September 22, 2005. Call in at 10:55 pm Eastern Time Natalie Lambert Michael Speyer Analyst Senior Analyst Forrester Res...
Theme The demand for security products is strong across all market segments and product categories.
Agenda <ul><li>Overview of included surveys </li></ul><ul><li>Review of results </li></ul><ul><ul><li>SMB security concern...
Survey scope and purpose <ul><li>Data is obtained from three Business Technographics® surveys, including: </li></ul><ul><u...
Telecom Survey respondent demographics Source: Forrester’s Business Technographics ® 2005 Telecommunications and Networks...
SMB Survey respondent demographics Company Size Respondents Source: Forrester’s Business Technographics ® 2005 North Amer...
Enterprise Telecom Survey respondent demographics IT or telecom director/manager Source: Forrester’s Business Technographi...
Enterprise Infrastructure Survey respondent demographics Source: Forrester’s Business Technographics ® 2005 Telecommunica...
SMB Security Concerns And Adoption
Viruses and worms top list of risks; regulatory compliance not seen as an issue 83% 61% 54% 53% 37% 29% 28% 20% 19% 1% Don...
SMBs will purchase a broad range of security technologies 59% 57% 45% 37% 37% 36% 29% 21% 19% 17% 17% 13% Patch management...
Symantec is security software leader 35% 25% 22% 12% 1 1 % 8% 8% 5% 4% 6% 4% Other Develop in-house NetScreen Sygate Check...
Security consulting is in demand, especially among larger SMBs <ul><li>It’s the third-most demanded consulting service aft...
Utilities & telecoms and manufacturing firms lead security software adoption 77% 77% 74% 73% 67% 65% 58% Finance and insur...
Key take-aways in the SMB market <ul><li>In 2005, SMBs: </li></ul><ul><ul><li>Will purchase a broad range of security tech...
Enterprise Security Spending And Technology Adoption
Major themes to the enterprise IT organization “ Which of the following initiatives are likely to be one of your organizat...
Security upgrades — a top priority for the third year in a row 47% 46% 41% 45% 28% 34% 34% 24% 23% 24% 13% 24% 15% 12% Man...
Enterprises will see an increase in IT security spending this year 6% 6% 16% 25% 27% 35% 29% 40% 30% 42% 48% 50% 37% 24% 3...
Infrastructure integration is the most important driver when purchasing security “ How important are the following drivers...
Cost: The unexpected obstacle when adopting a security technology Expectation versus reality when acquiring security techn...
Almost a third of enterprises are already using network quarantine “ For the following technologies, please indicate if yo...
Storage security applications will see little increase in adoption “ What is your level of interest in the following tech...
Appliance-based security adoption “ How interested are you in adopting appliance-based security technology in the next 12 ...
Enterprises will put multiple security technologies on appliances “ What security functions are you likely to deploy on a ...
Manageability is a key driver in appliance-based security adoption Source: Business Technographics® July 2005 North Americ...
Key take-aways in enterprise spending and adoption <ul><li>In 2005, enterprises: </li></ul><ul><ul><li>Consider upgrading...
Enterprise Vendor Preferences For Security Technologies
“ Which vendor will you consider most for ... ?” 33% 13% 1 1 % 9% 6% IBM T ivol i McAfee Symantec Check Point Cisco 44% 15...
“ Which vendor will you consider most for ... ?” 23% 9% 9% 9% 7% Novell Computer Associates RSA Security A IBM Microsoft ...
Key take-aways for enterprise vendor preferences <ul><li>In 2005, enterprises: </li></ul><ul><ul><li>Will buy from Cisco f...
Summary <ul><li>In 2005, SMBs: </li></ul><ul><ul><li>Will purchase a broad range of security technologies. </li></ul></ul>...
Selected bibliography <ul><li>July 7, 2005, Data Overview “Software And Services In The SMB Market” </li></ul><ul><li>June...
Thank you Natalie Lambert [email_address] Michael Speyer [email_address] www.forrester.com Entire contents © 2005 Forrest...
of 34

Natalie Lambert Michael Speyer Analyst Senior Analyst

Published on: Mar 3, 2016
Source: www.slideshare.net


Transcripts - Natalie Lambert Michael Speyer Analyst Senior Analyst

  • 1. September 22, 2005. Call in at 10:55 pm Eastern Time Natalie Lambert Michael Speyer Analyst Senior Analyst Forrester Research ForrTel: The State Of Security In The Enterprise And SMB Markets
  • 2. Theme The demand for security products is strong across all market segments and product categories.
