Tuesday, July 7, 2009

New Report Just Published: World Network Security Market Report

This report analyzes the worldwide markets for Network Security in US$ Millions. The market for 'Network Security' is analyzed by the following product segments: Firewall/VPN, Intrusion Detection System/Intrusion Prevention System, Unified Threat Management, and Mobile Data Protection. The report provides separate comprehensive analytics for North America, Europe, Asia-Pacific, and Rest of World.. Annual forecasts are provided for each region for the period of 2006 through 2015. A six-year historic analysis is also provided for this market. The report profiles 203 companies including many key and niche players worldwide such as 3Com Corporation, AEP Networks, Arbor Networks, Inc., Array Networks, Inc., AVG Technologies NV, BMC Software Inc, BT Counterpane, Check Point Software Technologies Ltd., Cisco Systems Inc., Citrix Systems Inc., Clavister AB, Electronic Data Systems Corporation, Enterasys Networks, Inc., F5 Networks Inc., Fortinet Inc, GFI Software Ltd, International Business Machines Corp., Juniper Networks Inc., McAfee, Inc., Microsoft Corporation, Norman ASA, Nokia Corporation, Nortel Networks Corporation, Secure Computing Corporation, SonicWALL Inc., Sourcefire, Inc, Stonesoft Corporation, Symantec Corporation, Trend Micro Incorporated, TippingPoint Technologies, Inc., Unisys Corporation, and WatchGuard Technologies, Inc. Market data and analytics are derived from primary and secondary research. Company profiles are mostly extracted from URL research and reported select online sources.



NETWORK SECURITY
A GLOBAL STRATEGIC BUSINESS REPORT MCP-1804


CONTENTS


I. INTRODUCTION, METHODOLOGY & PRODUCT DEFINITION

Study Reliability and Reporting Limitations I-1
Disclaimers I-2
Data Interpretation & Reporting Level I-2
Quantitative Techniques & Analytics I-3
Product Definition and Scope of Study I-3
Firewall/VPN I-4
Intrusion Detection System/Intrusion Prevention System I-4
Unified Threat Management I-4
Mobile Data Protection I-4


II. EXECUTIVE SUMMARY

1. Industry Overview II-1
A Curtain Raiser II-1
Current & Future Analysis II-2
Security Concerns in the Cyber World II-2
Outlook II-2
Lucrative Prospects Exist Worldwide II-3

2. Competitive Landscape II-4
Cisco - The Clear Leader II-4
Table 1: Global Network Security Market (2007): Percentage
Breakdown of Value Sales by Leading Company for Cisco,
Juniper, Check Point, Nokia, Microsoft, IBM ISS, Fortinet,
McAfee, SonicWALL, and Others (includes corresponding
Graph/Chart) II-4

Table 2: Global Network Security Market (2006): Percentage
Breakdown of Value Sales by End-Use Segment for Government,
Healthcare, Financial, and Others (includes corresponding
Graph/Chart) II-5
Firewall/VPN - On a Downtrend II-5
Table 3: Global Firewall/VPN Market (2007): Percentage
Breakdown of Value Sales by Leading Company for Cisco, Check
Point, Juniper, Nokia, Microsoft, and Others (includes
corresponding Graph/Chart) II-5
IDS/IPS Post Consistent Growth II-5
Table 4: Global IDS/IPS Market (2007): Percentage Breakdown
of Value Sales by Leading Company for Cisco, IBM ISS, McAfee,
TippingPoint, Check Point, Sourcefire, Trend Micro, Juniper,
and Others (includes corresponding Graph/Chart) II-6
Promising Gains for UTM Appliances II-6
Table 5: Global UTM Appliance Market (2007): Percentage
Breakdown of Value Sales by Leading Company for Fortinet,
Cisco, Juniper, SonicWALL, Secure Computing, Check Point, and
Others (includes corresponding Graph/Chart) II-7

Table 6: Global UTM Appliances Market (2007): Percentage
Breakdown of Value Sales by End-Use Segment for Finance,
Medical & Healthcare, Government, Technology, Media,
Manufacturing, and Others (includes corresponding
Graph/Chart) II-8
SSL VPN - Market Overview II-8
Table 7: Global SSL VPN Market (2006): Percentage Share
Breakdown by Leading Company for Juniper Networks, Citrix,
Cisco, F5 Networks, Check Point, Nortel, SonicWALL, Array
Networks, and Others (includes corresponding Graph/Chart) II-9

Table 8: Global SSL VPN Market (2006): Percentage Share
Breakdown by End-Use Segment - Government, Healthcare,
Financial, Manufacturing, Technical, Education, and Others
(includes corresponding Graph/Chart) II-9

3. Market Trends II-10
Security - A Sophisticated Challenge II-10
Security Solutions - Too Expensive to Afford? II-10
Network Complexity Propels Demand for Security II-10
Convergence of Technologies - A Key Market Driver II-11
Security Threats Continue to Impact Businesses II-11
Network Security Reduces Cost and Enhances Reliability II-12
Table 9: Motivators for Network Security Implementation
(2007): Percentage Share Breakdown by Type - Data Protection,
Maintenance of Regulatory Compliance, Prevention of Downtime,
Management Directives, Increase in Productivity, and
Reduction in Liability (includes corresponding Graph/Chart) II-12
Highly Regulated Networks Drive Market Growth II-13
Integrated Security Appliances Post Strong Gains II-13
Demand for Mobile Data Protection Gaining Ground II-13
Technical Expertise Spurs Competition II-14
Increasing Preference for Support Services II-14
IDS/IPS Software - Down But Not 'Out' II-14
IPS Technology Rising in Popularity II-15
UTM Appliances Offer Significant Growth Potential II-15
Emergence of New Enterprise Propels Growth II-15
Network Security - Not a Smooth Ride for SMEs II-16

