NEWS: 公告在東京證券交易所JASDAQ標準市場新上市


整合型網路安全組成架構:亞太地區的產業指南 (2020年)

Asia-Pacific Integrated Cybersecurity Framework Industry Guide, 2020

出版商 Frost & Sullivan 商品編碼 929272
出版日期 內容資訊 英文 59 Pages
商品交期: 最快1-2個工作天內
整合型網路安全組成架構:亞太地區的產業指南 (2020年) Asia-Pacific Integrated Cybersecurity Framework Industry Guide, 2020
出版日期: 2020年03月03日內容資訊: 英文 59 Pages





  • 定義:整合型網路安全組成架構
  • 整合網路安全組成架構的適用範圍


  • 目前網路安全運用的課題


  • 目前網路安全方案

傳統方法 vs. 整合型方法

  • 傳統安全組成架構:最好的方法
  • 整合型安全組成架構:整體方法


  • 市場形勢
  • 檢測定義
  • 供應商評估表
  • 查核點軟體技術
  • Cisco Systems
  • FireEye
  • Fortinet
  • McAfee
  • Palo Alto Networks
  • Pulse Secure
  • Symantec


  • 網路安全生態系統的變革
  • 成長機會1:企業需要理解整合型組成架構能提供的優點
  • 成長機會2:對於整合品牌內部和生態系統外部都非常重要
  • 成長機會3:需要擴展產品組合以盡可能填補企業課題
  • 成功與成長的戰略要務




Product Code: PAF5-74

A Changing Security Approach Increases Visibility, Openness, and Consistency to Fortify the Attack Surface via Unified Policies and Configurations, Centralized Views, and Proactive Responses

An integrated cybersecurity framework is an offering by leading vendors aimed at the future of cybersecurity; while not a new approach, it has become increasingly popular in recent years. A unified cybersecurity framework applies a consistent set of policies and rules, with 3 key advantages over point solutions: it allows for more consistency in control and management; it provides more visibility into the attack landscape, and it promotes collaboration through openness.

In part, this is due to the rapid digital transformation today, leading to an increasing threat surface that may render companies more susceptible to cyberattacks. In particular, the rise in zero-day attacks is difficult to combat due to the speed at which they can occur. Thus, it is necessary for companies to adopt a more comprehensive set of solutions. Such solutions may increase the visibility of the threat landscape by offering a view from a single pane of glass.

Additionally, due to the rise in number of solutions required for cybersecurity, the integrated security framework can vastly simplify cybersecurity by streamlining processes. This will not only reduce the costs of operation and maintenance, but also reduce downtime and time to deployment, thus making it more cost efficient.

The study acknowledges that there are several disincentives to swapping to the integrated security framework as highly regulated organizations, especially banks and governments, tend to prefer best-of-breed solutions. However, upon conducting market research, Frost & Sullivan contends that integrated security is a trend that most vendors are moving towards and should utilize in order to keep up with the changing dynamics in cybersecurity today.

The integrated security approach has become increasingly popular in recent years given the rise in potential threat vectors to the enterprise. As customers move toward digitization and virtualization, there is an increase in the number of vendors offering their vision of an integrated security framework with a best-of-suite approach.

For purposes of this analysis, the vendors included are those that have cybersecurity solutions which cover at least 3 out of 5 of the following security controls: network, endpoint, application, cloud and content. They should also have a strong integration portfolio.

Vendors profiled in this Asia-Pacific Integrated Cybersecurity Framework Industry Guide include: Check Point Software Technologies, Cisco Systems, FireEye, Fortinet, McAfee, Palo Alto Networks, Pulse Secure, and Symantec.

Key Issues Addressed:

  • What are the challenges in cybersecurity operations?
  • What are the current scenarios in cybersecurity frameworks?
  • What are the key values that integrated cybersecurity frameworks provide?
  • What are the key advantages and key challenges of traditional security approaches versus integrated cybersecurity frameworks?
  • Who are the key integrated cybersecurity players in Asia-Pacific?
  • What are the growth opportunities and calls to action?

Table of Contents

Executive Summary

  • Key Findings

Defining the Integrated Cybersecurity Framework Paradigm

  • Definition-Integrated Cybersecurity Frameworks
  • Definition-Integrated Cybersecurity Frameworks (continued)
  • Coverage of Integrated Cybersecurity Frameworks
  • Coverage of Integrated Cybersecurity Frameworks (continued)

Challenges in Cybersecurity Operations

  • Challenges in Cybersecurity Operations Today
  • Challenges in Cybersecurity Operations Today (continued)
  • Challenges in Cybersecurity Operations Today (continued)

The Value of an Integrated Cybersecurity Framework

  • Today's Cybersecurity Scenarios

Traditional Approach versus Integrated Approach

  • Traditional Security Framework-Best-of-Breed Approach
  • Integrated Security Framework-Holistic Approach

Integrated Cybersecurity Framework Vendor Profiles

  • Market Landscape
  • Measurement Definitions
  • Vendor Assessment Table
  • Check Point Software Technologies
  • Check Point Software Technologies (continued)
  • Cisco Systems
  • Cisco Systems (continued)
  • FireEye
  • FireEye (continued)
  • Fortinet
  • Fortinet (continued)
  • McAfee
  • McAfee (continued)
  • Palo Alto Networks
  • Palo Alto Networks (continued)
  • Pulse Secure
  • Pulse Secure (continued)
  • Symantec
  • Symantec (continued)

Growth Opportunities and Companies to Action

  • Transformation in the Cybersecurity EcosystemMany
  • Growth Opportunity 1-Enterprises Need to Understand the Benefits that Integrated Frameworks can Offer
  • Growth Opportunity 2-Crucial to Have Integration Both Within the Brand and Outside of the Ecosystem
  • Growth Opportunity 3-Need to Expand the Portfolio to Cover as Many Enterprise Pain Points as Possible
  • Strategic Imperatives for Success and Growth

The Last Word

  • The Last Word
  • Legal Disclaimer


  • List of Exhibits

The Frost & Sullivan StoryThe Journey to Visionary Innovation

  • The Frost & Sullivan Story
  • Value Proposition-Future of Your Company & Career
  • Global Perspective
  • Industry Convergence
  • 360º Research Perspective
  • Implementation Excellence
  • Our Blue Ocean Strategy