• The NAC market is forecasted to achieve a compounded annual growth rate of 29.5% and reach
$1.46 billion by 2018.
• Gart...
Key Observations and Drivers :
• Sourcefire Advanced Malware Protection detected 99% of HTTP malware, 98% of email malware...
NAC Market Opportunity
NAC Market Revenue:
$399.8M (2013)
$552.8M (2014)
$740.4M (2015
projected)
CAGR:
29.5% (2013-2018)
...
Evolution of NAC Solutions and Market
Static document
based data & reports
Collector-driven
automation for
inventory & exc...
Problem Statement
• Interoperability & 3rd Party –
existing Infra, EMM, SIEM etc.
• Mobile Workforce-Deployment
difficulti...
Current State-
Restrictive &
Silod
Transition State-
Evolution
Future State-
Permissive &
Inclusive
• Many point security
...
of 6

Nac market

Analysis of NAC Market
Published on: Mar 3, 2016
Published in: Technology      
Source: www.slideshare.net


Transcripts - Nac market

  • 1. • The NAC market is forecasted to achieve a compounded annual growth rate of 29.5% and reach $1.46 billion by 2018. • Gartner estimates in 2015 growth to be conservative at approximately 20%. Cisco, Juniper (now Pulse Secure) and ForeScout—represent 70% of the NAC market. Key Market Drivers- • Extent of endpoint visibility and ability to fast quarantine. • Increasing “BYOD” and resultant malware attach rate. • Ease of use and deployment. • Ability to detect and restrict malware before and after. • Granular policy settings. • Integration with other security tools and draw upon a cohesive SPOG. • Scalability, ease of management, support & Pricing. Top Verticals- 80% Sales • Financial sector • Government • Healthcare • Education
  • 2. Key Observations and Drivers : • Sourcefire Advanced Malware Protection detected 99% of HTTP malware, 98% of email malware, and 100% of exploits, giving an overall breach detection rating of 99.0%. The device passed all stability and reliability tests. • NIST 4.0 requires agencies of the federal government to provide an inventory of devices, applications, and OS every month. • HIPPA requires that data privacy must be protected. • College students have large numbers of unmanaged device sand are tech savy.
  • 3. NAC Market Opportunity NAC Market Revenue: $399.8M (2013) $552.8M (2014) $740.4M (2015 projected) CAGR: 29.5% (2013-2018) Top 4 Industries Buying NAC: FIN, GOV, HC, EDU Competitive Market Share: 69.5% (Top 3) 39.6% (Cisco)
  • 4. Evolution of NAC Solutions and Market Static document based data & reports Collector-driven automation for inventory & exceptions Dynamic customer portal for proactive optimization Prioritize & track NCE optimize recommendations Basic Minimum checks for anyone entering 2015+ Cisco, ForeScout, Aruba, IBM, Pulsesecure 2010 Cisco, Juniper, IBM, ForeScout, Trustwave, Avenda, Bradford Early 2000s MS, HP, Juniper, McAfee, Symantec, Cisco Access Control EnforcementRemediation/Captive Portal Posture Checks Authentication • BYOD, ENT Mobility, IoE & Warehouse of context (Cisco, ForeScout) • Cohesive, distributed, closed loop defense mechanism with end-point and perimeter integration. • Mobility Management, Cloud Mgmt. • Allow/Deny • Access Control • End point Security • Posture Checking • + • Remediation • Device profiling • Policy management • Captive portals, CoA • AD/LDAP Restrictive Approach Permissive Approach-”Need to Know”
  • 5. Problem Statement • Interoperability & 3rd Party – existing Infra, EMM, SIEM etc. • Mobile Workforce-Deployment difficulties • Scalability issues • Streamline IT Operations(Guest Registration, device mgmt., monitoring, threat protection & remediation) • SPOG & SSOT • Faster remediation and limiting measures • Compliance in a BYOD environment Can I control where they go Can I shut them off if they misbehave and find the malware Can I remove the malware once it has entered the network. Does your NAC solution work seamlessly with my existing infrastructure. who is connecting to my network and are they healthy What are they saying? There are only two types of companies: those that have been hacked and those that will be. Security should be built in the foundation.
  • 6. Current State- Restrictive & Silod Transition State- Evolution Future State- Permissive & Inclusive • Many point security solutions and gears. • Detached security approach • Mostly Reactive measures • Lack of credible deterrence against persistent threats. • Mobile Malware and IoT Malware and Threats. • 4,900 new android malware samples every day. • SMAC + IoT • Distributed yet cohesive defense architectures. • Convergence of platforms & products • SPOG management view. • Cloud nw resources and virtual environments policy enforcement. • Threat containment and removal. • Seamless information sharing across boundaries. • Partnerships and market consolidation .

Related Documents