Welcome!

News Feed Item

Infonetics: SDN and NFV to Bring About Shift in Data Center Security Investments

Market research firm Infonetics Research released excerpts from its latest Data Center Security Products report, which tracks data center security appliances and virtual security appliances.

DATA CENTER SECURITY ANALYST NOTE

“Historically, data centers have been protected by big-iron security solutions and complex webs of security appliances and load-balancing infrastructure,” says Jeff Wilson, principal analyst for security at Infonetics Research. “But as more providers virtualize their data centers and roll out SDNs and NFV, we anticipate a fairly significant revenue transition from hardware appliances to virtual appliances and purpose-built security solutions that interface directly with hypervisors, with SDN controllers via APIs, or orchestration platforms.”

DATA CENTER SECURITY MARKET HIGHLIGHTS

  • The ported virtual security appliances segment of the data center security market grew 10% in 2013 over 2012, to $437 million
  • Meanwhile, sales of purpose-built virtual security appliances totaled $150 million in 2013, up 44% from the prior year
  • Cisco, Juniper, and Fortinet are the top 3 revenue share leaders in the data center security appliance market
  • Massive interest in SDN- and NFV-compatible security solutions is expected to drive consolidation among established security players, virtualization platform vendors, and specialist vendors
  • Infonetics is projecting a cumulative $1.35 billion will be spent on purpose-built virtual security appliances from 2014 to 2018

ABOUT INFONETICS’ DATA CENTER SECURITY REPORT

Infonetics’ biannual data center security report provides worldwide and regional market size, market share, forecasts through 2018, analysis, and trends for purpose-built virtual security appliances and multiple segments of ported virtual security appliances and data center security appliances. Vendors tracked: Arbor Networks, Blue Coat, Check Point, Cisco, Fortinet, GenieNRM, HP, ISS, Juniper, McAfee, Narus, SonicWall, Sourcefire, Stonesoft, Symantec, Trend Micro, WatchGuard, Websense, and others. To buy the report, contact Infonetics: http://www.infonetics.com/contact.asp.

RELATED REPORT EXCERPTS

RECENT AND UPCOMING SECURITY MARKET FORECASTS AND SURVEYS

Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at http://www.infonetics.com/login.

INFONETICS WEBINARS

Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

  • NFV: An Easier Initial Target Than SDN (June 19: Attend)
  • New DNS-based DDoS Attacks Demand Advanced Mitigation Tools (View on-demand)
  • The Increasing Threat of Compromised Web Servers & How to Mitigate It (View on-demand)
  • Using Big Data Analytics to Amplify Security Intelligence (View on-demand)
  • Protecting Infrastructure Control Systems from Cyber Attacks (Aug. 14: Sponsor)

TO BUY REPORTS, CONTACT:

N. America (West), Asia Pacific: Larry Howard [email protected] +1 408-583-3335

N.A. (East, Midwest), L. America, EMEA: Scott Coyne [email protected] +1 408-583-3395

Greater China, SE Asia, India: 大中华区 Jeffrey Song [email protected] +86 21-3919-8505

Japan 日本 Takashi Kimura, TAK Analytics [email protected] +81 3-6408-5566

South Korea 대한민국 Doug Moon, MBAP [email protected], +82 2-3453-9400

ABOUT INFONETICS

Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
Given the popularity of the containers, further investment in the telco/cable industry is needed to transition existing VM-based solutions to containerized cloud native deployments. The networking architecture of the solution isolates the network traffic into different network planes (e.g., management, control, and media). This naturally makes support for multiple interfaces in container orchestration engines an indispensable requirement.
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
In their session at @DevOpsSummit at 21st Cloud Expo, Michael Berman, VP Engineering at TidalScale, and Ivo Jimenez, Engineer at TidalScale, will describe how automating tests in TidalScale is easy thanks to WaveRunner. They will show how they use WaveRunner, Jenkins, and Docker to have agile delivery of TidalScale. Michael Berman is VP Engineering at TidalScale. TidalScale is developing a scale up compute and resource architecture for customers to perform big data exploration and real time anal...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, provided a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services with...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...