Gartner Security & Risk Management Summit 2013

  • 11 June 2013
  • 3 replies

Userlevel 7
As some of you may or may not know, the Gartner Security & Risk Management Summit in Washington D.C began yesterday. Below are some of the key takeaways from a busy Day 1.
1. The Security Industry is growing at a Compound Annual Growth Rate (CAGR) of 9%. Last year, UT was at $60.5 billion dollars. This year? $65.735 billion dollars. And in 2016, it's projected to grow to $85 billion.
2. Endpoint protection leads the way of 'Most actively deployed security technology' with 87%. Close behind is Web filtering/blocking with 86%, and Standalone Antivirus rounds of the top three with 84%.
3. The least deployed security technology is Mobile Device Management, with just 45%.
4. When it comes to the top technology customers plan to deploy in the next year, Mobile Device Management is leading the pack with 51% (see below).
  • Mobile Device Management = 51%
  • Data Loss Prevention = 32%
  • Advanced Threat Detection/Prevention = 26%
  • Unified Threat Management = 25%
  • Web filtering = 9%
  • Endpoint Protection = 8%
5. Back in 2011 and 2012, Security Intelligence capabilities was a major theme in terms of security industry acquisitions. Gartner is predicting the MDM censors will be the key acquisition targets this year and in 2014.
6. Below is the list of key drivers for M&A transactions in the security industry.
  • Mobility – acquirers are seeking technologies that can secure and protect mobile devices
  • Competition among the big vendors – greater competition and need to acquire to keep up
  • Security Awareness – Is now a board level issue for companies and #1 Gartner requested inquiry is fielding questions from large end users about enhancing security
  • Attackers Getting Smarter – Larger industry players need innovative startups to fill out their product portfolios
  • Security Intelligence –  that brings action to integration
  • Product and Bundle Synergies – Buyers like security suites and Gartner recommends them
  • G&A Efficiencies – Larger players know acquisitions can be profitable because of G&A cost reductions post integration
  • Channel Synergy – Larger players can market newer acquired technologies through existing distribution and channel networks
7. When it comes to the fastest growing international markets for security tech, China is leading the way with a 19.1% CAGR. (See below)
  • China – 19.1% CAGR
  • APAC = 16.1%
  • Latin America = 14.3%
  • Middle East = 9.4%
8. Three of the top trends that Gartner recommends security vendors focus on are MDM, Big Data, and Advanced Persistent Threats. They also recommend building around the following issues:
Network Inspection and Reputation Analysis
  • Gateway behavioral monitoring
  • Local application control
  • Data protection (from exfiltration)
  • Fraud monitoring
9. Finally, Gartner's general recommendations include the following:
  • Adjusting marketing to be better aligned with the top trends like MDM.
  • Partnering with third party vendors.
  • Reviewing and enhancing product capabilities to support BYOD and virtualization security concerns.
  • Examining product roadmaps and align them to increase function/features  around key market interest areas such as Mobility and Security Context. 
  • Driving changes in your portfolio to deliver SaaS – customers are significantly more interested in paying for security by the drink rather than as an upfront CAPEX.
  • Considering advanced uses of security context – such as real time policy enforcement in response to actionable threats.
  • Trying to create a leading position as a point solution in security context/intelligence or mobile device protection to prepare your business for acquisition.

(Source: Gartner)

3 replies

Userlevel 7
And here are two photos from the Summit!


Userlevel 7
Hey all,
The Gartner Security & Risk Management Summit 2013 is officially over. And it it was another great security event that Webroot was fortunate enough to attend!
Below are some general recaps of talks and stats.
Day 2:
  • Interesting stats from IBM's sessions on APTs: On average, an organization sees about 73,000 identified attacks per year. This equates to 90.2 incidents a year (or 1.2 a week).
  • Endpoint Consumer as 'King' /controlling new types of endpoint devices session: Traditional PC's now focus on app controls, implement MDM for mobile devices, use cloud-based Secure Web Gateway's as a backdoor defense for devices, and are focusing on BYOD as it pertains to data and transaction security.
Day 3:
  • Big Data is as important as ever; Volume Variety and Velocity are crucial to solve issues and reach towards context aware security.
  • Gartner predicts that by 2016, 40% of enterprises will actively analyze at least 10 terabytes of data for security intelligence. Currently, the number is around 3%.
  • Network Security Prediction session: The prediction is that cloud-based Secure Web Gateways will grow from 13% (today) to 25% by 2015.
There was also an interesting study/presentations done by Gartner regarding iPad Data Safety that focused on how iOS devices (for both consumer and business) will fare through the next three years, security strengths and challenges of iOS devices, and how companies can cope with privacy and security challenges. Below are a few interesting graphics:


(Source: Gartner)
As you can see, the two graphics paint somewhat of an opposing picture. On the one hand, as seen in the first graphic, both Apple and Android are predicted to stay relatively consistent as where they are in now in regards to market share by 2015. One the other hand, companies will continue to prefer a predictable OS with a small number of models and a more locked down environment.
From a Webroot perspective, these graphics reiterate the security importance, albeit different for each OS, is clearly going to play a major role moving forward in a BYOD world. Currently, Webroot SecureAnywhere Business Mobile Protection supports both Android and Apple devices that can be controlled from a single management console.
Userlevel 7
The following is a update on gartner Security Risk

Quote/ Big data left isolated by security policies: Gartner
By  Stephen McBride Published  June 12, 2014  Summary/Chief information security officers (CISOs) should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos and financial liability, according to Gartner, Inc.
The research firm predicts that, from now until 2016, more than 80% of organisations will fail to develop a consolidated data security policy across silos, leading to potential noncompliance, security breaches and financial liabilities. full read here/