Vous êtes sur la page 1sur 5

Criminal hackers prize data that contains personal information as it can be used for identity theft and

fiscal fraud. Loss of an enterprise’s central database of consumer information may cause issues with the
enterprise’s sales system because it references customer information. Even if a monetary value is not
assigned to the data, the negative consequences on operations could be significant. With shareholder
lawsuits fairly common, failure to safeguard data might easily result in litigation, particularly if data loss
may be tied to a negative change within the shared financial value of the organization’s stock.

Fingerprinting is often used to stop sensitive information from leaving a network and at the similar time
to mitigate false positives. Suppose, for example, a company would like to safeguard against inadvertent
disclosure of sensitive data. Step one would be to determine what forms of sensitive data to safeguard.
DLP can detect files that contain confidential information and keep them from leaving through the
network. A great deal of information might be included within an incident report.

The most famous class of failure is a difficult drive crash. Prevention of data loss is a battle that should
be fought on many fronts, and it is herein that lies an important risk of information loss. Regardless of
where an organization’s data center is situated, the threat of information loss regularly looms, including
from natural disasters. An effective DLP deployment, therefore, requires constant attention.

A DLP policy is not likely to cover just one sensitive data type. When developing a DLP policy, it is useful
to check across all segments of an organization to understand what information is in danger and should
be protected. However, depending on the need for a specific kind of technology, that statement may
not be true. It would be simple to dismiss this as just one more attempt by a higher profile vendor within
the security room to find a growing niche within the computer-smartphone sector. The most
fundamental step in defining any policy always involves first understanding what the policy is intended
to do.

The most crucial step in safeguarding data from loss is to back up regularly. After a disaster, it is too late
to try and save data. In recent years, the quantity of data requiring protection has doubled every four
decades. Most of this data is at risk because a solid recovery strategy is missing. To identify the data
individual users have in an environment, organizations should audit a file system. To safeguard sensitive
company data, content must be identified.

Other Solutions
Other cyber security solutions include web filtering, distributed denial of service mitigation and unified
threat management.

Web Filtering
An internet filter is merely an application that permits an administrator of a system to control what
websites could be visited from a specific computer. Web filtering software is necessary for these
reasons. Installing an internet filter is an excellent choice for preventing an issue before it becomes a
bigger issue. The most critical feature is to find an internet filter that is simple to use.

Many online security software options are available on the market. Web filtering software is extremely
flexible also. Content filtering is, obviously, only one of the techniques used to secure a network along
with a computer. It can keep an eye on the activity of a specific computer or group of computers within

© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 34
the network and impose limitations on the content being viewed. Web filtering can be costly, but there
are low cost alternatives.

Most of the free web filtering software only works with a couple of web browsers; however, some of the
decent software works for every browser on the internet. Specific versions of web filters can also
monitor online activities, for example, websites that a specific user has visited. If there is malicious
content on that website, a user will not be granted access. When buying such filtering software, the
product should be fully customized.

Using web blockers is among the utmost effective approaches to stopping malicious online content from
flooding a personal computer. When it comes to such malicious online content, users need to remain
ever vigilant. Web blockers let a user control the websites that other individuals, particularly children,
can and cannot visit.

Distributed Denial of Service Mitigation


To guard a computer in today’s connected world, excellent virus protection is absolutely necessary.
Distributed denial of service (DDoS) protection is no longer regarded as a niche market and is growing
exponentially with the increase in internet security threats. Many services offered by the industry can
help businesses combat DDoS attacks. Just as critical as installing antivirus software, organizations must
keep their DDoS programs current, which may mean purchasing annual subscriptions.

The reason DDoS attacks are so effective is because it is nearly impossible to stop them. The absolute
most aggressive attacks can easily produce staggering quantities of requests and thus disable a system.
For many companies, being offline for even a few minutes is fully unacceptable and may have far-
reaching consequences. DDoS attacks must not be dismissed lightly by even casual users because their
preferred websites might be targeted.

DDoS protection has improved over the last several years. The scope of platforms includes network-
based firewalls in addition to virtual firewalls. The toughest problem for an operator is when the
attacker knows a website’s vulnerability, then the chances of it being attacked again is high. The
firewalls help therefore block an attacker’s access to this knowledge.

