SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Trends That Are Driving Network Security Market
ByByByBy Sonal DesaiSonal DesaiSonal DesaiSonal Desai, , Aug 12, 2013, , Aug 12, 2013, , Aug 12, 2013, , Aug 12, 2013
Targeted attacks, APTs, Web application and server protection, IPv6, cloud security and mobility are driving the demand
for network security
The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012----13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in
FY2013FY2013FY2013FY2013----14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,
the midthe midthe midthe mid----market 8.2market 8.2market 8.2market 8.2 percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.
“While the IT-ITeS segment has to comply with Sarbanes-Oxley, India-specific regulatory mandates are also an
increasing concern. The Information Technology Act of India, and RBI, in 2012, introduced several compliance
measures. Over the next two years Indian FSIs will need to comply with these mandates,” observes Pinakin Dave,
National Manager, Channels & Alliances, McAfee India.
According to Manatosh Das, Senior Analyst, Forrester Research, targeted attacks, APTs, Web application protection, Web
server protection, cloud security, mobility and encryption are the major trends driving the demand.
Targeted attacks and APTsTargeted attacks and APTsTargeted attacks and APTsTargeted attacks and APTs
According to CERT-In, an estimated 14,392 websites were hacked in 2012 till October. “2012 saw an increase in
targeted attacks, and the trend will continue. Such attacks make it difficult to ensure effective incident response
because hackers attack any hardware on the way out,” Dave cautions.
Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru, agrees. “Many of our large enterprise customers have allowed
employees to use social media, but they are unable to track the origin and persistence of zero-day attacks. We are
deploying context-aware intelligent network security solutions for these customers.”
“The exhaustion of IPv4 addresses, evolution of IPv6, and the emergence of the Internet of Things will boost
network security in a big way”
Diwakar Dayal, Lead, Security, Borderless Networks Sales, Cisco India & Saarc
Web application and server protectionWeb application and server protectionWeb application and server protectionWeb application and server protection
Money and spying are the two main motivators for cyber attacks targeting Web servers.
“Consider a scenario of high performance networking. How many data centers have the capability to mitigate advanced
targeted attacks, zero-day vulnerabilities and malwares, and provide CXOs visibility and control over their DCs?” asks
Vishak Raman, Senior Regional Director, Fortinet, India & Saarc.
Hyderabad-based Locuz Enterprise Solutions has set up PoCs with select customers for identity and access
management (IAM). “So far we have deployed five projects, each worth $50,000. The lead-time for these projects is 3-5
months, but once deployed IAM acts as a gateway between the user and the applications,” says Durganadh Venkata,
Senior VP, Business Development & Operations, Locuz.
In a project worth $100,000, Gurgaon-based ACPL Systems consolidated the firewall of a large BFSI customer which was
scattered over 60-70 different locations. “The RoI was clear. We conducted a network audit and showed the company
not only the source of attacks but also the kind of attacks that were entering their network. Once the solution was
deployed, the malicious attacks stopped,” informs Vishal Bindra, CEO, ACPL, Delhi.
IPv6IPv6IPv6IPv6
The Indian government recently updated its IPv6 roadmap which details some pilot projects and a new set of
deliverables to make a complete transition to IPv6 by 2017.
Since IPv6 requires a major upgradation of the network infrastructure, security is a major concern. “The exhaustion of
IPv4 addresses, the evolution of IPv6-oriented technologies, government initiatives to push the transition to IPv6, year-
on-year explosive growth of mobile devices, and the emergence of the Internet of Things will boost network security in
a big way,” forecasts Diwakar Dayal, Lead, Security, Borderless Networks Sales, Cisco India & Saarc.
In addition, organizations with multiple location presence are looking at GRC, SIEM and database security to comply
with multiple regulations. Remarks Prabhu, “They have invested in tools, but don’t have the means to implement a
solution. For instance, I know many large enterprise customers who maintain compliance data in Microsoft Excel sheets.
They are now scouting for GRC solutions but want a cost-effective mechanism.”
