A discussion of the cyberoam opportunity for utm globally and mea
This presentation is the property of its rightful owner.
Sponsored Links
1 / 75

A Discussion of the Cyberoam Opportunity for UTM Globally and MEA PowerPoint PPT Presentation


  • 49 Views
  • Uploaded on
  • Presentation posted in: General

A Discussion of the Cyberoam Opportunity for UTM Globally and MEA. Presented to Cyberoam February 13, 2011 James Brehm, Senior Consultant. Table of Contents. 1. Introduction

Download Presentation

A Discussion of the Cyberoam Opportunity for UTM Globally and MEA

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


A discussion of the cyberoam opportunity for utm globally and mea

A Discussion of the Cyberoam Opportunity for UTM Globally and MEA

Presented to Cyberoam

February 13, 2011

James Brehm, Senior Consultant


Table of contents

Table of Contents

1. Introduction

2. Overview of the MEA Business Environment and Corresponding Security Landscape (high level discussion of security technologies - endpoint/UTM/SSL VPN/FW/etc)

3. UTM Market Size and Trajectory

a. UTM Market Size (Global Market Size as compared to MEA Market)

b. Growth rate / trajectory

c. Drivers and restraints

d. Opportunities, challenges and threats

4. Competitive Landscape (Global as compared to MEA Market)

a. Competitive Positioning

b. Position Direction

c. Discussion of Global Market Share and Regional Tendencies

5. Cyberoam's Future Positioning?

6. Conclusions

7. Q&A


Who is frost sullivan

Who is Frost & Sullivan

  • The Growth Consulting Company

    • Founded in 1961, Frost & Sullivan has 50 years of assisting clients with their decision-making and growth issues.

    • Over 1,500 Growth Consultants and Industry Analysts across 40 global locations

    • Over 10,000 clients worldwide - emerging companies, the global 1000 and the investment community

    • Developers of the Growth Excellence Matrix – industry leading growth positioning tool for corporate executives

    • Developers of T.E.A.M. Methodology, proprietary process to ensure that clients receive a 360o perspective of technology, markets and growth opportunities

    • Three core services: Growth Partnership Services, Growth Consulting and Career Best Practices


Global perspective

Global Perspective

  • 1,500 staff across every major market worldwide

  • Over 10,000 clients worldwide from emerging to global 1000 companies


What stage is the mea network security market in right now

What stage is the MEA Network Security market in right now?


A discussion of the cyberoam opportunity for utm globally and mea

If the Security Market were the World Cup Tournament, What Round are we In?


A discussion of the cyberoam opportunity for utm globally and mea

We’re Still a Long Way from Maturity


Where are we today and why has it taken so long

Where are we today and why has it taken so long?


Industry conflict emerging threats changing market

Industry Conflict, Emerging Threats, Changing Market…


Business environment and vertical market discussion

Business Environment

and Vertical Market Discussion


First we ll look at the global market

First We’ll Look at the Global Market


Then we ll focus on regional implications

Then We’ll Focus on Regional Implications


Methodology isc 2 members survey

Methodology – (ISC)2 Members Survey

A total of 7,547 (ISC)2 members were surveyed during the Fall of 2010 by Frost & Sullivan. The table below shows the sample size by region.


Methodology non members survey

Methodology – Non-Members Survey

A total of 2,866 non-members were surveyed during the Fall of 2010 by Frost & Sullivan. The table below shows the sample size by region.


Isc 2 members survey salary increase or incentive in 2010 by region

(ISC)2 Members SurveySalary Increase or Incentive in 2010 by Region

  • Three out of five (ISC)2 members received a salary increase or incentive in 2010 and 33% had no change in their salary or benefits.

  • More members in the Americas reported a lower salary increase of up to 5% and 39% of members in EMEA reported no change in salary or benefits.

Salary Increase or Incentive by Region

Q46a) Did you receive a salary increase, including benefits and incentives, in 2010?

Base: All member respondents (n=7547).


Non members survey salary increase or incentive in 2010 by region

Non-Members Survey Salary Increase or Incentive in 2010 by Region

  • Three out of five non-members received a salary increase or incentive in 2010 and 35% had no change in their salary or benefits.

