Mak­ing a Steady Im­pact

Voice&Data - - CONTENTS -

Se­cu­rity.threats.are.evolv­ing.par­al­lely.with.the. on­­­nolo­gies—a.­cu­rity.mar­ket..

As the world of com­mu­ni­ca­tion evolves, the most pre­cious thing is in­for­ma­tion. A day might come when coun­tries may have cy­ber wars. As com­pared to a decade ago, there is a ris­ing con­cern and aware­ness about se­cu­rity and this is keep­ing the se­cu­rity wheel run­ning smoothly. In­dus­try stal­warts’ say the mar­ket wit­nessed con­sid­er­able growth even when the econ­omy was weak.

This year, al­though there was de­pre­ci­a­tion of In­dian cur­rency (which is phe­nom­e­nally low as com­pared to any other place in the world), yet many com­pa­nies did not lose deals. Nev­er­the­less, the deal sizes shrunk for many se­cu­rity play­ers.

In­dus­try Trends

Both con­sumers and en­ter­prises have in­creased the pur­chase of mul­ti­ple secu- rity tools such as an­tivirus, an­ti­spy­ware, fire­wall, in­tru­sion de­tec­tion, etc. For the end­point se­cu­rity soft­ware mar­ket, the con­sumer mar­ket is also as big as the cor­po­rate mar­ket. The cor­po­rate mar­ket is ex­pand­ing its fea­tures in­clud­ing browser se­cu­rity, en­cryp­tion, and cen­tral­ized man­age­ment.

The net­work se­cu­rity mar­ket is one of the most dy­namic ar­eas in the tech­nol­ogy sec­tor. Some of the com­mon trends are:

UTM is a key trend with ser­vice providers and en­ter­prise of all sizes are re­al­iz­ing the ben­e­fits con­sol­i­da­tion brings over point so­lu­tion in terms of cost and ef­fec­tive­ness against the blended threatscap­e. Nmerg­ing pref­er­ence to of­fer cloud based pub­lic and pri­vate ap­pli­ca­tions is also driv­ing the de­mand for UTM prod­ucts.

Adop­tion of vir­tu­al­iza­tion by large en­ter­prises. Vir­tu­al­iza­tion, with its roots in the car­rier space, is fast gain­ing recog­ni­tion by leading en­ter­prise net­works in the world as a per­fect con­ver­gence so­lu­tion with con­sol­i­da­tion to achieve hy­per-cost ben­e­fits while im­prov­ing ef­fi­ciency in the data cen­ter.

MoT has man­dated In­dian tel­cos to be re­spon­si­ble for se­cu­rity of their own net­works. They should also have an or­ga­ni­za­tional pol­icy on se­cu­rity and se­cu­rity man­age­ment of their net­works.

The RBI man­date is also forc­ing banks to fol­low the guide­lines laid down by it on in­for­ma­tion se­cu­rity. Fol­low­ing these guide­lines, banks have been draft­ing and im­ple­ment­ing their IT se­cu­rity poli­cies, and thus have been in­vest­ing in net­work se­cu­rity so­lu­tions to curb their vul­ner­a­bil­i­ties against cy­ber crime and fraud. Such gov­ern­ment reg­u­la­tions have also prompted

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.