市場調查報告書

零信任證券市場的增長,趨勢,預測(2020-2025)

Zero Trust Security Market - Growth, Trends, and Forecasts (2020 - 2025)

出版商 Mordor Intelligence LLP 商品編碼 946390
出版日期 內容資訊 英文 120 Pages
商品交期: 2-3個工作天內
價格
零信任證券市場的增長,趨勢,預測(2020-2025) Zero Trust Security Market - Growth, Trends, and Forecasts (2020 - 2025)
出版日期: 2020年06月01日內容資訊: 英文 120 Pages
簡介

在從2020年到2025年的預測期內,零信任證券市場預計將實現18%的複合年增長率。雲應用程序和移動工作人員正在重新定義外圍安全性,以供員工攜帶設備和遠程工作。可從公司網絡外部訪問數據,並與外部合作者(如合作夥伴和供應商)共享數據。

  • 周邊對於僅依靠本地防火牆和VPN的組織來說,成功滲透並在安全範圍內橫向移動的網絡犯罪分子的活動正在增加。由於缺乏敏捷性,預計它將推動零信任安全性的實施。
  • 根據該報告,與過去四年相比,2019年的犯罪數量增加了50%以上。具有諷刺意味的是,即使公司正在投資創紀錄的金額並添加更多安全工具以幫助準確地預防犯罪,這些違規行為仍在繼續增長。大型企業平均擁有100多種安全工具,2019年的信息安全支出預計將超過1250億美元。
  • 零信任基於不信任組織外圍安全內部或外部任何內容的想法。相反,在授予訪問權限之前,您應該始終檢查嘗試連接到組織系統的所有內容。通過零信任,安全團隊可以實施策略以驗證所有連接嘗試和所有設備並限制訪問。從用戶身份到應用程序託管環境的所有內容都用於防止違規。
  • Check Point Technologies,Inc.在2019年8月進行的一項調查顯示,來自多個行業的安全專家廣泛採用了零信任方法。超過一半(52%)的受訪者表示,他們已經開始或完成了零信任方法的引入,其中18%的受訪者計劃在明年年底之前開始實施。安全環境比以往任何時候都更加複雜,保護數據,資產和網絡比以往任何時候都更具挑戰性。通過實施零信任安全性,組織可以很好地裝備以增強其安全狀態並保護其最重要的數據相關資產。
  • 由於COVID-19的動態特性,向遠程工作的轉移正在迅速進行。鑑於可能進行遠程訪問和有限的安全審查,攻擊者可以利用漏洞來訪問您的內部網絡。

該報告調查了零信任證券市場,市場概況,市場增長因素和障礙因素分析,市場規模轉變和按類型和地區進行的預測,競爭狀況,主要公司的概況,市場我們提供全面的信息,例如機會。

內容

第1章簡介

第2章調查方法

第3章執行摘要

第4章市場洞察力

  • 市場概況(包括COVID-19的影響)
  • 波特的五力分析

第5章市場動態

  • 市場增長因素
    • 數據洩露增加
    • 組織的外圍安全性不僅限於工作場所
  • 市場約束因素
    • 不太可能採用零信任安全性的過時應用程序,基礎架構和操作系統

第6章技術概述

  • 零信任網絡
  • 零信任設備
  • 零置信度數據
  • 零信任ID
  • 零信任應用程序(可見性和分析)

第7章市場細分

  • 按部署類型
    • 內部部署
  • 按公司規模
    • 中小企業
    • 大型公司
  • 按最終用戶行業劃分
    • IT與電信
    • BFSI
    • 製造業
    • 醫療保健
    • 能源與電力
    • 零售
    • 其他最終用戶行業
  • 按地區
    • 北美
    • 歐洲
    • 亞太地區
    • 其他地區

第8章競爭情況

  • 公司簡介
    • Cisco Systems Inc.
    • Palo Alto Networks Inc.
    • Vmware, Inc.
    • Broadcom Inc. (Symantec Corporation)
    • Microsoft Corporation
    • IBM Corporation
    • Google Inc.
    • Check Point Software Technologies Ltd.
    • Blackberry Limited
    • Akamai Technologies Inc
    • Centrify Corporation
    • Okta, Inc.
    • Fortinet Inc.
    • Sophos Group PLC
    • Cyxtera Technologies, Inc.