  • More non-members in the Americas reported a lower salary increase of up to 5% and 42% of non-members in EMEA reported no change in salary or benefits.

Salary Increase or Incentive by Region

Q46a) Did you receive a salary increase, including benefits and incentives, in 2010?

Base: All non-member respondents (n=2866).


Half of organizations using cloud computing services

Half of Organizations Using Cloud Computing Services

  • The use of cloud computing services by organizations does not differ significantly between members and non-members.

Cloud Computing Services

Q. 10. Does your organization currently use any of the following services?

Base: All 2010 member respondents (n=7547).

Base: All 2010 non-member respondents (n=2866).


New skills required for cloud computing by region

New Skills Required for Cloud Computing by Region

New Skills for Cloud Computing by Region

  • For (ISC)2 members and non-members that said cloud computing requires new skills, the top two skills that are required are a detailed understanding of cloud computing and enhanced technical knowledge.

  • There is no significant difference by region in regards to the skills required.

Q. 12b) What skills will be required of information security professionals for dealing with cloud computing? Select as many as apply.

Base: All member and non-member respondents who answered (n=7744).

Note: Multiple mentions.


Security concerns of cloud computing

Security Concerns of Cloud Computing

  • Both (ISC)2 members and non-members have the same concern regarding the exposure of confidential information, sensitive data loss and weak systems.

  • Non-members have greater concern about cyber attacks and disruptions that affect the operation of the data center.

Security Concerns of Cloud Computing (Top and High Concern)

11. Thinking about the different security aspects of cloud computing as a general service, how much of a security concern is each of the following for your organization?

Base: All 2010 member respondents (n=7547).

Base: All 2010 non-member respondents (n=2866).


Require new skills for cloud computing by region

¾ Require New Skills for Cloud Computing by Region

  • Just under three quarters of (ISC)2 members said that cloud computing requires new skills for security professionals.

  • By region, four out of five in APAC said that cloud computing requires new skills with 71% from the Americas and 73% in EMEA.

New Skills for Cloud Computing Services by Region

Q. 12a) In your opinion, does cloud computing require information security professionals to develop new skills not previously required?

Base: All member respondents (n=7547).


1 3 have no formal policy for unmanaged mobile device usage

1/3 Have No Formal Policy for Unmanaged Mobile Device Usage

  • Seven out of 10 (ISC)2 members said their organization has a formal policy for unmanaged mobile devices compared to 64% of non-members.

  • By region, members were more likely to indicated their organization has a formal policy in place than non-members.

Formal Policy for Unmanaged Mobile Device Usage by Region

Q. 33. Does your organization have a formal policy covering unmanaged mobile device usage?

Base: All 2010 member respondents (n=7547).

Base: All 2010 non-member respondents (n=2866).


Half consider social media important

Half Consider Social Media Important

  • Non-members place greater importance on the use of social media tools for information security than members.

  • Both members and non-members in APAC place the highest importance on social media tools.

Importance of Social Media Tools by Region

Q. 37. How important is the use of social media tools to you as an information security professional?

Base: All 2010 member respondents (n=7547).

Base: All 2010 non-member respondents (n=2866).


Isc 2 members survey potential security threats for their organization

(ISC)2 Members SurveyPotential Security Threats For Their Organization

  • Security threats related to application vulnerabilities, mobile devices, internal employees and virus attacks are of the greatest concern reported by (ISC)2 members.

  • Organized crime, cloud-based services, cyber terrorism and contractors are not as great a concern to members.

27. Thinking about your own organization, please rate the following potential security threats on the degree of concern you have for each.

Base: All member respondents (n=7547).

Note: Percentages less than 5% are not displayed.


Isc 2 members survey personal use of sites during work hours

(ISC)2 Members SurveyPersonal Use of Sites During Work Hours

  • Two thirds of (ISC)2 members said that employees are allowed to access LinkedIn during work hours.

  • Just over half reported that personal use of blogs and Facebook is allowed during work hours.

Q. 35a) Which of the following are employees allowed to access for personal use during work hours? Select as many as apply.

Base: All member respondents (n=7547).

Note: Multiple mentions.


