World Enterprise Network and Data Security Markets

The changing nature of enterprises and the increasing number of mobile devices that connect to enterprise networks, as well as "consumerization of the enterprise," are imposing new demands on the way organizations approach network security.
This study analyzes the broad trends in the enterprise network security market, its demand drivers, market challenges, growth, and competitive trends. It captures all these significant developments and provides insights for both vendors and end-user organizations.

The report considers the market from multiple product perspectives: secure routers, firewalls and virtual private networks (VPNs), intrusion detection/prevention systems and unified threat management (UTM) appliances. It provides competitive market sizing and market share assessments across a number of product segments as well as offering detailed vertical, horizontal and geographic analyses.

Table of Contents

  • Executive Brief: Top-Line Forecast
  • Executive Brief: Drivers
  • Executive Brief: Inhibitors
  • Executive Brief: Market Share
  • Executive Brief: Summary and Strategic Recommendations
  • 1. Executive Summary
    • 1.1. Enterprise Network and Data Security Market Trends
  • 2. Market Issues
    • 2.1. How do Enterprises Approach Security?
    • 2.2. Securing the Extended Enterprise
    • 2.3. Enterprise Security Moving Towards a Unified Approach
    • 2.4. Consumerization of the Enterprise & Security
    • 2.5. Wireless & Mobile Security
    • 2.6. Market Drivers for Enterprise & Data Security
      • 2.6.1. Changing Business Environment Requires Continued Focus on Security
      • 2.6.2. Growing Number of Threats against Enterprise Networks
      • 2.6.3. Newer Vectors, Growing Number of Points of Vulnerability
      • 2.6.4. Rising SMB Security and Compliance Concerns
      • 2.6.5. Enterprises Look beyond Firewall, VPN, IDS/IPS
      • 2.6.6. Newer Delivery Models Promise to Cut Security Costs
      • 2.6.7. Rising Awareness on the Importance of Right Security Posture
      • 2.6.8. Customization and Vertical Focus Lead to Wider Adoption
      • 2.6.9. Telecommuting and Remote Access Create Newer Demand
      • 2.6.10. Security for Virtualized Environments
      • 2.6.11. Growth of Managed Security Services
    • 2.7. Market Challenges for Enterprise & Data Security
      • 2.7.1. Growing Complexity of Security Solutions Create Implementation Challenges
      • 2.7.2. The Economy and Consequent Budget Constraints Result in Price Pressures
      • 2.7.3. There is No Silver Bullet for Enterprise Network Security
      • 2.7.4. Growing Fragmentation in the SMB Supplier Base
      • 2.7.5. Bundling of Security with Network Infrastructure Result in Lower Revenues
      • 2.7.6. Increasing Dominance of Providers Offering Security as a Service
  • 3. Technology Issues
    • 3.1. IPv6 and Implications for Enterprise Security
      • 3.1.1. The Transition to IPv6
      • 3.1.2. Key Challenges for IPv6
    • 3.2. Virtual Desktop Infrastructure
      • 3.2.1. Enterprise Migration to VDI
      • 3.2.2. Security for VDI Environments
    • 3.3. Network Security Focus Areas
      • 3.3.1. Baseline Security
      • 3.3.2. Next Generation Networks
    • 3.4. Network Security Protocols
      • 3.4.1. Secure Shell
      • 3.4.2. Transport Layer Security (TLS)
      • 3.4.3. IPSec
  • 4. Market Forecasts by Key Product Segments
    • 4.1. Forecast Methodology
    • 4.2. Secure Routers
      • 4.2.1. Secure Routers - Competitive Landscape
        • 4.2.1.1. ADTRAN
        • 4.2.1.2. Cisco Systems
        • 4.2.1.3. Juniper Networks
    • 4.3. Standalone SSL VPN Firewall Appliances, Software & Gateways
      • 4.3.1. Competitive Landscape
        • 4.3.1.1. AEP Networks
        • 4.3.1.2. Array Networks
        • 4.3.1.3. Check Point Software Technologies
        • 4.3.1.4. Cisco Systems
        • 4.3.1.5. Citrix Systems
        • 4.3.1.6. F5 Networks
        • 4.3.1.7. Juniper Networks
    • 4.4. Unified Threat Management (UTM) Devices
      • 4.4.1. UTM Advantages
      • 4.4.2. Adoption Trends
      • 4.4.3. UTM Market Growth
      • 4.4.4. UTM Competitive Landscape
        • 4.4.4.1. Astaro
        • 4.4.4.2. Check Point Software
        • 4.4.4.3. Cisco Systems
        • 4.4.4.4. Clavister
        • 4.4.4.5. Cyberoam (Elitecore Technologies)
        • 4.4.4.6. Fortinet
        • 4.4.4.7. McAfee
        • 4.4.4.8. NETASQ
        • 4.4.4.9. Juniper Networks
        • 4.4.4.10. SonicWALL
        • 4.4.4.11. WatchGuard Technologies
    • 4.5. Intrusion Detection/Prevention Systems (IDS/IPS)
      • 4.5.1. Market Growth
      • 4.5.2. IDS vs. IPS
      • 4.5.3. Competitive Landscape
        • 4.5.3.1. Cisco Systems
        • 4.5.3.2. Enterasys Networks
        • 4.5.3.3. IBM Internet Security Systems (IBM-ISS)
        • 4.5.3.4. Juniper Networks
        • 4.5.3.5. McAfee
        • 4.5.3.6. Radware
        • 4.5.3.7. StillSecure
    • 4.6. Network Access/Admission Control (NAC)
      • 4.6.1. Competitive Landscape
        • 4.6.1.1. Avenda Systems
        • 4.6.1.2. Cisco Systems
        • 4.6.1.3. Impulse Point
        • 4.6.1.4. Juniper Networks
  • 5. Geographic Trends
    • 5.1. North America
      • 5.1.1. Competition
    • 5.2. Europe, Middle East & Africa
      • 5.2.1. Asia-Pacific
      • 5.2.2. Central and Latin America
  • 6. Vertical Market Analysis
    • 6.1. Introduction
      • 6.1.1. Service Provider
      • 6.1.2. Higher Education
      • 6.1.3. Government
      • 6.1.4. Financial Services
      • 6.1.5. Manufacturing
      • 6.1.6. Healthcare
  • 7. Strategic Conclusions
    • 7.1. Consumerization of the Enterprise Creates Challenges & Opportunities
    • 7.2. User-owned Consumer Devices in the Enterprise Creates New Challenges
    • 7.3. Service Oriented Architecture, Cloud Create New Threat Dimensions
    • 7.4. Advanced Persistent Threats Challenge Enterprise Security
    • 7.5. Sound Defense is Not about Solutions, but People & Processes
    • 7.6. Need for Enterprise-wide Security
    • 7.7. Not all UTMs are Created Equal
    • 7.8. Large Disparity in Vendor Pricing Confuse Market
    • 7.9. Market Consolidation Leads to Customer Uncertainty
    • 7.10. SMB Security, a Nascent Market
    • 7.11. Large Vendors Continue to Implement Best-of-breed Solutions
    • 7.12. Managed Security Services, a Growth Market
    • 7.13. Shortage of Security Personnel, Need for Certification
  • 8. Scope, Definitions & Methodology
    • 8.1. Market Definitions
      • 8.1.1. Secure Routers
      • 8.1.2. SSL VPN Gateways
      • 8.1.3. VPN and Firewall Appliances and Software
      • 8.1.4. IDS/IPS
      • 8.1.5. Unified Threat Management (UTM)
      • 8.1.6. Network Access Control (NAC)
    • 8.2. Scope
    • 8.3. Methodology
  • 9. Company Directory
  • 10. Acronyms