4. Network Security - An Overview II-17
What is a Network? II-17
Network Security - A Conceptual Definition II-17
Need for Network Security II-17
Security Management II-18
Multi-layered Approach for Network Security II-19
Computer Security - A Sub-field of Security Engineering II-19
Network Security - A Historic Perspective II-19
Threat Management Systems Gain an Edge Over Other Security
Appliances II-20
Product Segmentation - An Overview II-21
Firewall - An Introduction II-21
Firewalls - A Classification II-23
Stateful Inspection Firewalls II-23
Proxy Firewalls II-23
Packet Filtering Firewall II-23
Technology Overview II-24
Virtual Private Network (VPN) II-24
Trusted VPNs II-25
VPN - An Alternative to WAN II-25
Types of VPN II-25
Hardware-based Solutions II-25
Virtual Private Network IPSec II-26
How Does IPSec VPN Work? II-26
Virtual Private Network SSL II-26
Distribution II-27
Drawbacks II-27
Intrusion Detecting System (IDS) II-28
Intrusion Prevention System (IPS) II-28
IDS/IPS II-28
Functions of IDS/IPS II-29
Unified Threat Management II-29
What is UTM? II-29
Functions II-30
Drawbacks Do Exist II-30
Mobile Data Protection II-31
Authentication II-31
Encryption II-31
Public Key Infrastructure II-32
Anti-Virus / Anti-Spyware II-33
Anti-Virus - A Real-Time Network Protection II-33
Anti-Spyware II-33
Spyware - A Potential Security Threat II-33
Anti-Spyware Technology II-34
End-Use Markets II-34
Government Agencies II-34
Large Organizations II-35
Small and Medium Enterprises II-35
Banking and Finance II-35
Telecommunication and IT II-35