Isc 2 members survey importance of social media tools by region

(ISC)2 Members SurveyImportance of Social Media Tools by Region

  • Only 12% of (ISC)2 members consider the use of social media tools as very important for information security.

  • Members in APAC place greater importance on social media tools than members in the Americas and EMEA.

Importance of Social Media Tools by Region

Q. 37. How important is the use of social media tools to you as an information security professional?

Base: All member respondents (n=7547).


Isc 2 members versus non members 2010 growing demand for training top 8

(ISC)2 Members Versus Non-Members 2010Growing Demand for Training (Top 8)

  • A higher proportion of members reported a growing demand for training in information risk management and security architecture and models than non-members in 2010. Non-members have a greater demand for access control systems training than members.

Q. 25. In which areas of information security do you see a growing demand for training and education? Select as many as apply Note: *New category in 2010 GISW Survey.

Base: All 2010 member respondents (n=7547).

Base: All 2010 non-member respondents (n=2866).

Note: Multiple mentions.


Isc 2 members versus non members 2010 growing demand for training next 8

(ISC)2 Members Versus Non-Members 2010Growing Demand for Training (Next 8)

  • There is greater demand for security administration training for non-members than members. This is likely a result of non-members being more junior than (ISC)2 members.

Q. 25. In which areas of information security do you see a growing demand for training and education? Select as many as apply Note: *New category in 2010 GISW Survey.

Base: All 2010 member respondents (n=7547).

Base: All 2010 non-member respondents (n=2866).

Note: Multiple mentions.


Overview

Enterprise

Security

Overview

Security is a Complex Universe

UTM


Vertical markets and it processes

Vertical Markets and IT Processes

Network Security

Users, End Points, Devices, Sensors, and Controllers


Key vertical markets globally

Key Vertical Markets Globally

Financial

  • This segment includes securing financial services entities such as banks, credit unions, insurance, and brokerage firms.

  • This segment includes federal, state, and local government purchases for government agencies, military, and defense projects.

  • This segment includes hospitals, pharmaceutical companies, clinics, and other medical facilities.

  • This segment includes companies involved in manufacturing, engineering, and industrial design.

  • This segment includes telecommunications carriers and service providers.

  • The others category is comprised of customers across many vertical markets such as retail, media, education, hospitality, and utilities.

Government

Healthcare

Manufacturing

Telecommunications

& Technology

Others


Vertical market distribution

Vertical Market Distribution

Total UTM Market: Revenues by Vertical Market (World), 2009

As is typical, the financial and government markets are the leading vertical markets in the security industry. These markets continue to account for a large amount of UTM sales, combining for 29.8 percent of market revenues.

The “others” category accounted for 30.6 percent of the market, indicating that the UTM market is very vertical independent and is in demand across industry sectors.

The telecommunications and technology sector accounted for the largest share of UTM sales at 18.7 percent, led by sales to communications carriers and service providers.

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Mea vertical market distribution

MEA Vertical Market Distribution

UTM Market: Revenues by Vertical Market (MEA), 2009

The telecom and energy sectors continue to be fueled by consumer demand. We expect they will continue to grow for the next few years.

The “others” category accounted for the largest percentage at over 30 percent of the market, indicating that the UTM market is very vertical independent and is in demand across industry sectors.

Education and Awareness are keys to winning “others”.

As is typical, the financial and government markets are two of the leading vertical markets in the security industry. These markets continue to grow, however are nearing maturity.

Source: Frost & Sullivan


Vertical market distribution forecasts contd

Vertical Market Distribution Forecasts (Contd...)

Total UTM Market: Revenue Forecasts by Vertical Market (World), 2006-2016

Others include: Education, Hospitality, Retail, and Utilities

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Market size and trajectory drivers restraints opportunities and threats

Market Size and Trajectory

Drivers, Restraints, Opportunities and Threats


Market overview

Market Overview

Market Overview

Research Methodology

Unified Threat Management (UTM) technology emerged around 2004 as a solution that could uniquely meet many challenges plaguing network administrators and security teams. UTM integrates several security functions, such as network firewall, network intrusion prevention, gateway antimalware, gateway anti-spam, VPN, content filtering, and load balancing, into a single network appliance. This provides customers with complete, affordable, effective, and easily managed security. The UTM market has grown significantly over the years as the demand for integrated security has increased, offset primarily by the ability of point solutions to provide deeper functionality and high performance.

