Solving customers’ business problems with technology solutions

Prolifics Technology Journal

Subscribe to Prolifics Technology Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Prolifics Technology Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

NEW YORK, March 14, 2013 /PRNewswire/ -- announces that a new market research report is available in its catalogue:

Global Information Security Products And Services Industry

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware, and Information Security Services. The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software. The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances. The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management Services, Education & Training, and Response Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2010 through 2018. A six-year historic analysis is also provided for these markets.The report profiles 385 companies including many key and niche players such as ActivIdentity Corporation, AuthenTec, Check Point Software, Technologies Ltd., Cisco Systems Inc., Clearswift Ltd., CA Technologies, Inc., Crossbeam Systems, Inc., Entrust, Inc., F-Secure Corporation, Fortinet Inc., Fujitsu Ltd., Hewlett-Packard Development Company, L.P, IBM Corporation, Juniper Networks, Inc., Keyware Technologies NV, Lumension Security, Inc., McAfee, Inc., Norman ASA, Novell, Inc., Ping Identity Corp., Proofpoint, Inc., EMC Corporation, SafeNet, Inc., Co., Ltd., SonicWALL, Inc., Sophos Plc, Utimaco Safeware AG, Stonesoft Corporation, Symantec Corporation, Technology Nexus AB, Thales Group, Trend Micro Incorporated, Trustwave, Verizon Business, WatchGuard Technologies, Inc., and WebSense, Inc. Leading Global Information Security Research Institutes Center for Education and Research in Information- Assurance and Security, and Information Security Group. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based upon search engine sources in the public domain.

Study Reliability and Reporting Limitations I-1
Disclaimers I-2
Data Interpretation & Reporting Level I-2
Quantitative Techniques & Analytics I-3
Product Definitions and Scope of Study I-3
Information Security Software I-4
Identity & Access Management (I&AM) I-5
Public Key Infrastructure (PKI) I-5
Web Single Sign-On I-5
Host Single Sign-On I-5
User Provisioning I-5
Directory Services I-5
Legacy Authorization I-6
Advanced Authentication I-6
Secure Content Management (SCM) I-6
Antivirus Software I-6
Web/Content Filtering I-6
Messaging Security (E-mail Scanning) I-6
Intrusion Detection/Prevention (IDP) I-6
Security & Vulnerability Management I-7
Firewall/VPN Software I-7
Other Security Software I-7
Information Security Hardware I-7
Hardware Authentication I-7
Tokens I-7
Smart Cards I-8
Biometrics I-8
Threat Management Security Appliances I-8
Firewall/VPN Appliances I-8
SCM Appliances I-8
Intrusion Detection/Prevention Appliances I-8
Unified Threat Management (UTM) Appliances I-8
Information Security Services I-9
Consulting Services I-9
Education and Training Services I-9
Implementation Services I-9
Management Services I-9
Response Services I-9


Corporate Information Assets - Vulnerable as Ever II-1
Growing Instances of IT Security Breaches - A Serious Cause
for Concern II-2
Types of Internal IT Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-3
Types of External Security Breaches in Organizations - Ranked
in the Order of Frequency of Occurrence II-3
A Look at Common Security Threats for Enterprise Information
Assets II-3
Damages Caused by Security Breaches II-4
Proprietary Information Destruction II-4
Disruption in Systems Performance II-4
Data/Application Damage or Corruption II-5
Information Security - High on Priority List for Enterprises II-5
Factors Affecting Implementation of Information Security
Solutions by Enterprises Worldwide - Ranked in Order of
Influence II-6
Network Security - Keeping Security Threats at Bay II-6
Enterprise Endpoint Security Grows in Prominence II-7
General Trends Underpinning the Endpoint Security Solutions
Market II-7
Server Security Concerns Driving Demand for Server Security
Solutions II-8
Impact of Recession in Retrospect II-9
Outlook II-10
Emerging Markets - Hotspots for Growth II-10
Growing Use of Technology Brings Security Concerns for
Enterprises, Opportunities for Information Security Vendors II-10
Growing Use of Internet as a Business Platform Demands Robust
Information Security Solutions II-10
Threat from Social Networking Sites to Drive Demand for
Information Security Solutions II-11
Security Risks Posed by Virtualization & Cloud Computing to
Fuel Security Solutions Market II-11
Growing Use of Smartphones Boosts Demand for Smartphone
Security Solutions Market II-13
Smartphone Convenience at the Cost of Information Security II-13
Table 1: Worldwide Worker Population (2008 & 2011):
Breakdown of Number of Workers (in Millions) by Nature of
Work - Mobile & Non Mobile (includes corresponding
Graph/Chart) II-14