5. Product Innovations/Launches II-36
Nsasoft Releases Nsauditor Network Security Auditor II-36
Unisys Unveils Stealth Network Solution II-36
Microsoft Releases Two New Security Updates for Windows II-36
Stonesoft Launches StoneGate UTM II-37
Etisalat Plans to Introduce Managed UTM Solutions in UAE II-37
Netgear Launches ProSafe Wireless-N VPN Firewall II-37
Cyberoam Launches New Network Security Solution II-37
Rohati Systems Introduces Entitlement Control Solution II-38
NeoAccel Launches VMware Version of SSL VPN-Plus II-38
Symantec Launches New Version of Antispam-Antivirus Gateway II-38
McAfee Unveils Anti-Theft File Protection Software II-39
Quick Heal Technologies Launch Guardian Antivirus II-39
WSL and OneShield Security Enter into Partnership II-39
SonicWALL Launches Network Security Appliance 2400 II-39
Panda Launches Managed Office Protection II-40
McAfee Develops Security Platform for High-Speed Networks II-40
Stonesoft Announces Availability of New Firewall 'StoneGate
FW-310' II-40
SonicWALL Expands Network Security Appliance Suite II-40
SkyRecon Expands StormShield Security Suite with StormShield AVP II-41
Juniper Releases Network Security Manager II-41
BT Unveils New Security Services Portfolio II-41
VSS Monitoring Releases 8x8 Distributed Filter Tap(TM) II-41
WIN Enterprises Launches PL-60760 Network Security Hardware
Platform II-42
High Tower Releases Cinxi Express II-42
Smoothstone Rolls out SmoothstoneSECURE II-43
Stonesoft Unveils StoneGate IPS 4.3 II-43
Stonesoft Releases StoneGate Firewall/VPN II-43
Hifn(TM) Introduces Express DS 255 II-44
mobilkom Rolls out A1 INTERNET SECURITY II-44
Pure Releases Pure Networks Security Scan II-44
SonicWALL Unveils NSA II-45
TippingPoint Unveils TippingPoint Core Controller II-45
Check Point(R) Introduces Connectra(TM) NGX R66 II-45
Check Point(R) Launches Upgraded UTM-1 Edge(R) Appliances II-46
Check Point(R) Unveils ZoneAlarm Internet Security Suite 8.0 II-46
Juniper Networks Introduces New Line of IDP Appliances II-46
SingTel Launches New MSS with Juniper Networks Security Solutions II-47
Juniper Networks Introduces New NSM Solution II-47
Nokia Introduces Latest Intrusion Prevention System, Nokia
IP2450 IPS II-47
GFI Launches GFI MailSecurity Version 10 II-48
SonicWALL Unveils Security Solutions for Windows EBS and SBS II-48
Sourcefire Receives ICSA Labs PCI DSS Certification for 3D(TM)
System II-48
Check Point(R) Launches IPS-1(R) R65.1 II-48
Crossbeam and IBM Release IBM Proventia Network IPS II-49
AhnLab Unveiled TrusGuard UTM 1000 in Korea II-49
Astaro Unveils Astaro Security Gateway Version 7.2 II-49
Clavister to Launch Clavister Security Services Platform(TM) (SSP(TM))
II-50
Enterasys Releases Enterasys(R) Network Access Control Version 3.1 II-50
Fortinet Unveils FortiGate(R)-620B Enterprise Security Appliance II-50
NetBox(R) Blue Forms Strategic Partnership with ESET(R) II-50
AVG Technologies to Launch AVG Anti-Virus Free Version 8.0 II-51
AVG Technologies Releases AVG Internet Security Version 8.0 II-51
AEP Networks Introduces AEP Netilla SSL VPN II-51
WatchGuard Rolls Out WatchGuard XTM 1050 Network Security
Appliance II-51
AEP Networks Unveils AEP Netilla(R) SSL VPN Virtual Edition II-52
ProBiz Solutions Introduces New UTM System II-52
Check Point Launches VPN-1 Virtual Edition II-52
F5 Networks Introduces a New FirePass(R) Version II-52
Cloudmark Introduces Integrated Security System II-53
Stonesoft Unveils New Security Solutions for High Capacity
Networks II-53
WatchGuard Unveils Network Security Software for UTM appliances II-53
Alcatel-Lucent to Offer 3G Security for OmniAccess Laptops II-54
Juniper Unveils New Secure Access SSL VPN Appliances II-54
Array Networks Launches SPX Series II-54
Panda Unveils New 9000 Series of GateDefender Performa II-54
SonicWALL Unveils E series NSA Processor Firewalls II-55
Clavister Launches New Series of Security Gateway Products II-55
SonicWALL Introduces New Remote Access Platform Version II-55
Enterasys to Introduce Distributed Intrusion Prevention System II-56
Sophos Launches Control 8.0 and Endpoint Security II-56
Juniper Networks Rolls Out Security Threat Response Manager
Solution II-56
WatchGuard Unveils Two SSL VPN Appliances II-57
SonicWALL Unveils Expanded SSL VPN and NetExtender Capabilities II-57
NuVox Introduces FireWall Network Security Product II-57
Aventail Launches Aventail 9.0 SSL VPN with IPSec Features II-58
Verizon Business Rolls Out Unified Threat Management Service II-58
BitDefender to Unveil Next-Generation Business Security Suite II-58
Rising Releases New Antivirus Products Line II-59
GFI Software Launches LANguard Network Security Scanner II-59
Sourcefire Unveils New Open Source Logging Tool II-59
Narus Introduces Cellular Network Security Software Module II-59
PineApp Unveils New Range of Network Security Products II-59
Lockdown Networks Launches Enforcer(TM) with Enhanced Features II-60
Symantec Introduces Norton 360 Security Software II-60
Juniper Releases Enhanced Operating System and IDP Software II-60
Intoto Unveils IntruPro(TM) IPS II-60
Apani Networks Launches EpiForce Security Solution II-61
Crossbeam and Trend Micro Introduce NGCG Web Threat Protection
Solution II-61
Celestix Introduces WSA Security Appliances II-61
ESET Rolls Out Malware Protection Solutions for Linux Users II-61
ESET Unveils ESET Smart Security Public Beta 1 II-62
eSoft Releases ThreatWall Web Security Gateway II-62
eSoft Rolls Out Desktop Antivirus / Spyware Suite II-62
Juniper Networks Enhances Capabilities of SA SSL VPN Devices II-62
Microsoft Introduces IAG 2007, Ventures into SSL VPN Solution
Sector II-63
Clavister Launches SSP(TM) Solution for MSSPs II-63
Norman Unveils New Norman Network Protection II-63
ZyXEL Introduces Latest Upgrade to ZyWALL 1050 Internet
Security Appliance II-63
ZyXEL Launches ZyWALL SSL 10, New Integrated SSL-VPN Appliance II-64
Juniper Networks Rolls out New Security and Network Management
Products II-64
Sourcefire to Introduce New Sourcefire 3D9800 Sensor II-64
Sourcefire and Insecure.Org to Develop Open-Source
Vulnerability Scanning Tools II-65
Sourcefire Introduces ETM Strategy, MDC, and Post-Connect NAC
Functionality II-65
Array Networks Introduces New Site-to-Site SSL-VPN Edition for
Extranets II-65
Array Networks Introduces New SSL VPN Software Version 8.0 II-66
Secure Computing Releases New Sidewinder Version 7.0 Firewall II-66
WatchGuard Releases Updates for Firebox-X Line of Security
Solutions II-66
Check Point(R) Unveils VPN-1(R) Power(TM) Multi-Core II-67
IBM Rolls out Proventia Network IPS GX6116 II-67
IBM ISS to Launch Proventia Network IPS GX3002 II-67
Ixia and Intoto to Introduce Enhanced iGateway Firewall II-67
MegaPath Rolls out MegaPath Business Continuity SSL Service II-68
MegaPath Unveils Site-to-Site VPN II-68
Astaro Releases Astaro Security Gateway Version 7.1 II-68
Crossbeam Unveils Next Generation X-Series(TM) Security Service
Switches II-68
Enterasys Introduces Latest Enterasys Sentinel NAC Solution
Version II-69
eSoft Introduces SpamFilter and Content Filter with Enhancements II-69
eSoft launches InstaGate 404e Internet Security Gateway II-69
Astaro Unveils Astaro Security Gateway Version 7 II-69
Clavister Launches Security Access Gateway 3000 Series II-70
HotBrick Launches SoHo 401, Firewall VPN 800/2 and HSS 6000 G
Firewall II-70
Resilience Launches Resilience 7000 Series II-70
Alcatel-Lucent Launches Security Product Family for Intrusion
Prevention II-70
GRISOFT Launches Update to AVG Internet Security II-71
GRISOFT Rolls Out AVG Small Business Server Edition II-71
Citrix Rolls Out NetScaler 8.0 for Enterprise Internet- Based
Applications II-71
Citrix Launches New SSL VPN Appliance II-72
Cisco Introduces Cisco ASA 5580 Series Adaptive Security
Appliances II-72
Stonesoft Launches New SSL VPN Appliances II-72
Secure Computing Rolls Out SnapGear(TM) Internet Security
Appliance II-72
SonicWALL Releases SonicWALL Network Security Appliance E7500 II-73
Wedge Networks Unveils New Network Security Appliance II-73
Iomega Introduces OffScreen Managed Network Security Platform II-73
Nsasoft Launches Nsauditor Network Security Auditor 1.7 II-74
Nsasoft Unveils Nsauditor Network Security Auditor 1.6.9 II-74
Enterasys to Roll Out Enterasys Dragon IDS / IPS System II-74
Cisco Enhances Collaboration Among Products in Security Portfolio II-74
Arbor Networks Unveils New Enterprise Network Security Solution II-75
Arbor Rolls out Arbor Peakflow X Version 3.7 Network Security
Solution II-75
Arbor Networks Launches Peakflow SP Version 3.6 Network Security II-75
Celestix Releases WSX Appliances for the Websense Express
Software II-75