  • This research service tracks and forecasts unit shipments and revenues from sales of UTM solutions.

  • The base year is 2009, and the forecast period is for 2010 to 2016.

  • Vertical markets covered include financial, government, telecommunications and technology, manufacturing, healthcare, retail, utilities, media, hospitality, and education.

  • The UTM market is segmented horizontally by small office/home office (SOHO), remote office/branch office (ROBO), small and medium-sized businesses (SMB), and enterprise.

  • Geographic regions covered include North America, Asia Pacific (APAC), Latin America, and Europe, the Middle East, and Africa (EMEA).


Market overview contd

Market Overview (Contd…)

Product Definition

Deployment Options

  • To avoid double counting of revenues, only product sales from the original solution provider will be counted, including OEM product licensing to other companies.

  • To qualify for inclusion, the solution must be a single appliance that offers multiple network security functions.

  • UTM vendors offer various security applications in their solutions, but at a minimum, solutions should include firewall, IPsec VPN, and intrusion prevention capabilities.

  • UTM vendors offer modular security applications to extend the capabilities of the core product as the customer requests.

  • Network appliances are the preferred method of sale for UTM solutions. This solution is relatively easy to deploy and manage.

  • Some UTM vendors offer a software version of their product via ISO image or other physical media. These solutions allow customers to deploy the product on their own choice of hardware. This method of deployment is counted as a unit sale in this report.

  • Select UTM vendors offer a virtual UTM appliance based on VMware.


Market engineering measurements analysis and trends

Market Engineering Measurements, Analysis, and Trends

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Market engineering measurements analysis and trends contd

Market Engineering Measurements, Analysis, and Trends(Contd...)

Market Stage

Price Sensitivity

The UTM market has been in a stage of high growth. During the difficult economic climate of 2009, UTM vendors showed double digit growth rates. For many large vendors, the growth of UTM product lines offsets losses in other areas. Although growth was diminished compared to previous years, the market is expected to rebound with strong growth rates in the near future.

UTM products range from $300 for SOHO/ROBO solutions to $16,000 for large enterprise customers. The average sale price for UTM products in 2009 was $6,868, due primarily to the large number of small and medium-sized businesses. Customers in the SMB range are most price sensitive, while large enterprise customers focus more on overall value than price.

Competitor Market Entry/Exit

Market Concentration

The integrated security strategy is an important one for many vendors, and market exits are rare. 3Com discontinued its UTM product line, as did a small niche participant, freedom9. Overall, the market size has been very stable at 40+ competitors.

There are many niche vendors that focus solely on providing UTM products. These vendors have steadily grown in market share over the years. Despite this growth, the top five competitors still accounted for 51.3 percent of market revenues in 2009.


Market size and forecasts contd

Market Size and Forecasts (Contd...)

Total UTM Market: Revenue and Unit Shipment Forecasts (World), 2006-2016

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan

In 2009, UTM vendors shipped 287,100 products, earning $1,978.1 million in revenues. This is forecasted to reach $7,009.1 million in revenue by 2016, representing a healthy compound annual growth rate (CAGR) of 19.9 percent.


Market size and forecasts contd1

Market Size and Forecasts (Contd...)

Total UTM Market: Revenue Forecasts (World), 2006-2016

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan

The UTM market generated revenues of $1,971.8 million in 2009. This market was characterized by high growth rates before 2009, such as a 32.2 percent growth rate in 2008. However, due primarily to economic recession, the growth rate dropped to just 20.1 percent in 2009. As the market rebounds,growth rates are expected to increase in 2010 and 2011, before leveling off.


Market metrics

Market Metrics

Key Highlights

Total UTM Market: Sales by Customer Size (World), 2009

  • UTM vendors have traditionally targeted SMB and SOHO/ROBO networks. In 2009, these segments accounted for 53.6 percent market revenues. Total market revenues are expected to shift towards the enterprise market, as UTM products improve in functionality and reliability.

  • The cost effectiveness of UTM solutions is the primary reason for the market’s focus on the SMB segment.

