem.”
“Network security requires consistent monitoring, and only a security administrator can do the job, especially because it
involves frequent changes in policies,” counsels Moin Shaikh, Director, Innovative Telecom & Softwares, Surat.
Prabhu feels that although CISOs have a holistic understanding of network security, a majority of them buckle under the
pressure of limited budgets and focus only on adhering to compliance and regulations. “The lament is that many CISOs
compromise on network security and are happy to buy UTMs,” says Bindra.
ConclusionConclusionConclusionConclusion
Network security is a vast open field which offers innumerable opportunities to partners. It is now upto partners how
they leverage on the opportunities, and develop profitable business models from them.
http://www.crn.in/feature/trends-that-are-driving-network-security-market?Page=2