第9章 投資分析

第10章 市場將來展望

目錄
Product Code: 70111

The Zero Trust Security Market market is expected to register a CAGR of 18% over the forecast period from 2020 to 2025. Cloud applications and the mobile workforce are redefining the security perimeter where employees are bringing their own devices and working remotely. Data is being accessed outside the corporate network and shared with external collaborators such as partners and vendors. Corporate applications and data are moving from on-premises to hybrid and cloud environments, and organizations need a new security model that more effectively adapts to the complexity of the modern context, embraces the mobile workforce and protects people, devices, applications, and data wherever they are located which the core of the zero-trust security.

  • The increasing activities of cybercriminals who are becoming successful at penetrating and moving laterally within the security perimeter are expected to drive the implementation of zero-trust security because organizations which rely solely on on-premises firewalls and VPNs lack the visibility, solution integration and agility to deliver timely, end to end security coverage. As evidence, the rates of large-scale, multi-vector mega attacks are also growing, wreaking havoc on organizations and individuals worldwide. For instance, 1.76 billion records were leaked in January 2019 alone. Ransomware is expected to cost businesses and organizations USD 11.5 billion in 20193, and the global cost of online crime is expected to reach USD 6 trillion by 2021.
  • A report suggests that 2019 has seen over a 50% increase in the number of breaches compared to the last four years. Ironically, these security breaches continue to rise even as companies invest record amounts of money and add more security tools to help prevent precisely that. An average large enterprise has over 100 security tools, while information security spending for 2019 is expected to exceed USD 125 billion. While traditional and outdated approaches to the security focus on bolting-on new security tools to secure the perimeter while trusting every resource inside, a new security model called Zero Trust does away with the concept of implicit trust.
  • Zero Trust is driven by the precepts of never trusting anything inside nor outside the organization's security perimeters. Instead, before access is granted, anything and everything that is attempting to connect to an organization's systems must always be verified. With Zero Trust, the security team puts policies in place to validate every connection attempt and every device, and to intelligently limit access. In a Zero Trust model, every access request is strongly authenticated, authorized within policy constraints, and inspected for anomalies before granting access. Everything from the user's identity to the application's hosting environment is used to prevent a breach.
  • A survey conducted by Check Point Technologies Ltd in August 2019 reveals that there is broad adoption of the Zero Trust approach by security professionals across multiple industries. More than half of respondents (52%) noted that the organization has begun or had completed an implementation of the Zero Trust approach, with 18% planning to start application during the coming year. The security environment is becoming more complex than ever, with it never being more challenging to protect data, assets, and networks. An organization can be supremely equipped to bolster its security posture and boost the protection of its most critical data-related assets by implementing Zero Trust Security.
  • The dynamic nature of COVID-19 has resulted in rapidly evolving shifts to the remote workforce. Given the access provided through remote connectivity, the newly minted remote workforce, and the potential for limited security reviews, attackers are likely to take advantage of weaknesses to gain internal network access. The Zero Trust security is emerging in the recent years, which utilizes an identity provider to provide access to the applications and determines the authorization rights based on both the user and the device. Fundamental authorization rights include device and user identity checks to consider if the organization manages the device.