  • Enterprise customers with large but distributed networks often invest in UTM solutions for their cost effectiveness and ease of management. This is common with customers in the retail and hospitality industries, but can apply to any enterprise organization with remote offices and branch offices.

  • The largest deployments are in the telecommunications vertical with carriers who need to secure their own data center or to service providers who want to protect their clients’ data.

  • However, a select few UTM vendors are able to meet the demanding performance needs of these customers.

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Market metrics contd

Market Metrics (Contd...)

Key Highlights

Total UTM Market: Sales by Distribution Method (World), 2009

  • With 93.7 percent of revenues coming from the distribution channel, most vendors can identify a direct correlation between their growth and their ability to find effective value-added resellers (VAR) and systems integrators (SI) to partner with.

  • VARs and SIs must deal with many different solution providers. This can confuse sales teams and increase overhead costs. Channel partners have embraced UTM solutions because these solutions reduce the number of total supplier partners.

  • In the UTM market, direct sales are typically reserved for the largest customers due to the high volume of sales.

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Market dynamics

Market Dynamics

Total UTM Market: Market Drivers and Restraints with Timeframe (World), 2010-2016

Shift Towards Consolidated Solutions

Regulatory Compliance

High

Penetration into Enterprise Market

Evolution of Enterprise Network Environments

Improved Services Capabilities

Network Infrastructure Upgrade and Replacement Cycle

Impact

Market Drivers

Low

Short Term

Mid Term

Long Term

Low

Market Restraints

Currently Deployed Network Security Applications

Customer Budgetary Constraints

Impact

Customers are Past the Hype Stage

Point Solutions Outperform Consolidated Solutions

Lack of Acceptance in the Enterprise Market

High

High

Source: Frost & Sullivan.


Impact of industry challenges with timeframe

Impact of Industry Challenges with Timeframe

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Analysis of industry challenges

Analysis of Industry Challenges

Capitalize on Economic Recovery

Offer Best-of-Breed Functionality

The information security industry has proven to be very resilient in the harsh economic climate of 2009, and UTM vendors reported growth for the year. Limited IT budgets swayed interest away from expensive point productsand towards cost-effective UTM solutions. This interest will carry over into 2010, but vendors must be prepared to compete against best-of-breed solutions as well.

A critical area of improvement for UTM vendors is in product performance. Customers will not value a product that cannot provide effective security. UTM’s value proposition lies in its ability to integrate a wide breadth of security applications. However, customers will value best-in-class security functionality the most. Vendors cannot take a check mark approach to security.

Target the Appropriate Customer Base

Focus on Next Generation Technologies

As simple as it may sound, many SMB-focused UTM vendors are attempting to penetrate the enterprise market while enterprise-focused vendors are planning for the SMB. The requirements for the two segments are vastly different, and few UTM vendors have truly succeeded in both. Vendors are cautioned to weigh the costs of attempting this expansion.

Few UTM vendors have developed a strategy that incorporates virtualization or managed services. Identifying these future trends and capitalizing on them will greatly improve a company’s share of the total market.


Regional revenue distribution

Regional Revenue Distribution

Total UTM Market: Revenues by Geographic Region (World), 2009

Key Highlights

  • Adoption of UTM products has been very strong in the North America region. This area accounted for 45.3 percent of market revenues in 2009.

  • Currently, large multinational security and technology companies are prime contributors to growth in the Asia Pacific (APAC) region.

  • Europe, Middle East, and Africa (EMEA) contributed 36.4 percent of total market revenues. This region was led by UTM vendors headquartered in the developed countries of Western Europe.

  • Latin America is still developing as a suitable market for UTM vendors with 1.8 percent of total market revenues.

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Regional revenue distribution1

Regional Revenue Distribution

Total UTM Market: Revenues by Geographic Region (World), 2009

Key Highlights

  • Adoption of UTM products has been very strong in the North America region. This area accounted for 45.3 percent of market revenues in 2009.

  • Currently, large multinational security and technology companies are prime contributors to growth in the Asia Pacific (APAC) region.

  • Europe, Middle East, and Africa (EMEA) contributed 36.4 percent of total market revenues. This region was led by UTM vendors headquartered in the developed countries of Western Europe.