Venkata adds, “Many enterprises which are up for upgrade are evaluating IPv6, and that is a huge opportunity.
Migration to IPv6 requires a customer to revisit his security infrastructure and may even require an overhaul if the
networking is too old.”
Cloud securityCloud securityCloud securityCloud security
According to Ashish Dhawan, MD, Asia, Juniper Networks, strict IT budgets, an increasing number of SMBs, broadband
penetration and enterprise mobility are prompting cloud service providers to look at cloud security in a holistic
manner.
“Many CIOs are not conversant with network security. They have to work with constrained budgets, and
therefore, do not provide for network security in their budgets”
Vishal Bindra, CEO, ACPL
Bindra explains that data privacy and the need to adhere to regulations, especially by customers in the pharma and
manufacturing segments, or multi-group companies which have adopted SaaS, are forcing cloud service providers to
invest in network security.
Locuz, which has a cloud services portfolio, helps customers in security assessments before they move to the cloud.
“We are running PoCs with six customers whereby we are helping them to assess their network security. Once they
come on board, detailed network security assessment projects starting at $10,000 add to our services revenue pie,”
reveals Venkata.
MobilityMobilityMobilityMobility
Ambarish Deshpande, MD, India Sales, BlueCoat, quotes from a recent survey which the company undertook. “We
learned that organizations wanted to enable a BYOD policy but were hindered by the fear of data leakage.”
Adds Dhawan, “Mobile devices are an attractive target for cyber-criminals, but organizations cannot restrict customers
or internal stakeholders from accessing mobile devices. Instead, organizations need to improve security by exerting
greater control over their mobile exposure.”
The need of the hour is context-aware intelligent security solutions that recognize the user’s behavior based on the
device and the role of the user. Raman notes that many large enterprises are testing the waters with sand-boxing as a
built-in feature.
ChallengesChallengesChallengesChallenges
Even as vendors launch new products to satisfy their customers’ need to protect their network from newer and
persistent attacks, they admit that partners need to adopt a solutions-based approach to bag large-ticket deals. They
also believe that partners will have to up their ante, train their executives, and develop adequate skill-sets to participate
in bigger projects.
Says Raman, “Many partners do not invest in skill-sets because of the fear of losing the resource to a rival or vendor.
But network security is a complicated process, and partners have to invest significantly to participate in larger projects.
They need to develop a reputation.”
According to Sunil Sharma, VP, Sales & Operations, Cyberoam, “Educating customers is vital. A partner will be able to do
that only if he is clear about the concepts. Once he can convince customers about the importance of network security
he can up-sell and cross-sell solutions. This would help him to form long-lasting relationships.”
Partners however complain that they do not get adequate support from vendors, who prefer to work with tier-1 systems
integrators in large-ticket deals. They also accuse vendors of leveraging the ignorance of CIOs to push their products to
meet targets.
Comments Bindra, “A majority of CIOs are not conversant with the concept of network security. Many have to work with
constrained budgets, and do not even provide for network security in their IT budgets. If anything goes amiss, they
change the product—without going into the reason behind the problem.”
“Network security requires consistent monitoring, and only a security administrator can do the job, especially because it
involves frequent changes in policies,” counsels Moin Shaikh, Director, Innovative Telecom & Softwares, Surat.
Prabhu feels that although CISOs have a holistic understanding of network security, a majority of them buckle under the
pressure of limited budgets and focus only on adhering to compliance and regulations. “The lament is that many CISOs
compromise on network security and are happy to buy UTMs,” says Bindra.
ConclusionConclusionConclusionConclusion
Network security is a vast open field which offers innumerable opportunities to partners. It is now upto partners how
they leverage on the opportunities, and develop profitable business models from them.
http://www.crn.in/feature/trends-that-are-driving-network-security-market?Page=2