  • 3. Agenda <ul><li>Overview of included surveys </li></ul><ul><li>Review of results </li></ul><ul><ul><li>SMB security concerns and adoption </li></ul></ul><ul><ul><li>Enterprise security spending and technology adoption </li></ul></ul><ul><ul><li>Enterprise vendor preferences for security technologies </li></ul></ul><ul><li>Summary </li></ul>
  • 4. Survey scope and purpose <ul><li>Data is obtained from three Business Technographics® surveys, including: </li></ul><ul><ul><li>US SMB Software Study </li></ul></ul><ul><ul><li>US and European Enterprise Telecommunications and Network Services Study </li></ul></ul><ul><ul><li>US and European Data Center and Infrastructure Study </li></ul></ul><ul><li>Assess spending, adoption, and vendor preference in enterprise market. </li></ul>
  • 5. Telecom Survey respondent demographics Source: Forrester’s Business Technographics ® 2005 Telecommunications and Networks Study Company Size (Employees) Respondents 5,000-19,999 1,000-4,999 IT or telecom director/manager CIO, senior IT decision-maker Executive who reports to senior-most IT decision-maker N=700 (USA) N=300 (EU) 50% 20,000+ 23% 27% 28% 40% 32%
  • 6. SMB Survey respondent demographics Company Size Respondents Source: Forrester’s Business Technographics ® 2005 North American SMB Software Study N=789 (USA) 6-49 26% 500-999 19% 100-199 20% 50-99 17% 200-499 18% Owner/CEO 22% LOB Exec 32% Director /Mgr in IT 23% CIO/ Equivalent 11% VP in IT 12%
  • 7. Enterprise Telecom Survey respondent demographics IT or telecom director/manager Source: Forrester’s Business Technographics ® 2005 Telecommunications and Networks Study Company Size (Employees) Respondents 5,000-19,999 1,000-4,999 CIO, senior IT decision-maker Executive who reports to senior-most IT decision-maker 50% 20,000+ 23% 27% 28% 32% 40%
  • 8. Enterprise Infrastructure Survey respondent demographics Source: Forrester’s Business Technographics ® 2005 Telecommunications and Networks Study Company Size (Employees) Respondents 5,000-19,999 1,000-4,999 IT director/ manager CIO, senior IT decision-maker Executive who reports to senior-most IT decision-maker 51% 20,000+ 17% 29% 27% 38% 35%
  • 9. SMB Security Concerns And Adoption
  • 10. Viruses and worms top list of risks; regulatory compliance not seen as an issue 83% 61% 54% 53% 37% 29% 28% 20% 19% 1% Don’t know Regulatory compliance Internal hackers/attacks Employees violating security policies Security configuration compliance Identity theft Outside hackers Spam Spyware Viruses and worms “ Which of the following security issues or risks are you most concerned about?” Base: 716 technology decision-makers at US SMBs (multiple responses accepted)
  • 11. SMBs will purchase a broad range of security technologies 59% 57% 45% 37% 37% 36% 29% 21% 19% 17% 17% 13% Patch management Security event management Identity management Security configuration management Host intrusion prevention/detection Client/desktop firewall Gateway antivirus Content/spam filtering Network intrusion prevention/detection Host antivirus Antispyware Network firewall (multiple responses accepted) Source: Forrester’s Business Technographics® June 2005 United States SMB Software And Services Benchmark Study 59% 57% 45% 37% 37% 36% 29% 21% 19% 17% 17% 13% Patch management Security event management Identity management Security configuration management Host intrusion prevention/detection Client/desktop firewall Gateway antivirus Content/spam filtering Network intrusion prevention/detection Host antivirus Antispyware Network firewall “ Which of the following types of security software are you most likely to invest in this year?” Base: 510 technology decision-makers at US SMBs that are purchasing security software (multiple responses accepted) … but product categories are slightly out of sync with current threats
  • 12. Symantec is security software leader 35% 25% 22% 12% 1 1 % 8% 8% 5% 4% 6% 4% Other Develop in-house NetScreen Sygate Check Point IBM T ivol i Computer Associates T rend Micr o Cisco V eriSig n McAfee Symantec “ Which brands will your company consider most for security software?” Base: 510 technology decision-makers at US SMBs who are purchasing security software (multiple responses accepted) Source: Forrester’s Business Technographic® June 2005 United States SMB Benchmark Study 66%
  • 13. Security consulting is in demand, especially among larger SMBs <ul><li>It’s the third-most demanded consulting service after app. development and Web design. </li></ul>31% 39% 43% 500 to 999 employees 100 to 499 employees 6 to 99 employees “ Will your organization purchase IT security assessment and planning consulting services in 2005?” Base: 616 technology decision-makers at US SMBs
