The document discusses key security trends for 2013, including the convergence of cloud and mobile technologies, the evolution of the IT security market, and threats arising from social media and consumerization. It notes growing security issues from critical infrastructure becoming internet-connected and the impact of virtual threats spilling into the physical world. The security market is forecast to significantly grow in areas like mobile, virtualization, and DLP. The document concludes that cyberespionage and cyberattacks are becoming more strategic threats as IT becomes embedded in many industries.
2. 2
Agenda
The Coming Together of Cloud and Mobility
IT Embedded Across Industries
IT Security Market Evolution
Social Media and Consumerisation
Cloud and Mobile Threats
3. 3
The Coming Together of Computing and Mobility
1970s1960s 1980s 1990s 2000
Mainframe
Supercomputer
2010
Cloud
Smart Phones
&
Tablets
Personal
Computer
Laptop/
Notebook
Mobile
Phone
(2G)
4. 4
Mobile Ahead as Means of Connecting to the Internet
4
Source: Statcounter Global Stats, KPCB
5. 5
Bandwidth Requirements
Emails
Internet
browsing
Social Networking
Online
Shopping
P2P File
Sharing
Real time Communications
Smart City Infrastructure
Tele-medicine
Connected Cars
Tele-education
Smart Grids
Next Generation TV
M2M
Application/ContentRequirements
< 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps
Rich Communications o Increasing demand from consumers
for virtual equivalent communication
and entertainment experiences. For
example, low latency in high graphics
gaming.
o Demand from enterprises (e.g. SMEs)
for cost effective productivity
applications such as cloud computing.
o Demand from the public sector to
increase administrative efficiency via
smart city infrastructure.
NBN: Possibilities
ConvergenceBasic
Cloud Computing
High Speed Networks and Convergence
6. 6
Example: Self-Driving Automobiles
• Google has been working on this for four years
now.
• Automobile manufacturers are also
researching including GM, BMW and Audi
• February 2012 – Nevada passes first laws in
the USA to allow driverless cars on its
highways.
• General Motors predicts the technology will
be standard by 2020.
Convergence of different industries? Security
Implications?
7. 7
‘Virtual’ World Security Issues Massively Impacting
‘Physical’ World
South Korea
Steps Up
Security at
Nuclear Plants
8. 8
1985-1995 1995-2005 2005-2015 2015 Onwards
Source: Frost & Sullivan.
Maladvertising
,Ransonware
PC Viruses
Spam
Internet
Viruses
Phishing,
Bots,
Spyware
DDOS,
Worms,
Trojans
Social Media,
Mobile, Cloud,
APTs Watering
holes
Impact
Cyber-
everything,
Threat Evolution and Impact
10. 10
Social Media is now a Key Part of Customer Experience
Customers are
discussing your
products/services
Customers are sharing experiences online
Social Media gives you the ability to listen to customers,
even when they are not calling you
Social Media has the power to significantly impact your
business, so ignoring this channel is no longer an option
11. 11
Social Media becomes Preferred Platform for Malware
• Social media is becoming the
most attractive platform for
malware as mobile devices
become the most attractive
hardware
• Young people are often very
susceptible to social media
scams as they are often less
cautious about sharing personal
information
• Spam and phishing is shifting to
social media platforms
12. 12
Public
Domain
Personal
Domain
Professional
Domain
What the Individual wants:
Persona Integration
Single Device Mentality
Freedom of Choice
Conflict Theatre – The Human Factor
What the Enterprise wants:
Persona Differentiation
Visibility into User Behaviors
Power of Control
Public
Domain
Professiona
l Domain
Personal
Domain
Source: Frost & Sullivan
13. 13
3.6
3.83.8
4.1
4.2
2.0
3.0
4.0
5.0
CostService Level
Agreement (SLA)
Service OfferingsUptime and
Reliability
Concerns
Security & Data
Privacy Concern
How would you rate the level of impact that the following factors have in your decision
making when it comes to cloud services in general?
MeanScore
APAC End-User Study – Adopting Cloud Services
N = 210.
Source: Frost & Sullivan
14. 14
Mobile Security Revenue Forecast
-20.0
-10.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
90.0
100.0
2011 2012 2013 2014 2015
Revenue 21.9 30.2 51.3 69.5 89.2
Growth Rate 37.9 69.9 35.5 28.3
Revenue($Million)
Mobile Security Market: Revenue Forecast
APAC, 2012–2015
CAGR = 43.5%
-
GrowthRate
(%)
Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
15. 15
Android: A Mecca for Malware
• OS fragmentation – mobile carriers not pushing updates aggressively enough.
Google controlled Nexus 4 is much more secure.
• Exposed source code and dominant mobile platform.
• Source of malware is often apps e.g, fake Instagram and fake Angry Birds that
send messages to premium rate SMS services.
• Linux based code is familiar territory for many hackers
• Will Google and the carriers respond?
16. 16
Conclusions
• IT security is now having a profound effect on the „physical world‟.
• Embedded IT is massively increasing the potential impact
• Cloud, mobile and social are driving new security threats
• Cyberespionage and cybersabotage are becoming a reality. – more state
sponsored cyber attacks
• “Just as nuclear was the strategic warfare of the industrial era, cyber warfare
has become the strategic warfare of the information era” US Secretary of
Defence, Leon Panetta.
17. 17
Thank You
For further questions and enquiries
Andrew Milroy
Vice President - ICT
Frost & Sullivan
Email: andrew.milroy@frost.com
Twitter: andy1994