There are several distinctive sets of rules available for various attacks. Strategies might vary, but the key
is always to overlap them and to minimize the number of chinks in the armor. DDoS attacks are difficult
to spot and impossible to block using traditional techniques, and they may be deployed by hackers to
achieve a number of malicious objectives. Some of the rule sets for attacks are quite dense and hard to
follow. An attack might be initiated to affect companies that reveal unwanted information or content
such as political, economic, etc. Third-party cookies are positioned by someone who is not at the
website that a user is seeing. Actually, there are some steps that should be taken to guard identity and
also the purchase. Communication is critical for any productive small business environment. Currently,
effective businesses are looking for ways to raise their communication, and many are relying on online
tools for improving their correspondence. Furthermore, the company provides educational support as
well as maintenance and professional services. Applications may be delivered via the web or directly to a
customer’s network.

Unified Threat Management


Unified threat management (UTM) is a method of security management that allows an administrator to
manage and monitor an extensive variety of security-related infrastructure components and

© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 35
applications through a single management console. The main advantage of a UTM product is its
capability of reducing complexity. However, the disadvantage is that there is a single point of failure
(SPOF) of UTM appliances.

One of many challenges associated with deploying multiple point systems is dealing with specific
security functions, such as the reporting function, which is not coordinated, and the lack of data
normalization. When IT administrators need to log on to a console, they can streamline their work and
lower redundancy. To provide UTM, it is important to establish whether the system will have to cover
functionality like email security even if a person does not need this, or if security features can be chosen
for the user. In addition, when thinking about a UTM appliance, it is worth considering alternative
security solutions. A potential downside of a single UTM appliance being responsible for so many
networks security is the fact that the processing demands placed on such an appliance could cause
slower performance. The best configuration will be dependent on the specific traffic patterns and
architecture of a single network, so flexibility in terms of deployment strategies might be a
distinguishing feature among UTM devices.

Market Size and Forecast


Antivirus and anti-malware solutions are expected to represent the major share of the North American
cyber security market, accounting for approximately 26% of the overall market in 2017. However, the
disaster recovery solutions market is expected to be the fastest-growing segment, with a CAGR of 18.1%
over the forecast period. This market segment is expected to reach over $4.8 billion by 2023 due to a
surge in demand for data storage and backup processing among a range of user groups, including small,
medium and large enterprises.

Table 3
North American Cyber Security Market, by Solution, Through 2023
($ Millions)

CAGR%
Solution 2017 2018 2023
2018–2023
Antivirus and anti-malware 12,076.4 13,057.3 18,964.1 7.7
Encryption 10,258.8 11,221.1 17,265.4 9.0
Risk and compliance management 8,150.8 8,929.0 13,843.7 9.2
Identity and access management 5,949.2 6,605.0 10,949.6 10.6
Firewall 3,091.7 3,478.9 6,167.4 12.1
Disaster recovery 1,766.0 2,093.4 4,815.2 18.1
Data loss protection 833.8 951.9 1,813.9 13.8
Other solutions 4,717.2 5,285.4 8,632.7 10.3
Total 46,843.9 51,622.0 82,452.0 9.8

Source: BCC Research

© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 36
In May 2017, Scalar Decisions Inc., a leading Canadian IT solution provider, launched cloud-based
disaster recovery services for enterprises to back up their lost data after any cyber or malware attack.
With the cloud-based deployment option, the market for disaster recovery is expected to grow
significantly during the forecast. Firewall protection is also one of the fastest growing solution in the
North American cyber security market and is expected to reach over $6.1 billion by 2023. Industry
participants are coming up with new firewall and other security solutions in the market to counter
cyberattacks. For example, in July 2018, Check Point launched a threat prevention solution named
"SandBlast Mobile 3.0" for enterprises that rely on mobile usage. This solution is a proven product for
preventing various threats such as malware, botnets and phishing attacks.

Figure 2
North American Cyber Security Market, by Solution, 2017-2023
($ Millions)

20,000

15,000
$ Millions

10,000

5,000

0
2017 2018 2023

Antivirus and anti-malware Encryption


Risk and compliance management Identity and access management
Firewall Disaster recovery
Data loss protection Other solutions

Source: BCC Research

© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 37
Chapter 6
Market Breakdown by
Industry Vertical

© 2018 | BCC Research LLC IFT174A Cyber Security: North American Markets | 38

Vous aimerez peut-être aussi