6. Recent Industry Activity II-76
IBM Completes Acquisition of Encentuate II-76
IBM Bags Procter & Gamble Network Security Contract II-76
Patriot Scientific Acquires Minority Interest in Talis Data
Systems II-76
VMWare Announces Acquisition of BlueLane II-76
Trusted Computer Announces Acquisition of CounterStorm II-77
Fortinet Forms Partnership with Dimension II-77
Barracuda Networks Acquires 3SP II-77
Green Hills Software Establishes INTEGRITY II-77
NitroSecurity Announces Acquisition of RippleTech II-77
Arbor Acquires Ellacoya Networks II-78
Huawei Forms Joint Venture with Symantec II-78
Blue Coat Forms Partnership with RSA II-78
Lumeta Announces Partnership with Avalon II-78
NetWitness and Phoenix Enter into a Reseller Agreement II-79
Network Strategies Partners with CRYPTOCard II-79
Tiburon Forms Strategic Partnership with Top Layer II-79
Top Layer Forms Partnership with Bradford II-79
Cisco Extends Enterprise Data Security Partnership with EMC II-80
Fortinet(R) Collaborates with Government Technology and ACR 2 II-80
Diebold Takes over Minority Interest in Solutionary II-80
Q1 and Juniper Sign OEM Agreement II-80
Swedish Defence and AppGate Renew Agreement II-81
Top Layer Announces Partnership with Tenable Network Security II-81
Woodside Deploys Sourcefire 3D System II-81
Barracuda Plans to Acquire Sourcefire II-81
Hifn Completes Acquisition of Siafu II-82
McAfee to Take over ScanAlert II-82
Mycroft and Talisen Merge II-82
Raytheon Completes Acquisition of Oakley II-82
FrontRange Solutions Takes over Centennial II-82
SafeNet Completes Acquisition of Ingrian II-82
Deep Nines Completes Acquisition of Captus Networks II-82
L-1 Completes Acquisition of Advanced Concepts II-83
Patchlink Completes Acquisition of SecureWave II-83
Provider HealthNet Takes over Network Technology II-83
Symantec Takes Over 4frontsecurity II-83
Vector Led Group Completes Acquisition of SafeNet II-83
VisionGATEWAY Completes Acquisition of Lagmore II-83
Gemini Communications Acquires Stake in Veeras Infotek II-84
Nexicon Inks a Definitive Agreement with Third- party Investor II-84
Stonesoft Inks an Agreement with immixGroup II-84
Sunbelt Software Inks Distribution Agreement with Lifeboat
Distribution II-84
Exaprotect Forms Strategic Alliance with Fortinet II-84
FireEye Joins Internet2 as a Corporate Member II-85
Whyte Hirschboeck Dudek Deploys Fortinet FortiGate II-85
Verizon Business Bags Homeland Network Security Contract II-85
ProCurve and Microsoft Collaborate on Enhanced Network
Protection II-86
Compustaff Deploys SafeMedia Technology for Network Security II-86
Cyber Operations Collaborates with NASA on Network Security
Software II-86
BlueCross Deploys StealthWatch(TM) System of Lancope II-86
Fortinet Enters into a Partnership Agreement with AlterPoint II-87
AVG Technologies Signs a Distribution Deal with 2BY2 II-87
AVG Technologies Selects Portland Europe as a Distributor II-87
AVG Technologies Appoints Draware as a Distributor for Denmark II-87
Securicom Partners with Alcatel-Lucent II-88
AEP Networks Joins Hughes SATCOM-II team II-88
CRYPTOCard Announces Partnership with AEP Networks II-88
Celestix Networks to Provide Kaspersky Software under MSA(TM)
Appliance Range II-89
NSAT Deploys Secure Web and Firewall from Secure Computing II-89
TriGeo Forms Partnership with Phoenix Datacom II-89
TriGeo Enters into Nine New Global Markets II-90
Sydney Church Selects Security Solutions of WatchGuard II-90
Secure Computing Joins Forces with Cymtec II-90
The University of Exeter Selects Juniper Networks Ethernet
Solution II-90
Gmarket Selects MX960 Ethernet Services Routers of Juniper
Networks II-91
SIM Selects Juniper Networks for its Networking and Security
Solutions II-91
RSEA Deploys Juniper Networks Secure Remote Access Solutions II-91
Bankdata Selects Juniper Networks Remote Access Solution II-91
GNi Protects Data Center with Juniper Networks Firewalls II-92
Numericable Deploys Security and Routing Network
Infrastructure of Juniper II-92
Bangchak Petroleum Enhances Distribution System Security with
Juniper Services II-92
CoreXchange Upgrades Network Infrastructure with Juniper
Ethernet Routers II-92
Cox Communications Deploys Security Platform of Crossbeam Systems II-93
BT Deploys Security Platform of Crossbeam for Virtualized
Firewall Services II-93
Ecritel Deploys Crossbeam's Security Platform for Virtualized
Firewall Services II-93
Microsoft Partners with SecureWorks for Enhanced Protection II-93
SecureWorks Expands Partnership with Sourcefire to Resell ETM
Solutions II-94
Panda Signs Licensing Deal with Commtouch for Anti-Spam
Technology II-94
Panda Forms New Partnership with Nero II-94
Sourcefire Signs Strategic Premier Partnership Deal with MIS CDS II-94
Sourcefire and Secureway Sign Strategic Distribution Agreement II-94
JetBlue Airways Adopts Sourcefire's 3D System for Network
Security II-95
Kobe University Implements F5(R) FirePass(R) SSL VPN System II-95
McAfee Collaborates with Intel, HP ProCurve, and VMWare II-95
Global Crossing Builds IP Network for CIBEPar II-96
Global Crossing Delivers IP VPN through Superdrug Stores II-96
TelstraClear and Arbor Networks Sign Reseller Deal II-97
CCCH VNA and Hospice Deploys Websense Web Security Solutions II-97
eSoft Releases OEM Solutions II-97
Polytechnic Installs SSL VPN of Array II-97
Aladdin to Take over Secure SafeWord Portfolio of Secure
Computing II-97
Frontier Selects Secure Firewall of Secure Computing II-98
PlantCML Selects Secure Firewall of Secure Computing II-98
Punahou Enters into Agreement with Secure Computing II-98
Websense and Voltage Roll out Unified Security Product II-98
MegaPath Supplies Security, VPN and Broadband Solution to Sun
Pacific Energy II-99
MegaPath Supplies SSL and Managed Security Services to Unified
Grocers II-99
NetLogic Microsystems Enters into an Agreement with Endeavor
Security II-99
Canal Digital Enters into a Security Partnership with Norman II-99
High Tower Software Partners with Encryptanet II-99
Panda Security and Sage Sign Agreement II-100
Avaya GlobalConnect and GajShield Sign Agreement II-100
Propalms Signs LOI to Purchase VPN Solution II-100
WatchGuard Tech Partners with Dell II-100
SECNAP(R) Network Security in Partnership with Sourcefire(R) II-100
RBTi Signs with NetWitness for Network Security Solutions II-100
Xerox Selects VeriSign Managed Security Services for Network
Security II-101
Genband to Take Over NextPoint II-101
McAfee Acquires Secure Computing II-101
Thales Acquires nCipher II-101
