Welcome!

News Feed Item

Frost & Sullivan: Shift toward Integrated Solutions Key to Growth of Asia-Pacific Secure Content Management Market

- Need to safeguard business communications and better monitor employee Web behavior fuels uptake of content security solutions

SINGAPORE, Jan. 22, 2014 /PRNewswire/ -- The IT convergence and information-centricity trends are driving the secure content management (SCM) market in Asia-Pacific as vendors in this space look to offer web and e-mail security as integrated rather than standalone solutions. The value offered by these converged solutions has encouraged cost-conscious enterprises in the region to adopt SCM.

New analysis from Frost & Sullivan (http://www.networksecurity.frost.com), Asia-Pacific Secure Content Management Market CY2012, finds that the market earned revenues of US$675.1 million in 2012 and estimates this to reach US$1995.4 million in 2019. The research covers the e-mail and web security segments.

"With more firms looking to leverage the potential offered by the web, there is high demand for web security solutions that enable organizations to strike a fine balance between restricting and allowing web access for employees," said Frost & Sullivan Information & Communication Technologies Research Analyst Vu Anh Tien. "Enterprises are particularly looking to better manage employee Web behavior, increase visibility, and obtain greater control over Web content."

The rise of enterprise mobility trends such as bring your own devices and bring your own applications is intensifying the Web and e-mail security issues faced by companies across Asia-Pacific, thus making a stronger business case for SCM solutions. The greater threat exposure brought about by mobile devices that could become attack vectors or pose a higher risk due to human errors is compelling organizations to adopt these solutions.

"As a result, the SCM market in the region is veering towards integrated security solutions that not only prevent spam or block access to malicious websites, but also monitor Web and e-mail traffic in mobile devices to protect against data loss, advanced persistent threats, and distributed denial of service," remarked Anh Tien.

However, the increasing convergence of security products that provide the full range of firewall, monitoring, and file sharing protection is decreasing the proportion spent on the e-mail and Web security segments. The saturation of the anti-spam market and the perception that anti-spam products are just basic, commoditized components of any security suite also limit the scope of the SCM market in the region.

Moreover, the lack of new innovation in recent years has caused the e-mail and Web security segments to be overshadowed by other security technologies in certain instances. As such, the onus is on content security vendors to widen the capabilities of their e-mail and Web security products to create greater value for customers and sustain growth in the Asia-Pacific SCM market.

If you are interested in more information on this research, please send an e-mail to Donna Jeremiah, Corporate Communications, at [email protected], with your full name, company name, job title, telephone number, company e-mail address, company website, city, state and country.

Asia-Pacific Secure Content Management Market CY2012 is part of the Network Security Technologies Growth Partnership Service program. Frost & Sullivan's related research services include: Global Mobile Endpoint Protection Market, North America Managed Security Services Market, EMEA Managed Security Services Market, and Asia-Pacific Web Application Firewall Market. All research services included in subscriptions provide detailed market opportunities and industry trends evaluated following extensive interviews with market participants.

About Frost & Sullivan

Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today's market participants.

Our "Growth Partnership" supports clients by addressing these opportunities and incorporating two key elements driving visionary innovation: The Integrated Value Proposition and The Partnership Infrastructure.

  • The Integrated Value Proposition provides support to our clients throughout all phases of their journey to visionary innovation including: research, analysis, strategy, vision, innovation and implementation.
  • The Partnership Infrastructure is entirely unique as it constructs the foundation upon which visionary innovation becomes possible. This includes our 360 degree research, comprehensive industry coverage, career best practices as well as our global footprint of more than 40 offices.

For more than 50 years, we have been developing growth strategies for the global 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies?

Contact Us: Start the discussion

Join Us: Join our community

Subscribe: Newsletter on "the next big thing"

Register: Gain access to visionary innovation

Asia-Pacific Secure Content Management Market CY2012

P75E-74

Media Contact:

Donna Jeremiah
Corporate Communications – Asia Pacific
P: +61 (02) 8247 8927
F: +61 (02) 9252 8066
E: [email protected]

Carrie Low
Corporate Communications – Asia Pacific
P: +603 6204 5910
F: +603 6201 7402
E: [email protected]

Melissa Tan
Corporate Communications – Asia Pacific
P: +65 6890 0926
F: +65 6890 0999
E: [email protected]

http://www.frost.com


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...