  • Latin America is still developing as a suitable market for UTM vendors with 1.8 percent of total market revenues.

MEA equates to 7.3% of global sales

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Europe middle east and africa unit shipments and revenue forecasts

Europe, Middle East, and Africa: Unit Shipments and Revenue Forecasts

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Europe middle east and africa unit shipments and revenue forecasts contd

Europe, Middle East, and Africa: Unit Shipments and Revenue Forecasts (Contd...)

UTM Market: Revenue and Unit Shipment Forecasts (Europe, Middle East, Africa), 2006-2016

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Europe middle east and africa market summary

Europe, Middle East, and Africa: Market Summary

The Europe, Middle East, and Africa (EMEA) region includes many highly developed countries such as the United Kingdom, Germany, France, and Israel. Many European organizations are showing interest in UTM because of international regulations and the importance of telecommunications for commercial activities. Newly industrialized countries such as Turkey and South Africa are also contributing to UTM sales in EMEA.

UTM solutions have gained much traction in the EMEA region, led by highly developed countries such as the United Kingdom, Germany, and Israel. UTM product sales in EMEA generated $717.7 million in revenues in 2009. For the year, the EMEA region accounted for 36.4 percent of total UTM market revenues. This market is forecasted to grow to $2,579.4 million by 2016, representing a strong calculated annual growth rate of 20.1 percent. The EMEA share of the UTM market will gradually increase to 36.8 percent by 2016.


Middle east and africa market summary

Middle East and Africa: Market Summary

When we separate Europe from the EMEA regional breakout, the Middle East and Africa (MEA) sub-region includes a mix of highly developed countries and many emerging countries who have yet to develop economically, industrially or technically. Countries on the Arabian Peninsula have strong economies and are showing interest in UTM because of international regulations and the importance of telecommunications for commercial activities. Likewise, newly industrialized countries such as Turkey and South Africa are contributing to UTM sales in MEA. Emerging countries in sub-Saharan Africa are struggling to develop and may look to implement basic security products as they mature, however other technologies will play a disruptive roll.

Demand: MEDIUM TO STRONG

Growth: 25-32% CAGR

Size: Less than 1/4 of total EMEA sales

accounting for $143M in revenue (est).


Market drivers

Market Drivers

Total UTM Market: Market Drivers Ranked in Order of Impact (World), 2010-2016

Increase in Malware in MEA in 2009 and 2010

Improved Services Capabilities

Consolidated Solutions Offer Customers Tremendous Value

Increased Market Penetration into the Enterprise Customer Segment

Evolution of Enterprise Network Environments

Network Security Mandatory for Regulatory Compliance

Source: Frost & Sullivan


A discussion of the cyberoam opportunity for utm globally and mea

It’s a Mobile World


Impact of market drivers with timeframe

Impact of Market Drivers with Timeframe

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Analysis of market drivers

Analysis of Market Drivers

Consolidated Solutions Offer Customers Tremendous Value

Network Security Mandatory for Regulatory Compliance

Increased Market Penetration into the Enterprise Customer Segment

  • The integration of multiple security applications gives UTM its greatest value proposition.

  • This allows customers to more easily implement and manage their security solutions. Customers also have flexibility to easily enable certain security functions as they please.

  • Investing in several point products, including installation and support, is very costly.

  • Consolidating these products reduces these costs and can even help with green initiatives by reducing power consumption.

  • Support and transactions are done with a single company instead of several.

  • Compliance is mandatory whether the customer’s budget allows for it or not. This will drive growth throughout the forecast period.

  • Some laws apply to customers in specific vertical markets, such as Health Insurance Portability and Accountability Act (HIPAA) for healthcare.

  • The Sarbanes-Oxley (SOX) Act, Gramm-Leach-Bliley (GLB) Act, and Basel II Accord regulate organizations in the financial vertical market.

  • PCI applies to all organizations that process credit card information. This applies to customers across multiple vertical markets.

  • The UTM market has shown considerable growth over the years, but revenues are still derived primarily from the SMB and SOHO/ROBO customer segments.

  • The SOHO/ROBO market segment requires many more individual sales, more overhead, and slimmer margins.

