Welcome!

News Feed Item

Infonetics: Cisco Gobbles SourceFire, Gains Share in Network Security Market

Market research firm Infonetics Research released excerpts from its 4th quarter 2013 (4Q13) and year-end Network Security Appliances and Software report, which tracks integrated security appliances, secure routers, SSL VPN gateways, VPN and firewall software, and IDS/IPS products.

ANALYST NOTE

Cisco completed its acquisition of Sourcefire in the fourth quarter of 2013, and in the process posted its highest security revenue quarter ever, gaining three points of market share,” says Jeff Wilson, principal analyst for security at Infonetics Research.

Wilson continues: “The network security market nearly hit double-digit growth in 4Q13, and we expect growth to accelerate this year as service providers and enterprises increase security investment to improve security performance and keep up with a changing threat landscape.”

NETWORK SECURITY MARKET HIGHLIGHTS

  • The global network security appliance and software market grew 9.8% from 3Q13 to 4Q13, to $1.8 billion
  • For the full year 2013, network security revenue totaled $6.4 billion, a 2.6% increase over 2012
  • Integrated security products (integrated security appliances, secure routers, SSL VPN gateways, and VPN and firewall software) make up the majority of revenue
  • Looking at the top 3 vendors' quarter-over-quarter (4Q13 vs 3Q13) performance, Cisco increased overall revenue 20%; Check Point had a typically strong 4th quarter, and Juniper posted its second consecutive quarter of growth
  • Palo Alto Networks and Fortinet once again posted strong quarter-over-quarter and year-over-year growth in 4Q13, and are well positioned to continue gaining share
  • Infonetics forecasts the worldwide network security market to reach $7.3 billion in 2018, a 2013–2018 CAGR of 2.5%

SECURITY ANALYST CONFERENCE CALL FOR CLIENTS

Clients, log in to view on-demand Jeff Wilson’s quarterly network security market recap and outlook: https://www.infonetics.com/cgp/login.asp?id=897

SECURITY WEBINAR

View on-demand security analyst Jeff Wilson’s Using Big Data Analytics to Amplify Security Intelligence webinar, a primer for enterprises and service providers looking to use big data to detect, mitigate, and prevent malicious attacks:

http://w.on24.com/r.htm?e=752135&s=1&k=0982A14627EA5282D4986F686F78F03E

NETWORK SECURITY REPORT SYNOPSIS

Infonetics’ quarterly network security report provides worldwide and regional market size, vendor market share, forecasts through 2018, analysis, and trends for integrated security appliances, secure routers, SSL VPN gateways, VPN and firewall software, and IDS/IPS products. Vendors tracked: Alcatel-Lucent, Array Networks, CA, Check Point, Cisco, Citrix, D-Link, Extreme Networks, eSoft, F5, Fortinet, GTA, HP, Huawei, Intrusion, ISS, Juniper, McAfee, NetASQ, Palo Alto Networks, SonicWall, Sourcefire, Stonesoft, WatchGuard, ZyXel, and others. To buy the report, contact Infonetics: http://www.infonetics.com/contact.asp.

RELATED REPORT EXCERPTS

RECENT AND UPCOMING SECURITY RESEARCH

Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at http://www.infonetics.com/login.

INFONETICS WEBINARS

Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

  • Virtualizing Networks with SDN NVOs and Bare Metal Switches (Mar. 25: Attend)
  • The Increasing Threat of Compromised Web Servers and How to Mitigate It (Apr. 2: Attend)
  • Security at the Speed of VoLTE (Apr. 10: Attend)
  • Using Big Data Analytics to Amplify Security Intelligence (View on-demand)
  • Redefining Network Security Performance: The Speed You Really Need (View on-demand)
  • Data Center Firewalls: The New Performance Requirements (View on-demand)
  • DDoS Mitigation Strategies: What's Next (June 10: Sponsor)
  • Protecting Infrastructure Control Systems from Cyber Attacks (Aug. 14: Sponsor)

TO BUY REPORTS, CONTACT:

N. America (West), Asia Pacific: Larry Howard, [email protected], +1 408-583-3335

N. America (East, Midwest), L. America: Scott Coyne, [email protected], +1 408-583-3395

EMEA, India, Singapore: George Stojsavljevic, [email protected], +44 755-488-1623

Japan, South Korea, China, Taiwan: http://www.infonetics.com/contact.asp

ABOUT INFONETICS

Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.