Tables

Log in or Register to view the structure of the tables below.

  1. Total Enterprise Network and Data Security Market Revenues by Component, Worldwide Forecast: 2009 to 2016
  2. SSL VPN Gateway Market Unit Shipments by Geography, World Market, Forecast: 2009 to 2016
  3. Standalone SSL VPN Firewall Appliance & Software Market Unit Shipments by Geography, World Market, Forecast: 2009 to 2016
  4. Unified Threat Management Appliances Market Unit Shipments, World Market, Forecast: 2009 to 2016
  5. Intrusion Detection/Prevention Systems Market Unit Shipments, World Market, Forecast: 2009 to 2016
  6. Secure Routers Market Revenues by Geography, World Market, Forecast: 2009 to 2016
  7. SSL VPN Gateway Market Revenues by Geography, World Market, Forecasts: 2009 to 2016
  8. Standalone SSL VPN Firewall Appliances & Software Market Revenues by Geography, World Market, Forecast: 2009 to 2016
  9. Unified Threat Management Appliances Market Revenues by Geography, Worldwide, Forecasts: 2009 to 2016
  10. Intrusion Detection/Prevention Systems Market Revenues by Geography, Worldwide, Forecast: 2009 to 2016
  11. Network Access Control Market Revenues by Geography, World Market, Forecast: 2009 to 2016
  12. Total Enterprise Network and Data Security Market Revenues by Unit Shipments, World Market, Forecast: 2009 to 2016
  13. Secure Routers Market Unit Shipments by Geography, World Market, Forecast: 2009 to 2016
  14. Total Enterprise Network and Data Security Market Revenues by Geography, Worldwide Forecast, 2009 to 2016
  15. Total Enterprise Network and Data Security Market Revenues by Vertical Markets, Worldwide Forecasts, 2009 to 2016

Charts

  1. Total Enterprise Network and Data Security Market Revenues by Component, Worldwide Forecast: 2009 to 2016
  2. 2009 UTM Market Share
  3. Total Enterprise Network and Data Security Market Revenues
  4. Total Enterprise Network and Data Security Market Revenues
  5. Secure Router Market Revenues
  6. Secure Routers Vendor Market Share by Revenues
  7. SSL VPN Gateway Market Revenues
  8. Standalone SSL VPN Firewall Appliances & Software Market Revenues
  9. SSL VPN Gateways Vendor Market Share by Revenues
  10. Standalone SSL VPN Firewall Appliance & Software Vendor Market Share by Revenues
  11. Secure Router Market Revenues
  12. Secure Routers Vendor Market Share by Revenues
  13. SSL VPN Gateway Market Revenues
  14. Standalone SSL VPN Firewall Appliances & Software Market Revenues
  15. SSL VPN Gateways Vendor Market Share by Revenues
  16. Standalone SSL VPN Firewall Appliance & Software Vendor Market Share by Revenues
  17. Unified Threat Management Market Revenues
  18. Unified Threat Management Appliances Vendor Market Share by Revenues
  19. Intrusion Detection/Prevention Systems Market Revenues
  20. Intrusion Detection/Prevention Systems Vendor Market Share by Revenues
  21. Network Access Control Market Revenues
  22. Total Enterprise Network and Data Security Market Revenue Shifts by Geography
  23. Enterprise Network and Data Security Market Revenues by Vertical

Figures

  1. Enterprise Network and Data Security Framework, World, 2010
  2. Security and the Extended Enterprise, World, 2010
  3. Unified Threat Management in Enterprise Security Architecture, World, 2010