  • Several UTM vendors have identified the need to increase their presence in the enterprise space.

  • Further acceptance into the enterprise segment is crucial for sustained long-term growth.


Analysis of market drivers contd

Analysis of Market Drivers (Contd...)

Evolution of Enterprise Network Environments

Improved Services Capabilities

Network Infrastructure Upgrade and Replacement Schedules

  • Enterprise network environments continue to change, enabling many new attack vectors.

  • The proliferation of mobile devices, wireless hotspots, and handheld computing devices (smartphones) complicates the challenge of securing and protecting valuable resources.

  • The use of Web 2.0 technologies and instant messaging necessitates the use of specialized security solutions.

  • Many UTM solutions combine features and functionality that address many of these challenges.

  • While UTM has a strong value proposition, differentiation in this market will be crucial in order to gain market share.

  • Currently, very few UTM vendors are offering managed UTM services.

  • Many vendors are working to develop a cloud-based strategy for UTM.

  • This strategy could also help alleviate network latency issues caused by gateway Web and

  • e-mail security services. This would make UTM a much more viable option for customers with high network performance requirements.

  • As network infrastructure components grow outdated, customers will often use the opportunity to evaluate and implement next-generation technologies in order to future proof their investments as much as possible.

  • Customers at this stage should consider investing in a UTM solution.


Market restraints

Market Restraints

Total UTM Market: Market Restraints Ranked in Order of Impact (World), 2010-2016

UTM Solutions Lack Acceptance in the Enterprise Market

Customer Budgetary Restraints

Point Solutions Continue to Outperform Consolidated Solutions

Restraint Text

Customers are Moving Beyond the Hype Stage

Currently Deployed Network Security Applications

Source: Frost & Sullivan


Impact of market restraints with timeframe

Impact of Market Restraints with Timeframe

Note: All figures are rounded; the base year is 2009. Source: Frost & Sullivan


Analysis of market restraints

Analysis of Market Restraints

Point Solutions Continue to Outperform Consolidated Solutions

UTM Solutions Lack Acceptance in the Enterprise Market

Customer Budgetary Restraints

  • While UTM provides customers with many advantages, it is criticized as not offering best-of-breed functionality.

  • Furthermore, it is a challenge to enable multiple security functions on a single appliance without impeding network performance.

  • Currently, it is less common for customers to use the product’s full functionality.

  • UTM vendors are continually working to improve their product’s functionality and processing power to meet enterprise networking needs.

  • At the same time, point solutions continue to improve and push the performance envelope.

  • UTM is considered by many to be not quite ready for acceptance in the market.

  • Enterprise customers have extreme performance demands and will demand the highest quality products.

  • Many UTM solutions are based on open source software security solutions. This helps keep overhead costs down but is slow to gain traction in the enterprise arena.

  • Vendors can acquire commercial technology from point product vendors to improve their UTM solutions.

  • The global economic recession has resulted in very strict security budgets in 2009.

  • As a result, customers are very cautious about investing in a solution and may even be waiting for a more stable economic climate.

  • This effect is anticipated to decrease over the forecast period, as the economy recovers and IT budgets grow.

  • However, UTM solutions will always have to compete for a limited budget against specialized security products.


Analysis of market restraints contd

Analysis of Market Restraints (Contd...)

Customers are Moving Beyond the Hype Stage

Currently Deployed Network Security Applications

  • As with many new technologies, the UTM market enjoyed a period of substantial hype and inflated expectations.

  • Customers are moving beyond this stage and are evaluating UTM solutions with much more scrutiny.

  • Now, customers are much more educated about UTM products and will have more realistic expectations when evaluating a UTM product.

  • This is a natural part of the hype cycle, but this effect has been magnified due to strict budgets during the recession.

  • While UTM integrates several different security applications, it also has to compete against the dedicated product version of these same security solutions.

  • Often, customers already have more than one of these applications deployed in their network.

  • As a result, customers may wait for multiple existing security solutions to reach the end of their life cycles.