Key Market Trends

BFSI is Expected to Hold Significant Share

  • The BFSI industry is frequently faced with sophisticated and persistent attacks, including malware, ransomware, social engineering and phishing attacks, fileless malware, rootkits, and injection attacks. Accenture estimates an average loss of USD 18 million per year at financial services institutions. Both zero-day attacks and ransomware are on the rise. Ransomware especially can negatively affect financial workflows, inflicting costly downtime, and further damaging business reputations. However, financial institutions are moving from zero trust security solutions to strengthen their security posture.
  • In July 2019, a former Amazon employee was arrested and accused of carrying out a massive theft of 106 million Capital One records, one of the top ten banks of the United States. This included 140,000 Social Security numbers, one million Canadian Social Insurance numbers, and 80,000 bank account numbers, in addition to an undisclosed amount of information such as people's names, addresses, credit scores, credit limits, balances. It is forecasted that as the threats attacking financial services institutions become more complex and iterative, zero trust security solutions must evolve to meet these threats and also take advantage of the increased data and insights at hand.
  • Large organizations such as banks, deal with dispersed and widespread networks of data and applications accessed by employees, customers, and partners onsite or online, which makes protecting the perimeters more difficult. The Zero Trust Security takes a more nuanced approach of managing access to the identities, data, and devices within the proverbial castle. So, whether an insider acts maliciously or carelessly, or veiled attackers make it through the organization's walls, automatic access to data is not a given.
  • Open banking is being widely deployed, which is an initiative that allows third-party financial services companies to access users' banking data through the use of APIs. Open banking increases risk by multiplying the interconnectivity between banks, providers, partners, vendors, and customers, and this interconnectivity introduces systemic risk. Banks need to approach security differently to ensure the protection of systems, data, and customers. Perimeter defenses are entirely insufficient to respond to this new type of systemic risk, and the risk is mitigated with the usage of a zero trust security model.

North America is Expected to Hold Major Share

  • North America is a primary hub for all the major organizations across the world. The expansion of the various end-user industries and the increasing security perimeter are driving the demand for zero-trust security in the region. The risks of attacks that can impact the market vary from individuals and corporates to the governments. Thus, securing the data has become a priority in the region. Moreover, cyberattacks in the North American region, especially in the United States, are rising rapidly. They have reached an all-time high, primarily owing to the rapidly increasing number of connected devices in the region.
  • Now more than ever, the U.S. government has focused on proactive cybersecurity measures. The country's proposed budget for the fiscal year 2020, the federal cybersecurity budget would increase to USD 17.4 billion, up from USD 16.6 billion in 2019. Within cybersecurity spending, one of the areas the federal government is eyeing is the concept of zero trust security due in part to recent reports from the Defense Innovation Board and the American Council for Technology-Industry Advisory Council. Federal I.T. environments are complicated, and as the government takes a closer look, they will see in many cases they're already notionally on a path to Zero Trust Security.
  • Moreover, according to a survey by FedScoop, nearly half of U.S. federal government agencies, including the Agriculture Department and the Marine Corps, are adopting zero trust security. While the adoption is increasing, consistent implementation and monitoring are critical for zero trust security to succeed, which will lead to an increase in the approval of the solutions. Many municipalities in the United States have recorded ransomware attacks, which have cost these companies a substantial recovery. For instance, Baltimore spent over USD 18.2 million in regaining its access to its connected systems. Also, 23 towns in Texas and two towns in Florida faced system lockdown due to ransomware, which provides a need to use zero trust security solutions.
  • The autonomous breach protection provider, Cynet, in its recently published State of Breach Protection 2020 Report, has mentioned that over 25% of security alerts are left unattended daily in the United States. The company has surveyed over 1,500 cybersecurity professionals for the same, and around 77% of the responding organizations stated that 20%-60% of the security alerts are left unattended due to their systems' capacity limits. Zero trust security could be implemented in such cases establishing new perimeters around sensitive and critical data. These perimeters include traditional prevention technology such as network firewalls and network access controls, as well as authentication, logging, and controls at the identity, application, and data layers.

Competitive Landscape

The zero trust security market primarily comprises multiple domestic and international players, in quite a fragmented and highly competitive environment. The market poses high barriers to entry for new players as they are already various established players in the market. Technological advancements in the market are also bringing sustainable competitive advantage to the companies, and the market is also witnessing multiple partnerships and mergers.

