表紙
市場調查報告書

整合型網路安全組成架構:亞太地區的產業指南 (2020年)

Asia-Pacific Integrated Cybersecurity Framework Industry Guide, 2020

出版商 Frost & Sullivan 商品編碼 929272
出版日期 內容資訊 英文 59 Pages
商品交期: 最快1-2個工作天內
價格
整合型網路安全組成架構:亞太地區的產業指南 (2020年) Asia-Pacific Integrated Cybersecurity Framework Industry Guide, 2020
出版日期: 2020年03月03日內容資訊: 英文 59 Pages
簡介

整合型網絡安全組成架構是主要供應商對網絡安全的未來寄予厚望的產品。這不是一種新方法,但是近年來它變得越來越流行。整合型網絡安全組成架構實施了一套一致的策略和規則,與點解決方案相比具有三大優勢。這樣可以提高控制和管理的一致性。它可以更深入地了解攻擊情況,並通過開放性促進協作。

本報告提供亞太地區的整合型網路安全組成架構市場相關調查,提供網路安全運用的課題,網路安全組成架構的目前方案,整合型網路安全組成架構提供的重要價值,整合型網路安全組成架構和傳統安全方法相比主要的優點與課題,亞太地區主要的整合型網路安全企業等相關分析。

摘要整理

整合型網路安全組成架構範例定義

  • 定義:整合型網路安全組成架構
  • 整合網路安全組成架構的適用範圍

網路安全的運用課題

  • 目前網路安全運用的課題

整合型網路安全組成架構的價值

  • 目前網路安全方案

傳統方法 vs. 整合型方法

  • 傳統安全組成架構:最好的方法
  • 整合型安全組成架構:整體方法

整合型網路安全組成架構供應商的簡介

  • 市場形勢
  • 檢測定義
  • 供應商評估表
  • 查核點軟體技術
  • Cisco Systems
  • FireEye
  • Fortinet
  • McAfee
  • Palo Alto Networks
  • Pulse Secure
  • Symantec

成長機會·推薦行動

  • 網路安全生態系統的變革
  • 成長機會1:企業需要理解整合型組成架構能提供的優點
  • 成長機會2:對於整合品牌內部和生態系統外部都非常重要
  • 成長機會3:需要擴展產品組合以盡可能填補企業課題
  • 成功與成長的戰略要務

結論

附錄

關於Frost&Sullivan

目錄
Product Code: PAF5-74

A Changing Security Approach Increases Visibility, Openness, and Consistency to Fortify the Attack Surface via Unified Policies and Configurations, Centralized Views, and Proactive Responses

An integrated cybersecurity framework is an offering by leading vendors aimed at the future of cybersecurity; while not a new approach, it has become increasingly popular in recent years. A unified cybersecurity framework applies a consistent set of policies and rules, with 3 key advantages over point solutions: it allows for more consistency in control and management; it provides more visibility into the attack landscape, and it promotes collaboration through openness.

In part, this is due to the rapid digital transformation today, leading to an increasing threat surface that may render companies more susceptible to cyberattacks. In particular, the rise in zero-day attacks is difficult to combat due to the speed at which they can occur. Thus, it is necessary for companies to adopt a more comprehensive set of solutions. Such solutions may increase the visibility of the threat landscape by offering a view from a single pane of glass.

Additionally, due to the rise in number of solutions required for cybersecurity, the integrated security framework can vastly simplify cybersecurity by streamlining processes. This will not only reduce the costs of operation and maintenance, but also reduce downtime and time to deployment, thus making it more cost efficient.

The study acknowledges that there are several disincentives to swapping to the integrated security framework as highly regulated organizations, especially banks and governments, tend to prefer best-of-breed solutions. However, upon conducting market research, Frost & Sullivan contends that integrated security is a trend that most vendors are moving towards and should utilize in order to keep up with the changing dynamics in cybersecurity today.

The integrated security approach has become increasingly popular in recent years given the rise in potential threat vectors to the enterprise. As customers move toward digitization and virtualization, there is an increase in the number of vendors offering their vision of an integrated security framework with a best-of-suite approach.

For purposes of this analysis, the vendors included are those that have cybersecurity solutions which cover at least 3 out of 5 of the following security controls: network, endpoint, application, cloud and content. They should also have a strong integration portfolio.

Vendors profiled in this Asia-Pacific Integrated Cybersecurity Framework Industry Guide include: Check Point Software Technologies, Cisco Systems, FireEye, Fortinet, McAfee, Palo Alto Networks, Pulse Secure, and Symantec.

Key Issues Addressed:

  • What are the challenges in cybersecurity operations?
  • What are the current scenarios in cybersecurity frameworks?
  • What are the key values that integrated cybersecurity frameworks provide?
  • What are the key advantages and key challenges of traditional security approaches versus integrated cybersecurity frameworks?
  • Who are the key integrated cybersecurity players in Asia-Pacific?
  • What are the growth opportunities and calls to action?

Table of Contents

Executive Summary

  • Key Findings

Defining the Integrated Cybersecurity Framework Paradigm

  • Definition-Integrated Cybersecurity Frameworks
  • Definition-Integrated Cybersecurity Frameworks (continued)
  • Coverage of Integrated Cybersecurity Frameworks
  • Coverage of Integrated Cybersecurity Frameworks (continued)

Challenges in Cybersecurity Operations

  • Challenges in Cybersecurity Operations Today
  • Challenges in Cybersecurity Operations Today (continued)
  • Challenges in Cybersecurity Operations Today (continued)

The Value of an Integrated Cybersecurity Framework

  • Today's Cybersecurity Scenarios

Traditional Approach versus Integrated Approach

  • Traditional Security Framework-Best-of-Breed Approach
  • Integrated Security Framework-Holistic Approach

Integrated Cybersecurity Framework Vendor Profiles

  • Market Landscape
  • Measurement Definitions
  • Vendor Assessment Table
  • Check Point Software Technologies
  • Check Point Software Technologies (continued)
  • Cisco Systems
  • Cisco Systems (continued)
  • FireEye
  • FireEye (continued)
  • Fortinet
  • Fortinet (continued)
  • McAfee
  • McAfee (continued)
  • Palo Alto Networks
  • Palo Alto Networks (continued)
  • Pulse Secure
  • Pulse Secure (continued)
  • Symantec
  • Symantec (continued)

Growth Opportunities and Companies to Action

  • Transformation in the Cybersecurity EcosystemMany
  • Growth Opportunity 1-Enterprises Need to Understand the Benefits that Integrated Frameworks can Offer
  • Growth Opportunity 2-Crucial to Have Integration Both Within the Brand and Outside of the Ecosystem
  • Growth Opportunity 3-Need to Expand the Portfolio to Cover as Many Enterprise Pain Points as Possible
  • Strategic Imperatives for Success and Growth

The Last Word

  • The Last Word
  • Legal Disclaimer

Appendix

  • List of Exhibits

The Frost & Sullivan StoryThe Journey to Visionary Innovation

  • The Frost & Sullivan Story
  • Value Proposition-Future of Your Company & Career
  • Global Perspective
  • Industry Convergence
  • 360º Research Perspective
  • Implementation Excellence
  • Our Blue Ocean Strategy