Story image

Endpoint protection key growth point for enterprise security

21 Apr 2016

Endpoint threat detection is driving the most new security revenue, according to a new report.

Jane Wright, Technology Business research principal analyst, says customers are allocating more of their security budgets for advanced threat detection and remediation on endpoints outside their traditional network infrastructures, as they seek to detect advanced attacks such as evasive and persistent attacks.

“They are determined to detect and contain attacks at their most common entry points – user’s PCs,” Wright says.

The increasing evaluation and deployment of endpoint-based products and services drove more new revenue opportunities for security vendors than any other security technologies in the fourth quarter of 2015 according to TBR’s 4Q15 Enterprise Security Benchmark.

TBR says large vendors held a smaller share of the enterprise security market in Q4, compared to the previous year, with midsize vendors such as Palo Alto Networks and Fortinet achieving strong growth by focusing on the largest segment – network security – and providing platforms with attached security services that, in some cases, displaced established vendors’ legacy firewalls and unified threat management appliances.

Small vendors saw slowing revenue growth as customers aimed to decrease complexity by purchasing security solutions from fewer vendors.

That slowed growth opens the doors for more acquisitions in 2016, with TBR saying it expects the likes of HPE and Cisco may evaluate small but growing firms such as Carbon Black and Imperva, for acquisition.

New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.