Secure Computing Completes Acquisition of Securify II-101
Phoenix Contact Takes Over Innominate II-101
Stonesoft Partners with Algeria Telecom II-102
PineApp and ITway Ink Distribution Agreement II-102
AirDefense Partners with AirWave II-102
Banner Pharmacaps Enters into a Contract with AT&T II-102
Avnet Technology Solutions Partners with Utimaco II-103
Rapid7 Forms Partnership with Tailwind Associates II-103
Symantec Acquires Vontu II-103
Peapod Merges with GSS II-103
McAfee Acquires SafeBoot Holding II-103
Novell Acquires Senforce Technologies II-104
SonicWALL Acquires Aventail Corporation II-104
Net@Work Acquires Werkflow II-104
McAfee and Scottrade Enter into a Security Partnership II-104
GE Inks an Agreement with Sophos II-104
Fresh Egg Enters into Collaboration with F-Secure II-105
AppGate Reaches an Agreement with Three New Channel Partners II-105
Caveo Systems Inks an Agreement with AlgoSec II-105
Skybox and Wipro Collaborate on Managed Security and
Consulting Services II-105
Alcatel-Lucent Signs a Reseller Agreement with InfoExpress II-106
A10 Enters into Partnership Agreement with RSA II-106
Invensys Forms Partnership with Integralis for Global Network
Security II-106
QED Connect Forms Partnership with Kaspersky II-107
NetWitness Joins Partners in Latin America and Europe to
Offer Network Security Solutions II-107
NetWitness Forms Partnership with immixGroup II-108
Toll Brothers Selects Novell(R) Network Security Solutions II-108
CTS Selects Virtela Managed Network and Security Solutions II-108
Kyoto University Selects Juniper Networks IDP to Address
Security Threats II-109
Sonus Supplies NBS for XO Network Security II-109
Alert Logic Inks an Agreement with Stratos II-109
C-MI Labs Enters into an Agreement with eSoft II-110
id-Confirm to Supply Advanced Biometric System to CacheMatrix
Holdings II-110
Stonesoft Enters into an Agreement with Bradford Networks II-110
Radware Signs an Agreement with Harris Corporation II-111
Alert Logic Enters into an Agreement with WebCE(C) II-111
Nokia Enters into an Agreement with Neusoft II-111
PineApp Receives UK Distribution Contract II-111
Blue Zebra Inks a Distribution Agreement II-112
PineApp Sign Distribution Agreements with CMI and SQTEC II-112
Enterasys Forms Partnership with Tenable Network Security II-112
SSH Bags Expansion Order II-112
NeoScale Partners With RSA II-113
RSA and Decru(R) Together Offer EDP Solutions II-113
Check Point Acquires NFR Security II-113
Verizon Business Completes Acquisition of Cybertrust II-113
Websense Acquires SurfControl II-113
Symantec Acquires Altiris II-114
Cisco Announces Acquisition of IronPort Systems II-114
SurfControl Forms Technology Partnership with Sophos II-114
Bimba Selects Secure Computing's Sidewinder(R) Network Gateway
Security Tool II-114
Durham District School Deploys WatchGuard(R) to Protect Network II-115
Alcatel Wins Contract from NTT Communications II-115
EIQnetworks(R) Forms Alliance with Clavister II-115
HP Selects AVG Internet Security Software of GRISOFT II-115
Kaseya Chooses AVG Anti-Malware of GRISOFT II-116
Potomac Selects SonicWALL Security Solutions II-116
Top Layer and Tilera Team up II-116
University of Constance Installs Peakflow X Platform of Arbor II-116
Global Crossing Deploys New IP VPN Solutions to Waukesha Networks II-117
Mori Luggage & Gifts Deploys MegaPath VPN Solutions II-117
United Technologies Deploys MegaPath Managed SSL VPN Solution II-117
El Pollo Loco Deploys MegaPath Managed IP Solutions II-117
O'Neill Selects Security Solutions of Juniper Networks II-117
Radiant Deploys Comprehensive Solution of Juniper Networks II-118
PEER 1 and Juniper Enhance Firewall Services II-118
Banco Del Bajio Selects Security and Remote Access Solutions
of Juniper II-118
HiWAAY Deploys Juniper Networks Routers II-118
Cooper-Standard Deploys Juniper Networks Remote Access Solution II-118
MegaPath Deploys Juniper Networks Solution II-119
Celestix Establishes New Center for Technical Support and Sales II-119
European Investment Bank Deploys Enterasys Secure Network II-119
Scottrade Deploys UTM Platform of Crossbeam Systems II-119
SecureWorks and FCUL Form Partnership for Information
Security Services II-120
SecureWorks Partners with NRECA on Information Security Services II-120
SecureWorks Integrates Vulnerability Management System of Qualys II-120
Swiss Federal Institute of Technology Selects Sourcefire(R) for
Network Security II-120
Sourcefire Announces Acquisition of ClamAV Project II-120
F5 Network Acquires Acopia Networks II-121
Global Crossing Acquires Impsat II-121
Highway Technologies Selects Global Crossing IP VPN Network II-121
AutomationDirect Deploys Websense Security Software II-122
AhnLab Unveils Online Security Service for Banamex II-122
Arbor Forges Alliance with Net One II-122
Arbor Forms Partnership with Netcloud II-122
Authenex Teams up with Array II-122
eSoft and Bell to Extend Partnership Agreement II-122
Quantros Selects SiteDirect SSL VPN of Array II-123
College at Wise Deploys Security System based on FortiGate(TM)-
5050 chassis II-123
Hostopia.com Installs Threat Management System and Peakflow SP
of Arbor II-123
Nissan(TM) Deploys FortiGate(TM) Security Products of Fortinet(R) II-123
Sunrise Installs Arbor Peakflow SP Suite II-123
Quipu Deploys GFI EventsManager II-124
University of Tsukuba Installs ISG 2000 and M120 of Juniper II-124
Daewoo Implements IP-Enabled VPN II-124
Dexia Installs Novel Security Architecture based on NSM and ISG II-124
Gmarket Deploys NetScreen-5400 of Juniper II-124
ONStor Installs Firewall/IPSec VPN & SSL VPN Devices of Juniper II-125
Sungshin Selects IDP Platform of Juniper II-125
Telefonica Installs T-Family of Core Routing Platforms of Juniper II-125
T-Mobile Austria Selects ISG 2000s of Juniper II-125
Kang-Ning Deploys SA 4000 SSL VPN Platform of Juniper II-125
Syndicate Installs Fortinet(R) Security Products II-126
TeliaSonera to Install SSL VPN Devices of Juniper II-126
Norman Enters into a Cooperation Agreement with Cisco Systems II-126
Magirus Inks a Distribution Deal with GFI II-126
SonicWALL Joins ProCurve Alliance II-127
ExaProtect Joins Juniper Networks J-Partner Solution Alliances
Program II-127
Tech Mahindra to Takeover iPolicy Networks II-127
Westcon Group Completes NOXS Acquisition II-127
IElement to Acquire Compeware II-127
Fortinet Provides Progressive Network Security Solutions to
Largest US County II-128
Concentra Selects On-demand Network Security Solutions of
Alert Logic II-128