Más contenido relacionado

Último

Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 

Último (20)

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 

Destacado

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Destacado (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Trends that are_driving_network_security_market_India 2013

  • 1. Trends That Are Driving Network Security Market ByByByBy Sonal DesaiSonal DesaiSonal DesaiSonal Desai, , Aug 12, 2013, , Aug 12, 2013, , Aug 12, 2013, , Aug 12, 2013 Targeted attacks, APTs, Web application and server protection, IPv6, cloud security and mobility are driving the demand for network security The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012The network security market in India stood at Rs 1,406 crore in FY2012----13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in13, and is expected to be Rs 1,638 crore in FY2013FY2013FY2013FY2013----14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total,14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent of last fiscal’s total, the midthe midthe midthe mid----market 8.2market 8.2market 8.2market 8.2 percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent.percent, small businesses 15 percent, and the government and education segments 32.5 percent. “While the IT-ITeS segment has to comply with Sarbanes-Oxley, India-specific regulatory mandates are also an increasing concern. The Information Technology Act of India, and RBI, in 2012, introduced several compliance measures. Over the next two years Indian FSIs will need to comply with these mandates,” observes Pinakin Dave, National Manager, Channels & Alliances, McAfee India. According to Manatosh Das, Senior Analyst, Forrester Research, targeted attacks, APTs, Web application protection, Web server protection, cloud security, mobility and encryption are the major trends driving the demand. Targeted attacks and APTsTargeted attacks and APTsTargeted attacks and APTsTargeted attacks and APTs According to CERT-In, an estimated 14,392 websites were hacked in 2012 till October. “2012 saw an increase in targeted attacks, and the trend will continue. Such attacks make it difficult to ensure effective incident response because hackers attack any hardware on the way out,” Dave cautions. Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru, agrees. “Many of our large enterprise customers have allowed employees to use social media, but they are unable to track the origin and persistence of zero-day attacks. We are deploying context-aware intelligent network security solutions for these customers.” “The exhaustion of IPv4 addresses, evolution of IPv6, and the emergence of the Internet of Things will boost network security in a big way” Diwakar Dayal, Lead, Security, Borderless Networks Sales, Cisco India & Saarc Web application and server protectionWeb application and server protectionWeb application and server protectionWeb application and server protection Money and spying are the two main motivators for cyber attacks targeting Web servers. “Consider a scenario of high performance networking. How many data centers have the capability to mitigate advanced targeted attacks, zero-day vulnerabilities and malwares, and provide CXOs visibility and control over their DCs?” asks Vishak Raman, Senior Regional Director, Fortinet, India & Saarc. Hyderabad-based Locuz Enterprise Solutions has set up PoCs with select customers for identity and access management (IAM). “So far we have deployed five projects, each worth $50,000. The lead-time for these projects is 3-5 months, but once deployed IAM acts as a gateway between the user and the applications,” says Durganadh Venkata, Senior VP, Business Development & Operations, Locuz. In a project worth $100,000, Gurgaon-based ACPL Systems consolidated the firewall of a large BFSI customer which was scattered over 60-70 different locations. “The RoI was clear. We conducted a network audit and showed the company
  • 2. not only the source of attacks but also the kind of attacks that were entering their network. Once the solution was deployed, the malicious attacks stopped,” informs Vishal Bindra, CEO, ACPL, Delhi. IPv6IPv6IPv6IPv6 The Indian government recently updated its IPv6 roadmap which details some pilot projects and a new set of deliverables to make a complete transition to IPv6 by 2017. Since IPv6 requires a major upgradation of the network infrastructure, security is a major concern. “The exhaustion of IPv4 addresses, the evolution of IPv6-oriented technologies, government initiatives to push the transition to IPv6, year- on-year explosive growth of mobile devices, and the emergence of the Internet of Things will boost network security in a big way,” forecasts Diwakar Dayal, Lead, Security, Borderless Networks Sales, Cisco India & Saarc. In addition, organizations with multiple location presence are looking at GRC, SIEM and