  • 14. Utilities & telecoms and manufacturing firms lead security software adoption 77% 77% 74% 73% 67% 65% 58% Finance and insurance Media, entertainment, and leisure Public sector Business services Retail and wholesale trade Manufacturing Utilities and telecommunications “ During 2005, will your organization purchase security software, including first-time deployments as well as upgrades?” Overall average 71% Base: 716 technology decision-makers at US SMBs
  • 15. Key take-aways in the SMB market <ul><li>In 2005, SMBs: </li></ul><ul><ul><li>Will purchase a broad range of security technologies. </li></ul></ul><ul><ul><li>Will look to Symantec for their software security. </li></ul></ul><ul><ul><li>Will use IT consulting services to cope with an increasingly complex security environment. </li></ul></ul><ul><ul><li>Will purchase the most security software (in utilities & telecom and manufacturing firms). </li></ul></ul>
  • 16. Enterprise Security Spending And Technology Adoption
  • 17. Major themes to the enterprise IT organization “ Which of the following initiatives are likely to be one of your organization’s major themes for the next 12 months?” Initiative* July 2005 November 2004 November 2003 *Only the top five initiatives from July 2005 are listed. 5 4 3 2 1 7 5 NA 4 3 4 Replace or upgrade PCs or laptops 7 Consolidate IT infrastructure NA Upgrade business continuity capabilities 1 Significantly upgrade your security environment 6 Provide support for regulatory compliance
  • 18. Security upgrades — a top priority for the third year in a row 47% 46% 41% 45% 28% 34% 34% 24% 23% 24% 13% 24% 15% 12% Manufacturing Retail and wholesale trade Utilities and telecommunications Business services Finance and insurance Public sector Media, entertainment, and leisure Base: 700 infrastructure decision-makers at North American enterprises “ Will significantly upgrading your security environment be one of your IT organization’s major themes for 2005?” Source: Business T echnographics® July 2005 North American And European Infrastructure And Data Center Survey Critical priority Priority 39% 17% Overall
  • 19. Enterprises will see an increase in IT security spending this year 6% 6% 16% 25% 27% 35% 29% 40% 30% 42% 48% 50% 37% 24% 30% 39% 38% 22% 16% 20% 31% 20% 24% Overall Business services Retail and wholesale trade Media, entertainment, and leisure Finance and insurance Manufacturing Public sector Base: 407 telecom decision-makers at North American enterprises Significantly lower (10%+ decrease) Somewhat lower (1-9% decrease) The same Somewhat higher (1-9% increase) Significantly higher (10%+ increase) “ How will your IT security spending in 2005 compare to last year? Note: “Don’t know” and “not applicable” responses have been excluded. Source: Forrester’s Business Technographics ® May 2005 North American And European Network And Telecommunication Benchmark Study
  • 20. Infrastructure integration is the most important driver when purchasing security “ How important are the following drivers when purchasing enterprise security technologies?” 4% 2% 3% 3% 13% 16% 17% 20% 46% 48% 45% 43% 36% 34% 34% 33% Integration with other security technologies Best price-performance Simplified manageability Integration with other infrastructure technologies 1 - Not important 2 3 4 - V ery importan t Base: 438 infrastructure decision-makers at North American enterprises Source: Business T echnographics® July 2005 North American And European Infrastructure And Data Center Survey
  • 21. Cost: The unexpected obstacle when adopting a security technology Expectation versus reality when acquiring security technologies 19% 18% 35% 5% 4% 10% 53% 14% 13% 7% 5% 5% 34% -4% -22% 2% 1% -5% Compatibility Scalability A vailability Cost Manageability Reliability “ What is the largest obstacle when implementing security technologies?” “ What is the most important factor you consider when acquiring security technologies?” Difference between expectation and reality Base: 438 telecom decision-makers at North American enterprises Source: Forrester’s Business Technographics® May 2005 North American And European Network And Telecommunications Benchmark Study Cost is the unex -- pected obstacle for security adoption. Only 13% of enter - prises consider cost the most important pre-purchase factor; howeve r , 35% find it the largest obstacle for implementation.