7. Focus on Select Global Players II-129
3Com Corporation (USA) II-129
AEP Networks (USA) II-129
Arbor Networks, Inc. (USA) II-129
Array Networks, Inc. (USA) II-129
AVG Technologies NV (The Netherlands) II-130
BMC Software Inc (USA) II-130
BT Counterpane (USA) II-130
Check Point Software Technologies Ltd. (Israel) II-130
Cisco Systems Inc. (USA) II-130
Citrix Systems Inc. (USA) II-131
Clavister AB (Sweden) II-131
Electronic Data Systems Corporation (USA) II-131
Enterasys Networks, Inc. (USA) II-131
F5 Networks Inc. (USA) II-132
Fortinet Inc (USA) II-132
GFI Software Ltd (Malta) II-132
International Business Machines Corp. (USA) II-132
Juniper Networks Inc. (USA) II-133
McAfee, Inc. (USA) II-133
Microsoft Corporation (USA) II-133
Norman ASA (Norway) II-134
Nokia Corporation (Finland) II-134
Nortel Networks Corporation (Canada) II-134
Secure Computing Corporation (USA) II-135
SonicWALL Inc. (USA) II-135
Sourcefire, Inc (USA) II-135
Stonesoft Corporation (Finland) II-136
Symantec Corporation (USA) II-136
Trend Micro Incorporated (USA) II-136
TippingPoint Technologies, Inc. (USA) II-136
Unisys Corporation (USA) II-137
WatchGuard Technologies, Inc. (USA) II-137

