Story image

IDC - APAC’s security services vendor Leaders and Players

04 Jul 2018

The reports are Asia/Pacific Managed Security Services (MSS) 2018 Vendor Assessment and Asia/Pacific Threat Lifecycle Services 2018 Vendor Assessment.

The MSS report provides a detailed evaluation of 19 managed security services providers that address the evolving regulatory environment, and the complex security challenges brought by digital/business transformation and rapidly broadening threat landscape.

It focuses on the evaluation of managed security services providers' security offerings, including compliance management, security infrastructure management in hybrid environments, portfolio benefits, core platform's automation and orchestration capabilities, market execution, customer services.

Altogether vendor responses to 29 separate evaluation criteria are evaluated - 15 criteria for capabilities and 14 criteria for strategy.

The MSS assessment named (in alphabetical order) Accenture, BT, Deloitte, EY, IBM, NTT, Symantec, and Trustwave in the ‘Leaders’ category of the managed security services market.

While other vendors profiled in this analysis such as DXC, Fujitsu, HCL, Orange Business Services, Quann, Secureworks, Verizon, Tata Communications, TCS, Telstra, and Wipro were named in the ‘Major Players’ category.

The emergence of the threat lifecycle services market is reflective of a major market shift in the overall security services market - from the traditional solution-focused, compliance-driven managed security services to threat-focused and intelligence-driven lifecycle security services.

This year, the Threat Lifecycle Services report provides a detailed analysis of the capabilities of 17 providers which offer a range of threat lifecycle services that help organisations be more proactive in the preparation, detection and response to any incidents or threats and significantly enhance their cyber-resilience level.

The report focuses on a set of professional security services, (including advisory, consulting and training services) such as security assessment, cyber range, incident response, threat intelligence services, and forensic services.

The assessment (in alphabetical order) named Deloitte, EY, Fireye, Symantec, Verizon, and Secureworks in the ‘Leaders’ category, differentiating themselves with various expertise throughout the threat lifecycle.

Meanwhile, DXC, Fujitsu, HCL, Kaspersky, IBM, NTT, Quann, TCS, Trustwave, RSA, and Wipro were named in the ‘Major Players’ category in this assessment.

"Tech buyers should select providers that have the best characteristics to augment and optimise their security operations, and more importantly, transform their security programs to be more aligned with their business strategies,” says IDC Asia/Pacific Security Services  Senior Research Manager Cathy Huang,

“Breaches have become a daily occurrence and it is critical for security service providers to offer a lifecycle approach that includes services to help organisations prepare, respond, remediate, and recover to a healthy state, and to minimise the negative impact of a breach."

Both reports provide pertinent guidance for technology buyers and highlight how each vendor is uniquely differentiated.

Both studies leverage a comprehensive list of capabilities and strategy criteria that explain a vendor's success in each market.

The evaluation is based on a multidimensional and rigorous framework that assesses vendors relative to the criteria and one another and highlights the factors expected to be the most influential for success in the market in both the short term and the long term.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.