  • April 2020 - Google made available BeyondCorp Remote Access, marking its first commercial product based on the zero-trust approach to network security that Google pioneered and has used internally for almost a decade. The cloud-based service lets employees access internal web apps from most devices, and any location, without a traditional remote-access virtual private network (VPN).
  • February 2020 - BlackBerry Limited launched the BlackBerry Spark platform with the addition of a unified endpoint security layer, which can simultaneously work with the company's centralized endpoint management to deliver zero trust security. BlackBerry Spark platform leverages AI, machine learning, and automation to offer improved cyber threat prevention and remediation and provides visibility across desktop, mobile, server, and IoT endpoints.

Reasons to Purchase this report:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

Table of Contents

1 INTRODUCTION

  • 1.1 Study Assumptions and Market Definition
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET INSIGHTS

  • 4.1 Market Overview (Includes the impact of COVID-19)
  • 4.2 Industry Attractiveness - Porter's Five Force Analysis
    • 4.2.1 Bargaining Power of Suppliers
    • 4.2.2 Bargaining Power of Buyers
    • 4.2.3 Threat of New Entrants
    • 4.2.4 Threat of Substitutes
    • 4.2.5 Intensity of Competitive Rivalry

5 MARKET DYNAMICS

  • 5.1 Market Drivers
    • 5.1.1 Increasing Number of Data Breaches
    • 5.1.2 Security Perimeter of an Organization not Being Limited to Workplace
  • 5.2 Market Restraints
    • 5.2.1 Legacy applications, infrastructure, and operating systems not likely to adopt zero trust model

6 TECHNOLOGY SNAPSHOT

  • 6.1 Zero Trust Networks
  • 6.2 Zero Trust Devices
  • 6.3 Zero Trust Data
  • 6.4 Zero Trust Identities
  • 6.5 Zero Trust Applications (Visibility & Analytics)

7 MARKET SEGMENTATION

  • 7.1 Type of Deployment
    • 7.1.1 On-Premise
    • 7.1.2 Cloud
  • 7.2 Enterprise Size
    • 7.2.1 Small and medium Enterprises
    • 7.2.2 Large Enterprises
  • 7.3 End-user Industry
    • 7.3.1 IT & Telecom
    • 7.3.2 BFSI
    • 7.3.3 Manufacturing
    • 7.3.4 Healthcare
    • 7.3.5 Energy and Power
    • 7.3.6 Retail
    • 7.3.7 Other End-User Industries
  • 7.4 Geography
    • 7.4.1 North America
      • 7.4.1.1 United States
      • 7.4.1.2 Canada
    • 7.4.2 Europe
      • 7.4.2.1 United Kingdom
      • 7.4.2.2 Germany
      • 7.4.2.3 France
      • 7.4.2.4 Rest of Europe
    • 7.4.3 Asia-Pacific
      • 7.4.3.1 China
      • 7.4.3.2 India
      • 7.4.3.3 Japan
      • 7.4.3.4 Rest of Asia-Pacific
    • 7.4.4 Rest of the World
      • 7.4.4.1 Latin America
      • 7.4.4.2 Middle East and Africa

8 COMPETITIVE LANDSCAPE

  • 8.1 Company Profiles
    • 8.1.1 Cisco Systems Inc.
    • 8.1.2 Palo Alto Networks Inc.
    • 8.1.3 Vmware, Inc.
    • 8.1.4 Broadcom Inc. (Symantec Corporation)
    • 8.1.5 Microsoft Corporation
    • 8.1.6 IBM Corporation
    • 8.1.7 Google Inc.
    • 8.1.8 Check Point Software Technologies Ltd.
    • 8.1.9 Blackberry Limited
    • 8.1.10 Akamai Technologies Inc
    • 8.1.11 Centrify Corporation
    • 8.1.12 Okta, Inc.
    • 8.1.13 Fortinet Inc.
    • 8.1.14 Sophos Group PLC
    • 8.1.15 Cyxtera Technologies, Inc.

9 INVESTMENT ANALYSIS

10 FUTURE OF THE MARKET