Competitive landscape

Competitive Landscape


Market participants not inclusive

Market Participants (not inclusive)


Competitive landscape1

Competitive Landscape

Total UTM Market: Competitive Landscape (World), 2009

Juniper

Fortinet

McAfee

Cyberoam

WatchGuard

Cisco

DeepNines

Check

Point

Global

DataGuard

Crossbeam

Trustwave

SonicWALL

IBM

Astaro

ZyXEL

Stonesoft

NETGEAR

Source: Frost & Sullivan


Competitive landscape2

Competitive Landscape

Total UTM Market: Competitive Landscape (MEA), 2009

Fortinet

Cisco

Cyberoam

Astaro

SonicWALL

HP

Juniper

IBM

McAfee

D-link

NETGEAR

CheckPoint

ZyXEL

Source: Frost & Sullivan


Competitive landscape analysis

Competitive Landscape Analysis

Frost & Sullivan Competitive Landscape

The Frost & Sullivan Competitive Landscape maps the key UTM market participants on their market penetration and ability to deliver. Vendors’ market penetration is based on market share for the base year 2009, as well as the previous year, and expectations for the following year. Market share changes across these three years will determine the vendor’s lateral movement as indicated by the arrow. “Ability to Deliver” is based on analysis of vendors’ market strategy, including product strength, features, long-term technological advancements, and product line development.

Market Leader and Challenger

Market Contenders

  • Fortinet retained the market leadership position in 2009 by a slim margin over Cisco.

  • Fortinet’s success is due to its ability to offer complete, end-to-end, and integrated protection for perimeter, data center, and even endpoints.

  • Cisco’s experience and leadership in the networking and security industry make it a strong challenger.

  • Juniper experienced positive, but diminished growth in the UTM market for 2009.

  • WatchGuard is emerging as a serious contender in the UTM market with strong year-over-year growth rates.

  • Check Point and SonicWALL lost market share in 2009 due to below-market-average growth.

  • Cyberoam dominant in India and a top contender in MEA and APAC.


Key industry participants

Key Industry Participants

Source: Frost & Sullivan


Key industry participants contd

Key Industry Participants (Contd…)

Source: Frost & Sullivan


Mea market share analysis

MEA Market Share Analysis

UTM Market: Market Share by Vendor (MEA), 2009

Others include: Arkoon, Calyptix, Clavister, DeepNines Technologies, D-Link, Endian, eSoft, Funkwerk Enterprise Communications, GajShield, Global DataGuard, Global Technology Associates, Intoto, NETASQ, NETGEAR, Netrhino, NetSentron, Network Box Corporation, Panda Security, Reti Corporation, Sarron Corporation, Secure Point, SmoothWall, SOHOware, Stonesoft, Trustwave, Untangle, Wiresoft, ZyXEL


Product comparison

Product Comparison

Source: Frost & Sullivan


Why cyberoam

Why Cyberoam?


Why cyberoam1

Why Cyberoam

  • Cyberoam includes identity and application based access controls to improve productivity based on roles, group, or even more granular control as customer requires.

  • Cyberoam appliances allow for built in virtual wireless access points (extending security to wireless is important, since it’s easy to hack these access points, and usually there is no way to identify who is on the wireless network but Cyberoam extends the identity-based access control to even the wireless network).

  • Cyberoam appliances available for enterprises of 50 to 1,500 users.


Why cyberoam2

Why Cyberoam

  • Cyberoam offers powerful content filtering with complete control over web surfing through user identity based policies for different levels of access controls, while HTTP virus scanning defends against new attacks.

  • Many Internet users don’t access the Internet directly. The connection is channeled through a proxy server because of the many banned sites and amount of content that is blocked. Cyberoam provides support for parent proxy (HTTP proxy server configured for Cyberoam), so Cyberoam can be deployed as a HTTP proxy server. Cyberoam can be installed at places where Internet is only available through proxy.


A discussion of the cyberoam opportunity for utm globally and mea

Why Cyberoam

Cyberoam has all the pieces of the security puzzle and is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises through its unique granular user-based controls.

Firewall

VPN

Web Content Filter

Reporting

Load Balancing and Failover Solution

Anti-spam / Anti-virus

IPS

Bandwidth Management


Future considerations

Future Considerations?


Thank you q a

Thank You

Q&A?


  • Login