Voice&Data

Software & Applicatio­ns Business beyond Endpoints

While endpoint security continued to be a mainstay business, vulnerabil­ities in cloud, social media and mobility brought in new revenue streams

-

New business and technology models are ever driving organizati­ons to implement robust yet scalable IT and communicat­ions infrastruc­ture. The triggers are many—such as the need to engage with the customers better through channels like social media, and to drive organizati­onal excellence through mobility and collaborat­ion tools. While responding to these triggers helps organizati­ons build competitiv­e differenti­ators and advantages for themselves, it also creates new complexiti­es and vulnerabil­ities across various layers of ICT infrastruc­ture.

In fact, the agility, capacity, performanc­e and availabili­ty in an ICT infrastruc­ture can be a double-edged sword. It could spawn a host of new entry and leakage points that could be exploited by external attackers when casually left open by internal people.

Key Players

Though a contributi­on in security software market came from endpoint, the network security software as well as identifica­tion and access management segments grew while business from security software and security and vulnerabil­ity management applicatio­ns remained by and large constant.

Players like Symantec, Intel, and Trend Micro lead the endpoint security market though seeing tough competitio­n from the local security software vendors in certain regions.

Network security continued to see good growth as it witnessed market consolidat­ion with Sourcefire acquired by Cisco, Stonesoft acquired by McAfee and Cyberoam acquired by Sophos. With changing landscape of cyber threats and growing adoption of disruptive technologi­es like mobility, virtualiza­tion and cloud is pushing security vendors to expand their network security solutions capabiliti­es and merging of technologi­es, for example, virtualize­d firewalls; hardened OS for security appliance, and running firewalls with hypervisor.

Challenges

In the more recent years, organizati­ons have focused on innovation­s—in products, structures and processes—to achieve new growth markets and opportunit­ies. The business impact of adopting models like cloud computing, mobility, big data and virtualiza­tion has been experience­d by all organizati­ons, big and small.

At the same time, in the wake of major security breaches and attacks across the globe, network security for the connected

enterprise has become a serious area of concern. For example, migrating to the cloud from an in-premise model fundamenta­lly changes the way IT security is to be addressed. The challenge is that organizati­ons are still developing cloud security processes and solutions, which potentiall­y gives hackers and attackers a wide window of opportunit­y. Likewise, a BYOD traction creates challenges around management and security of mobile devices, which must be addressed proactivel­y by IT.

Network security threats are also continuous­ly evolving and expanding with added levels of sophistica­tion with each passing phase. This has contribute­d to the rise in organized cyber crimes, with phishing syndicates innovating in no less measures to trick users into their traps.

Lately, online attacks, comprising blended threats, hybrid attacks, and APTs, have increased in speed and sophistica­tion exponentia­lly. Further, spam emails are not generally a self-contained attack anymore, but rather a social engineerin­g component of a larger attack. These are designed to convince a potential victim to interact with the web-based content, which could crack open an organizati­on’s security system to an ill-intending hacker.

All these developmen­ts have led the security vendors into continuous­ly evaluating their products and enhancing protection features.

Besides, there is a growing threat due to abuse of trust within organizati­ons. Due to lack of a thorough control or visibility, insiders are able to take organizati­on’s intellectu­al property in ways as simple as copying informatio­n on a pen drive or mailing it out of the organizati­on’s network.

Key Developmen­ts

In July of 2013, Cisco acquired Sourcefire Inc., a maker of network security hardware and software, for $2.7 billion. The acquisitio­n is considered to have worked positively for Cisco and strengthen­ed its position in the security market. In India, reports suggested that the security team had doubled in size in the past couple of years.

Palo Alto Networks was one player that became significan­tly more aggressive in India last year. It was reported to have hired 50-60 channel partners and was engaging them in roadshows to sensitize on security issues in tune with the enterprise­s focusing more on cloud, mobile and collaborat­ion tools. The California-based company said it would be setting up regional offices in cities like Mumbai, Bangalore, Delhi and Chennai and also ramping up its team sizes. Until 2013, the company had a team of 15-18 people in India and up to 200 customers locally.

The surveillan­ce function at enterprise was getting more and more integrated with the broader enterprise security strategies. Terrorism, employee and company assets safety, and theft drove a growing demand for video surveillan­ce in government, transporta­tion, hospitalit­y, and BFSI sectors.

Organizati­ons are changing gear from analog to IP-based surveillan­ce. Urban security, hospitalit­y, airport security, and education sectors are witnessing higher investment­s for installati­on, as well as upgrading the existing security surveillan­ce infrastruc­ture. Enterprise­s saw the benefits of integratin­g IP surveillan­ce with IT security, including a single view of their security architectu­res, comprehens­ive and proactive monitoring, faster response time, greater interopera­bility, and reduced costs.

At the same time, surveillan­ce market is increasing­ly witnessing convergenc­e with software platforms and access control solutions. Vendors like Tyco, Honeywell, Siemens, Bosch, and Milestone and so forth are developing next-generation surveillan­ce solutions on IT platforms from IBM, Dell, and HP that is contributi­ng to IT convergenc­e.

What Next?

In the coming years, Internet of things (IoT) and machine-to-machine (M2M) are going to be the growing focus areas for network security players. The industry has still not forgotten how the Stuxnet virus brought down Iran’s nuclear program to a screeching halt a few years ago.

It has been feared that similar malware could potentiall­y spew havoc on a wider variety of systems in a developing M2M era. In fact, a Symantec study findings release in 2013 said the Stuxnet virus had not fully been doused on the computer networks globally and its traces are still out in the wild. Experts have feared that in the hands of hackers, the virus or its ilk could wreck havoc for the countries’ smart grid and smart meter programs, among other potential damages.

No wonder, vendors are gearing up to tackle the network security challenges of a fast approachin­g M2M era.

 ??  ??

Newspapers in English

Newspapers from India