Security: Lock That Information!

author-image
DQI Bureau
New Update

In today's dynamically changing business scenario with rapid
growth and competition, enterprises need faster adaptability and response to
market situations. This is pushing enterprises for high availability of both
intra and inter-organizational information to enable better and faster
decision-making. Enterprises are also opening up and integrating with a larger
ecosystem of partner in the supply chain and networking with both their
downstream and upstream partners in the ecosystem, so as to streamline and
optimize their value chain.

Advertisment

Security Transition

This transition from a bounded environment prior to supply chain
integration, to the unbounded environment resulting from connectivity has thrown
a number of security issues for the enterprises. The working environment has
also changed considerably with employees mobility increasing. Anticipated
uncontrolled deployment of PDAs, smart phones and other futuristic devices
coupled with higher mobility of employees having connectivity on the move will
lead to security issues that need to be tackled head on.

If we look at the security evolution in the above scenario,
security was never viewed from an enterprise-wide business approach and had
traditionally always taken a discrete isolated approach. The reasons for this
were simple; organizations wanted to protect their assets, so perimeter security
was deployed. Security was not linked to business processes tightly and
organizations were not much worried about information security as the adoption
of networking and mobility was limited.

Advertisment

Higher mobility and faster decision-making require information
to be made available anytime, anywhere. This, in turn would enable enterprises
to respond to changing market needs in a shorter time-span. The scenario is
changing fast and organizations are now integrating business processes, while
service delivery architecture is evolving. Now we need to have higher
collaboration and sharing information intra and inter organizations, as whole
ecosystem is important. We will see that the reliance on third party is
increasing as we are seeing convergence in services and each component playing a
critical role.

Security will move from perimeter security to next level with
the need for higher availability coupled with compliance to regulations putting
Identity & Access Management (IAM) solutions in the mainstream. So...

The Trends



Some trends observed
in 2005/2006 on security across different segments of computer users are
highlighted below

Commercial Users

  • More than two-thirds of
    Indian organizations identify 'attacks through email' as their
    biggest security concern, as this impacts the integrity of data stored
    on their IT systems

  • Loss or exposure of
    confidential information is considered to be the one of the most
    serious security issue. The nuisance created by spam is a close
    follower of that

  • New-age companies like
    IT-enabled services and life sciences are found to use more
    sophisticated security solutions as compared to their older
    counterparts

  • The scenario is not
    similar in old-economy companies, where the concepts of security
    policy and security audit are still not accorded the value that they
    deserve

  • With the increased
    adoption of better storage solutions, the concern for security is also
    increasing among many Indian companies. Considering security
    applications during storage implementations is becoming a 'must do'
    rather than an isolated example of far-sightedness

Home Users

  • Unlike commercial users,
    home users of computers are far behind in understanding and addressing
    the threats and concerns around security

  • Though most users are
    aware of terms like virus infection or hacking, only about half of
    them have actually experienced it in any form according to a recent
    IDC India survey. These users tolerate spamming simply by turning a
    blind-eye and making liberal use of the delete button! Though some
    valid email messages may also get deleted in the process but that does
    not create much havoc as no mission-critical activity is generally
    carried out from home PCs

  • Awareness of different
    functions/features of antivirus software packages is found to be quite
    low among home PC users. Regular updates of the software are also not
    undertaken by these users

  • The Indian home PC user's
    biggest security concern is around sharing identity online, followed
    by infotainment and transaction related activities

*2005/2006 refers to 2H
2005/1H 2006 time periods

Advertisment

Driving a Boom

Enterprises will need to design a centralized security policy, which takes
into consideration the needs of employees and partners alike. This trend will
increasingly set the boundaries that govern security management and
administration policies in enterprises. IAM solutions will also help enterprises
realize the dual benefits of simplified compliance management and centralized
security management for a diverse set of applications.

According to IDC, in 2005 the overall security software market
in India stood at $66.6 mn, while the security appliances market was estimated
to be $31.5 mn. The leading players in the security software market were Cisco,
Trend Micro, Symantec, Check Point, McAfee, RSA, CA, ISS, Fortinet and Juniper
etc.

Advertisment

While many security appliances were launched in the 2005/2006
timeframe, these have been deployed mostly by small and medium business (SMB)
enterprises. UTM (Unified Threat Management) appliances will provide greater
flexibility to enterprise as they are deploying UTM in branches within the
larger perimeter defense. Large enterprises would continue to invest in
best-of-breed software products when it comes to larger perimeter exposed to
external world, where criticality is high. Dedicated appliances are also making
inroads into the large enterprise space. SMBs find security appliances a good
option as they get good functionality and easier manageability at a relatively
lower cost.

Managed security services are on the rise and enterprises are
looking towards outsourcing security management to third party service
providers. Market adoption of security solutions in 2005/2006 was concentrated
mainly amongst large and mid-size enterprises in the country. Typically, the
inherent nature of these enterprises drove the demand for these types of
security solutions. Their vast scale of operations, higher requirement for data
protection in the light of increasing security awareness, protection
requirements of bigger networks, and connectivity were some of the critical
factors that propelled this market.

Vendors in the security software market were seen to be
targeting verticals such as BFSI, telecommunications, government and the
services sector during 2005/2006. Enterprises in these verticals have huge
repositories of critical data and therefore their security solutions
requirements come with the increased complexity of geographical spread. Not to
mention that manufacturing sector has also started investing in enterprise-wide
security solutions in 2006.

Advertisment

Praveen Sengar

maildqindia@cybermedia.co.in


The author is assistant manager, Software & Services Research, IDC India