  • 22. Almost a third of enterprises are already using network quarantine “ For the following technologies, please indicate if you are ‘aware’ of it, ‘not aware,’ or ‘already using’ them.” 27% 29% 34% 42% 45% 46% 31% 26% 20% Storage security applications XM L security applications an d gateways for securing W eb service s Network quarantine Already using A war e Not aware Base: 438 infrastructure decision-makers at North American enterprises
  • 23. Storage security applications will see little increase in adoption “ What is your level of interest in the following technologies?” 44% 49% 55% 27% 26% 22% 14% 16% 18% 16% 9% 6% Storage security applications XM L security applications and gateways for securing Web services Network quarantine Will pilot in the next 12 months V ery interested but no plans to adopt Somewhat interested Not interested Base: Infrastructure decision-makers at North American enterprises who answered “aware” when asked about the previous security technologies (percentages do not total 100 because of rounding) Source: Business T echnographics® July 2005 North American And European Infrastructure And Data Center Survey
  • 24. Appliance-based security adoption “ How interested are you in adopting appliance-based security technology in the next 12 months?” Base: 438 infrastructure decision-makers at North American enterprises Already using 19% Will pilot in the next 12 months 9% V ery interested, but no plans to adopt 6% Not interested 42% Somewhat interested 20% Don’t know 4%
  • 25. Enterprises will put multiple security technologies on appliances “ What security functions are you likely to deploy on a security appliance?” Base: 123 infrastructure decision-makers at North American enterprises who are currently using or will pilot appliance-based security technology (multiple responses accepted). 81% 75% 74% 63% 60% Application firewall Web content filtering Email security Network firewall Intrusion prevention /detection
  • 26. Manageability is a key driver in appliance-based security adoption Source: Business Technographics® July 2005 North American And European Infrastructure And Data Center Survey “ What is the primary driver behind buying appliance-based security technology?” Base: 123 infrastructure decision-makers at North American enterprises who are currently using or will pilot appliance-based security technology (multiple responses accepted) 79% 73% 58% 52% 15% 4% Other It was required by Managed Services provider Convergence of multiple technologies on one device Better price-performance Obtaining a higher level of security Simpler manageability
  • 27. Key take-aways in enterprise spending and adoption <ul><li>In 2005, enterprises: </li></ul><ul><ul><li>Consider upgrading their security environment a top IT priority. </li></ul></ul><ul><ul><li>Believe that integration and manageability are the most important product selection drivers. </li></ul></ul><ul><ul><li>Will increase adoption in network quarantine. </li></ul></ul><ul><ul><li>Will slowly begin adopting appliance-based security. </li></ul></ul>
  • 28. Enterprise Vendor Preferences For Security Technologies
  • 29. “ Which vendor will you consider most for ... ?” 33% 13% 1 1 % 9% 6% IBM T ivol i McAfee Symantec Check Point Cisco 44% 15% 8% 6% 4% Enterasys Microsoft Symantec Check Point Cisco Network quarantine Data center and network security Base: 165 infrastructure decision-makers at North American enterprises who will purchase network quarantine solutions Base: 209 infrastructure decision-makers at North American enterprises who will purchase data center and network security technologies “ Which vendor will you consider most for . . .?”
  • 30. “ Which vendor will you consider most for ... ?” 23% 9% 9% 9% 7% Novell Computer Associates RSA Security A IBM Microsoft 25% 18% 13% 9% 6% Computer Associates Microsoft Cisco McAfee Symantec Desktop security Identity management Base: 127 infrastructure decision-makers at North American enterprises that will purchase identity management technologies Base: 208 infrastructure decision-makers at North American enterprises that will purchase desktop security technologies
  • 31. Key take-aways for enterprise vendor preferences <ul><li>In 2005, enterprises: </li></ul><ul><ul><li>Will buy from Cisco for network-centric security technologies. </li></ul></ul><ul><ul><li>Will look to Symantec for desktop security. </li></ul></ul><ul><ul><li>Will go to Microsoft for identity management. </li></ul></ul>
  • 32. Summary <ul><li>In 2005, SMBs: </li></ul><ul><ul><li>Will purchase a broad range of security technologies. </li></ul></ul><ul><ul><li>Will look to Symantec for their software security. </li></ul></ul><ul><ul><li>Will use IT consulting services to cope with an increasingly complex security environment. </li></ul></ul><ul><li>In 2005, enterprises: </li></ul><ul><ul><li>Consider upgrading their security environment a top IT priority. </li></ul></ul><ul><ul><li>Believe that integration and manageability are the most important product selection drivers. </li></ul></ul><ul><ul><li>Will increase adoption in network quarantine. </li></ul></ul><ul><ul><li>Will slowly begin adopting appliance-based security. </li></ul></ul>
  • 33. Selected bibliography <ul><li>July 7, 2005, Data Overview “Software And Services In The SMB Market” </li></ul><ul><li>June 23, 2005, Data Overview “The State Of Network And Telecom Adoption” </li></ul><ul><li>Upcoming Research </li></ul><ul><ul><li>The State Of Security In SMBs And Enterprises </li></ul></ul>
  • 34. Thank you Natalie Lambert [email_address] Michael Speyer [email_address] www.forrester.com Entire contents © 2005 Forrester Research, Inc. All rights reserved.

Related Documents