database security to comply with multiple regulations. Remarks Prabhu, “They have invested in tools, but don’t have the means to implement a solution. For instance, I know many large enterprise customers who maintain compliance data in Microsoft Excel sheets. They are now scouting for GRC solutions but want a cost-effective mechanism.” Venkata adds, “Many enterprises which are up for upgrade are evaluating IPv6, and that is a huge opportunity. Migration to IPv6 requires a customer to revisit his security infrastructure and may even require an overhaul if the networking is too old.” Cloud securityCloud securityCloud securityCloud security According to Ashish Dhawan, MD, Asia, Juniper Networks, strict IT budgets, an increasing number of SMBs, broadband penetration and enterprise mobility are prompting cloud service providers to look at cloud security in a holistic manner. “Many CIOs are not conversant with network security. They have to work with constrained budgets, and therefore, do not provide for network security in their budgets” Vishal Bindra, CEO, ACPL Bindra explains that data privacy and the need to adhere to regulations, especially by customers in the pharma and manufacturing segments, or multi-group companies which have adopted SaaS, are forcing cloud service providers to invest in network security. Locuz, which has a cloud services portfolio, helps customers in security assessments before they move to the cloud. “We are running PoCs with six customers whereby we are helping them to assess their network security. Once they come on board, detailed network security assessment projects starting at $10,000 add to our services revenue pie,” reveals Venkata. MobilityMobilityMobilityMobility Ambarish Deshpande, MD, India Sales, BlueCoat, quotes from a recent survey which the company undertook. “We learned that organizations wanted to enable a BYOD policy but were hindered by the fear of data leakage.” Adds Dhawan, “Mobile devices are an attractive target for cyber-criminals, but organizations cannot restrict customers
  • 3. or internal stakeholders from accessing mobile devices. Instead, organizations need to improve security by exerting greater control over their mobile exposure.” The need of the hour is context-aware intelligent security solutions that recognize the user’s behavior based on the device and the role of the user. Raman notes that many large enterprises are testing the waters with sand-boxing as a built-in feature. ChallengesChallengesChallengesChallenges Even as vendors launch new products to satisfy their customers’ need to protect their network from newer and persistent attacks, they admit that partners need to adopt a solutions-based approach to bag large-ticket deals. They also believe that partners will have to up their ante, train their executives, and develop adequate skill-sets to participate in bigger projects. Says Raman, “Many partners do not invest in skill-sets because of the fear of losing the resource to a rival or vendor. But network security is a complicated process, and partners have to invest significantly to participate in larger projects. They need to develop a reputation.” According to Sunil Sharma, VP, Sales & Operations, Cyberoam, “Educating customers is vital. A partner will be able to do that only if he is clear about the concepts. Once he can convince customers about the importance of network security he can up-sell and cross-sell solutions. This would help him to form long-lasting relationships.” Partners however complain that they do not get adequate support from vendors, who prefer to work with tier-1 systems integrators in large-ticket deals. They also accuse vendors of leveraging the ignorance of CIOs to push their products to meet targets. Comments Bindra, “A majority of CIOs are not conversant with the concept of network security. Many have to work with constrained budgets, and do not even provide for network security in their IT budgets. If anything goes amiss, they change the product—without going into the reason behind the problem.” “Network security requires consistent monitoring, and only a security administrator can do the job, especially because it involves frequent changes in policies,” counsels Moin Shaikh, Director, Innovative Telecom & Softwares, Surat. Prabhu feels that although CISOs have a holistic understanding of network security, a majority of them buckle under the pressure of limited budgets and focus only on adhering to compliance and regulations. “The lament is that many CISOs compromise on network security and are happy to buy UTMs,” says Bindra. ConclusionConclusionConclusionConclusion Network security is a vast open field which offers innumerable opportunities to partners. It is now upto partners how they leverage on the opportunities, and develop profitable business models from them. http://www.crn.in/feature/trends-that-are-driving-network-security-market?Page=2