8. Global Market Perspective II-138
Table 10: World Recent Past, Current & Future Analysis for
Network Security by Geographic Region - North America, Europe,
Asia-Pacific, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2006 through
2015 (includes corresponding Graph/Chart) II-138

Table 11: World Historic Review for Network Security by
Geographic Region - North America, Europe, Asia- Pacific, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2000 through 2005 (includes
corresponding Graph/Chart) II-139

Table 12: World 10-Year Perspective for Network Security by
Geographic Region - Percentage Breakdown of Revenues for North
America, Europe, Asia-Pacific, and Rest of World Markets for
Years 2006, 2009 & 2015 (includes corresponding Graph/Chart) II-140

Table 13: World Recent Past, Current & Future Analysis for
Firewall/VPN by Geographic Region - North America, Europe,
Asia-Pacific, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2006 through
2015 (includes corresponding Graph/Chart) II-141

Table 14: World Historic Review for Firewall/VPN by Geographic
Region - North America, Europe, Asia- Pacific, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2000 through 2005 (includes
corresponding Graph/Chart) II-142

Table 15: World 10-Year Perspective for Firewall/VPN by
Geographic Region - Percentage Breakdown of Revenues for North
America, Europe, Asia-Pacific, and Rest of World Markets for
Years 2006, 2009 & 2015 (includes corresponding Graph/Chart) II-143

Table 16: World Recent Past, Current & Future Analysis for
Intrusion Detection System/Intrusion Prevention System by
Geographic Region - North America, Europe, Asia-Pacific, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2015 (includes
corresponding Graph/Chart) II-144

Table 17: World Historic Review for Intrusion Detection
System/Intrusion Prevention System by Geographic Region -
North America, Europe, Asia-Pacific, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2000 through 2005 (includes corresponding Graph/Chart) II-145

Table 18: World 10-Year Perspective for Intrusion Detection
System/Intrusion Prevention System by Geographic Region -
Percentage Breakdown of Revenues for North America, Europe,
Asia-Pacific, and Rest of World Markets for Years 2006, 2009 &
2015 (includes corresponding Graph/Chart) II-146

Table 19: World Recent Past, Current & Future Analysis for
Unified Threat Management Appliances by Geographic Region -
North America, Europe, Asia-Pacific, and Rest of World Markets
Independently Analyzed with Annual Revenues in US$ Million for
Years 2006 through 2015 (includes corresponding Graph/Chart) II-147

Table 20: World Historic Review for Unified Threat Management
Appliances by Geographic Region - North America, Europe,
Asia-Pacific, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2000 through
2005 (includes corresponding Graph/Chart) II-148

Table 21: World 10-Year Perspective for Unified Threat
Management by Geographic Region - Percentage Breakdown of
Revenues for North America, Europe, Asia-Pacific, and Rest of
World Markets for Years 2006, 2009 & 2015 (includes
corresponding Graph/Chart) II-149

Table 22: World Recent Past, Current & Future Analysis for
Mobile Data Protection by Geographic Region - North America,
Europe, Asia-Pacific, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2006
through 2015 (includes corresponding Graph/Chart) II-150

Table 23: World 10-Year Perspective for Mobile Data Protection
by Geographic Region - Percentage Breakdown of Revenues for
North America, Europe, Asia-Pacific, and Rest of World Markets
for Years 2006, 2009 & 2015 (includes corresponding
Graph/Chart) II-151


III. MARKET

1. North America III-1
A.Market Analysis III-1
Current and Future Analysis III-1
Network Security Industry: A Primer III-1
Network Security: A Peek into the Past Market Structure III-2
Market Analysis by Segment III-2
Firewall/VPN Continues to Decline III-2
IDP and UTM Sectors Offer Bright Prospects III-2
Trends III-2
Integrated Security Appliances Gather Momentum III-2
Managed Security Services Witness Strong Demand III-3
Enterprise Concerns Drive Network Security Growth III-3
Product Launches III-3
Strategic Corporate Developments III-30
Key Players III-62
B.Market Analytics III-71
Table 24: North American Recent Past, Current & Future
Analysis for Network Security by Product Segment -
Firewall/VPN, Intrusion Detection System/Intrusion
Prevention System, Unified Threat Management, and Mobile
Data Protection Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2015
(includes corresponding Graph/Chart) III-71

Table 25: North American Historic Review for Network
Security by Product Segment - Firewall/ VPN, Intrusion
Detection System/Intrusion Prevention System, and Unified
Threat Management, Markets Independently Analyzed with
Annual Revenues in US$ Million for Years 2000 through 2005
(includes corresponding Graph/Chart) III-72

Table 26: North American 10-Year Perspective for Network
Security by Product Segment - Percentage Breakdown of
Revenues for Firewall/VPN, Intrusion Detection
System/Intrusion Prevention System, Unified Threat
Management, and Mobile Data Protection Markets for Years
2006, 2009 & 2015 (includes corresponding Graph/Chart) III-72

