Www.idc.com Copyright 2006 IDC Reproduction is forbidden unless authorized. All rights reserved. Information Security Trends.

Slides:



Advertisements
Similar presentations
Govern the Flow of Data: Moving from Chaos to Control
Advertisements

McAfee One Time Password
Leveraging Technology for Growth David Cannon Program Manager, Telecommunications IDC Australia.
Autenticazione e Gestione delle Identità Giacomo Aimasso – CISM – CISA.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
The State of Security Management By Jim Reavis January 2003.
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
RSA SecurID November 10, 2005.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Windows 7 & Office 2010 Glenn Osako Partner Territory Manager West Region SMB Microsoft Corporation Best productivity on a modern foundation.
Product Offering Overview CONFIDENTIAL AND PROPRIETARY Copyright ©2004 Universal Business Matrix, LLC All Rights Reserved The duplication in printed or.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
All Rights Reserved © Alcatel-Lucent | Presentation Title | Month 2009 Office Mobility Solutions Office Solutions Group Philippe JEAN February 4th,
Identity and Access Management Business Ready Security Solutions.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Unify and Simplify: Security Management
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Sudha Iyer Principal Product Manager Oracle Corporation.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Identity Assurance Emory University Security Conference March 26, 2008.
COPYRIGHT © 2008, BUSINESS OBJECTS S.A. GROWING AN ON-DEMAND BUSINESS, SIIA EUROPE 08 Mani Gill, VP of OnDemand.
Teamplay Connect, compare, collaborate.
Connect Applications and Business Partners in Integration Cloud, the Reliable and Transparent Integration Environment Built on Microsoft Azure MICROSOFT.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Fraud Detection and Prevention.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Identity and Access Management
Cloud-First, Modern Windows Management and Security
Overview – SOE PatchTT November 2015.
Data and Applications Security Developments and Directions
SmartHOTEL Solutions Powered by Microsoft Azure Provide Hoteliers with Comprehensive, One-Stop Automated Management of All Booking Channels MICROSOFT AZURE.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Identity and Access Management.
Interlake Hybrid Cloud Management Suite
Check Point Connectra NGX R60
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Unified Communications in the Call Center
Securing the Threats of Tomorrow, Today.
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Microsoft Data Insights Summit
In the attack index…what number is your Company?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
OU BATTLECARD: Oracle Identity Management Training
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Identity and Access Management Market Worth Over $20 bn by 2025:
Presentation transcript:

Copyright 2006 IDC Reproduction is forbidden unless authorized. All rights reserved. Information Security Trends

IAM Market Drivers 2004/2005 Compliance Regulations Enterprise SSO Password Management NAC

2006 and Beyond: Trends in Identity and Access Mgt  Compliance still a primary driver, will enter SMB  Proliferation of Partnerships: IAM infrastructure + Adv. Auth. technologies  Hybrid USB tokens, Smart Cards continue to evolve  Viable consumer market emerges in 2007/2008  Suite providers continue to do well, provide necessary foundation for full SOA-enabled environments

Worldwide IAM Compliance 2005–2010 Revenues and Year-to-Year Growth ,000 1,500 2,000 2, (US$M)

Worldwide Authentication Token Revenue by Type HW Token USB Token SLAT* Auth. Server Source: IDC, 2005 $492. $764. ($M) *Software Licensing Authentication Tokens

Application-Centric; An Emerging Approach to IAM Companies such as SAP and Sun partnering for more cohesive application-centric Identity Infrastructure solutions Example: Sun’s Java System Identity Mgt Suite now integrated with SAP’s Virsa Access Enforcer Provides customers with: –realtime insights into user access and resources –automates manual process for prov./deprov. –enhances compliance capabilities –automatic detection, notification and remediation

App-centric IAM, continued Oracle also leading this charge Will be migrating IAM suite over time to function not only as part of app-server solution, but will integrate with Oracle apps suite as well. Will provide customers with following benefits: –automate account creation with role privileges – part of a single business process within org. – reduces maintenance –reduces man hours – reduces cost

Web-Services and IAM Come of Age Companies migrating towards Web Services. This will allow IAM vendors to:  Morph access control technology into a set of container-based functions  Have these functions will be delivered as part of a standards-based middleware policy framework  Eventually enable IT professionals to deliver security as as set of services, eliminating the need for separately upgrading each and every system on the network

ID&AM Trends and Directions Multi-Factor Authentication System Mgt-Centric ID Application-Centric ID SOA & WS NAC Wireless

Information Security Trends (1 of 3)  External and Internal Criminals Will Begin Fixing Security Vulnerabilities on Attacked Sites  Attackers Will Exploit Vulnerabilities in Previously Installed Spyware and Other Malicious Code  Skype and Other VoIP Products, Along with Associated Instant Messaging Applications, Will Receive More Attention from Corporate Customers  Customers Will Build Internal Policy Controls That Extend Previous Regulatory Compliance Efforts

Information Security Trends (2 of 3)  In Response to Growing Consumer Issues such as Privacy Disclosures, Identity Fraud, and Rising Public/Private Oversight, Online Financial and Merchant Services Will Require Stronger Authentication Methods Beyond Simple PINs and Passwords  Attackers and Legitimate Security Researchers Will Broaden Their Scope  As Network Devices Embed More Security Features, We Believe That the Market Will Move Toward Proactive Management to Handle Increasingly Heterogeneous Security Environments

Information Security Trends (3 of 3)  Unified Threat Management Will Increasingly Dominate Security Appliances, and Other Software Security Products Will Increasingly Migrate to Appliance-Based Platforms  Consumer Security Will Move from Products to Services  Over the Next Five Years, We Believe That IT Security Will Slowly Start to Assimilate Physical Security such as Door Systems and Video Surveillance

Server Security Requirements for Vertical Markets  Financial Server requirements have 50% mainframe  Mainframe tends to be more centralized.  Healthcare is less IT intensive, less centralized  Healthcare is further behind financial services in developing IT  Financial Service data is more secure and GLBA affects privacy

Emerging Killer Apps in Security?  Virtual hosted desktops — not a killer and not even a mainstream.  Virtual Hosted Clients — with virtualized server contain many copies of desktop. No local data availability just bring home the RDP client. Very limiting.  Conclusion: killer apps do not come along very often.

OS & Security?  OS Vendors MUST be perceived as secure.  Today’s security products are tomorrow’s features.  Pop up blockers are not part of IE and toolbars.  Anti-spyware is now part of IE and toolbars.