infography "security: from pain to empowerment"
DESCRIPTION
Infographie IDC pour Blue Coat, sur l’évolution de la sécurité informatique. L’infographie part de la période où la sécurité informatique n’était pas une priorité, puis lorsqu’elle est devenue une contrainte pour les utilisateurs, jusqu’à nos jours où la sécurité informatique est devenu un facteur de productivité et de nouvelles possibilités pour les employés.TRANSCRIPT
An IDC Infographic, sponsored by Blue Coat
Identity and access management; Advanced authentication; Web single sign-on; Enterprise single sign-on; Legacy authorization; User provisioning; Personal portable security devices; Software licensing authentication token; Uni�ed threat management; Intrusion detection and prevention; Virtual private network; Security and vulnerability management; Security information and event management; Proactive endpoint risk management; Forensics and incident investigation; Security device and systems management; Vulnerability assessment...
$20 million1999 Worldwide PC shipments
1999 Worldwide Security Software 2012 Worldwide Security Software
$3.8 Billion $19.3 Billion
2012 Worldwide PC shipments
$371.1 million
43157
644774
2000 2001 2002 2003 2004 2005 2006 2007 2008
$357.4B
$6,884B
DataLossDB.org incidents2004-2007
Worldwide E-Commerce Spending (B2B & B2C) $B
8000
7000
6000
5000
4000
3000
2000
1000
0
Which if any of the following is your company currently using/likely to purchase
or implement during the next 12 months?
Any potential security risks cloud computing or SaaS introduce are
far outweighed by the bene�ts.
Employees using personal smartphones at work understand the risks, and are aware of security proper security practices.
45%33%22%
AGREE
DISAGREE
NEUTRAL
63%23%14%
from pain to empowerment
Antiviral, Firewall, Encryption, Security AAA
Security submarkets tracked by IDC 2013
Security submarketstracked by IDC 1999
I LOVE YOUEmerges
Code Red costs top
$2B
Slammer Worminfects an
estimated 150,000to 200,000 servers
worldwide
How would you describe your mobile device environment?
63%BYOD
37%IT-CONTROLLED
Worldwide cloud revenue ($B)
2012 2013 2014 2015 2016
659 SMARTPHONE SHIPMENTS (M) 1,161
$29B$67B
Employee Monitoring Solutions: 57%Network Admission Control: 57%Data loss prevention: 62%
Complexity of security solutions
Increasing sophistication of attacks
Increasing volume of threats and/or attacks
Web grows as a top threat sourceTop security challenges facing large enterprises over the next 12 months
Top rated enterprise security challenges(a �ve year comparison)
DIFFICULTY SECURING WEB APPS
64%EMPLOYEE
USE OF WEB 2.0
60%
45%45%41%
53%61%63%
2007 2008 2009 2010 2011
Does your organization have a formal documented
security policy?
Yes
65%No35%
Yes55% No
45%
1999 2016Era Before Security Era of Pain Era of Obtrusive Security Era of Empowerment
Cloud, mobile and consumerization disrupt IT. Security empowers business.
Web commerce grows; hackers take notice, mischief turns to theft
Enterprises lock-down infrastructures. Breaches mount.
Not Much Online Commerce, Not Much thinking About Security