2. Europe III-73
A.Market Analysis III-73
Current and Future Analysis III-73
Network Security Market - An Overview III-73
Product Launches III-73
Strategic Corporate Developments III-80
Key Players III-91
B.Market Analytics III-94
Table 27: European Recent Past, Current & Future Analysis
for Network Security by Product Segment - Firewall/VPN,
Intrusion Detection System/Intrusion Prevention System,
Unified Threat Management, and Mobile Data Protection
Markets Independently Analyzed with Annual Revenues in US$
Million for Years 2006 through 2015 (includes corresponding
Graph/Chart) III-94

Table 28: European Historic Review for Network Security by
Product Segment - Firewall/VPN, Intrusion Detection
System/Intrusion Prevention System, and Unified Threat
Management Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2000 through 2005
(includes corresponding Graph/Chart) III-95

Table 29: European 10-Year Perspective for Network Security
by Product Segment - Percentage Breakdown of Revenues for
Firewall/VPN, Intrusion Detection System/ Intrusion
Prevention System, Unified Threat Management, and Mobile
Data Protection Markets for Years 2006, 2009 & 2015
(includes corresponding Graph/Chart) III-95

3. Asia-Pacific III-96
A.Market Analysis III-96
Current and Future Analysis III-96
Market Overview III-96
Vendors Provide Integrated Solutions to Stay Ahead III-97
China III-97
Network Security Market - An Overview III-97
Competitive Scenario III-98
Table 30: Chinese Network Security Market (2008):
Percentage Value Share Breakdown of Leading Companies -
Topsec, Rising, Cisco, Symantec, Neusoft, LinkTrust, Trend
Micro, Venus InfoTech, Juniper Networks, Check Point, and
Others (includes corresponding Graph/Chart) III-98
Lack of Stringent Regulations III-99
Outlook III-99
India III-99
An Overview III-99
Competitive Scenario III-100
Bundled Solutions Gaining Prominence III-100
Malaysia III-101
Need for Security Drives Investment III-101
Singapore III-101
Market Overview III-101
Product Launches III-102
Strategic Corporate Developments III-105
Key Players III-111
B.Market Analytics III-113
Table 31: Asia-Pacific Recent Past, Current & Future
Analysis for Network Security by Product Segment -
Firewall/VPN, Intrusion Detection System/Intrusion
Prevention System, Unified Threat Management, and Mobile
Data Protection Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2015
(includes corresponding Graph/Chart) III-113

Table 32: Asia-Pacific Historic Review for Network Security
by Product Segment - Firewall/VPN, Intrusion Detection
System/Intrusion Prevention System, and Unified Threat
Management Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2000 through 2005
(includes corresponding Graph/Chart) III-114

Table 33: Asia-Pacific 10-Year Perspective for Network
Security by Product Segment - Percentage Breakdown of
Revenues for Firewall/VPN, Intrusion Detection System/
Intrusion Prevention System, Unified Threat Management, and
Mobile Data Protection Markets for Years 2006, 2009 & 2015
(includes corresponding Graph/Chart) III-115

4. Rest of World III-116
A.Market Analysis III-116
Current and Future Analysis III-116
Latin America III-116
Network Security Market Shows Steady Growth III-116
Competitive Landscape III-116
Table 34: Latin American Network Security Market (2007):
Percentage Breakdown of Value Sales by Leading Company for
Check Point, Cisco, Juniper, IBM ISS, McAfee, SonicWALL,
Enterasys, Aker, and Others (includes corresponding
Graph/Chart) III-117

Table 35: Latin American Firewall/VPN Market (2007):
Percentage Breakdown of Value Sales by Leading Company for
Check Point, Cisco, Juniper, SonicWALL, and Others
(includes corresponding Graph/Chart) III-118

Table 36: Latin American SSL VPN Market (2007): Percentage
Breakdown of Value Sales by Leading Company for Juniper,
Citrix, Check Point, Cisco, and Others (includes
corresponding Graph/Chart) III-118

Table 37: Latin American IDS/IPS Market (2007): Percentage
Breakdown of Value Sales by Leading Company for IBM ISS,
Cisco, McAfee, Check Point, Enterasys, and Others
(includes corresponding Graph/Chart) III-118
End-Use Market III-118
Table 38: Latin American Network Security Market (2007):
Percentage Breakdown of Value Sales by End-Use Segment -
Banking and Finance, Government, Telecom & Technology,
Manufacturing, Retail, and Others (includes corresponding
Graph/Chart) III-119
Brazil III-119
Mexico III-119
Table 39: Latin American Network Security Market (2007):
Percentage Value Share Breakdown by Country/Region -
Brazil, Mexico, Southern Cone, Andean, and Caribbean &
Central America (includes corresponding Graph/Chart) III-120
Product Launches III-120
Strategic Corporate Developments III-123
Check Point Software Technologies Ltd. (Israel) - A Key Player III-125
B.Market Analytics III-126
Table 40: Rest of World Recent Past, Current & Future
Analysis for Network Security by Product Segment -
Firewall/VPN, Intrusion Detection System/Intrusion
Prevention System, Unified Threat Management, and Mobile
Data Protection Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2006 through 2015
(includes corresponding Graph/Chart) III-126

Table 41: Rest of World Historic Review for Network Security
by Product Segment - Firewall/VPN, Intrusion Detection
System/Intrusion Prevention System, and Unified Threat
Management Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2000 through 2005
(includes corresponding Graph/Chart) III-127

No comments:

Post a Comment