Table 2: Worldwide Mobile Worker Population (2008 & 2011):
Breakdown of Number of Mobile Workers (in Millions) by
Nature of Work - Mobile Office, Mobile Non-Office, Mobile
Home Based (includes corresponding Graph/Chart) II-14

Table 3: Worldwide Mobile Workforce (2011): Percentage
Share Breakdown of Number of Mobile Workers by Region
(includes corresponding Graph/Chart) II-14
Enabling Smartphone Security - An Urgent Need II-15
Industry Still Underprepared to Tackle Security Concerns II-15
Smartphone Security Solutions II-15
Regulatory Compliance Requirements Drives Demand for
Information Security Solutions II-16
Dearth of Trained Staff and Infrastructure to Drive Demand for
Information Security II-16
IP4 to IPv6 to Boost Adoption of Cyber Security Solutions and
Services II-16
Growth in Sophisticated & Compound Security Threats to Drive
Demand for Enhanced Security Solutions II-17
Rapid Expansion in Security Technologies II-18
Hosted Security Services: Growing in Demand II-18
Increased use of Open Source Tools II-19
Growing Significance of Application-Level Security II-19
VoIP Security for Expanding VoIP II-19
Security for Converged Data and Voice Environments II-19
Growing Commoditization of Security Products II-20
Financial Services - A Key End Use Market for Information
Security Solutions II-20
Information Security in Financial Services Sector II-20
Industry Wise Implementation of Information Security Policy -
Industries Ranked by Level of Implementation II-20
Major External & Internal Breaches in Financial Services Sector II-21
Top Security Initiatives by Sector II-21
Advanced Solutions Gain Traction II-21
Regulatory Compliance: A High Priority for Financial
Institutions II-22
Growing Significance of Data Loss Prevention II-22
Lack of Alignment Between Business Objectives and Security II-22
Convergence Gains Strength II-22
Key Barriers in Information Security for Financial Services
Sector II-23
Increasing Adoption of Digital Health Records to Drive Demand
for IT Security Solutions in Healthcare Sector II-23
Production Systems too Bitten by Security Bug II-23
Key Issues and Challenges II-24
Major Restraints to Efficient Information Security in
Enterprises Worldwide II-24
Inadequate Budget - Main Constraint against Effective
Information Security II-24
External Threats More Recognized than Internal Threats II-25
Organizations are Essentially Reactive Rather than Proactive II-25
Lack of Comprehensive Security Solutions II-25

Information Security Software II-26
Identity & Access Management Solutions II-26
Table 4: Global Identity and Access Management Market
(2009): Percentage Share Breakdown of Revenues by Operating
Environment (includes corresponding Graph/Chart) II-27
A Key Security Initiative for Enterprises II-27
An Integral Part of Corporate Strategy II-28
Growing Prominence of Identity-as-a- Service (IaaS) II-28
Cloud Services Boost IaaS II-29
Concerns with IaaS Implementation II-29
Lack of Unified Standards - A Major Concern II-29
Problems Confronting SaaS Implementation II-29
PKI (Public Key Infrastructure) II-29
Legacy Authorization - A Declining Market II-30
Secure Content Management Grows in Prominence II-30
Antivirus Accounts for Lion's Share II-30
Low Footprint Anti-Virus Grow in Prominence among SMBs II-30
Top 10 Anti Virus Software Solutions for 2011 II-31
Web Filtering II-31
Increasing Web 2.0 & E-Mail Threats Boost Demand for Content
Filtering Products II-31
Messaging Security (E-mail Scanning) - A Promising Market II-32
Security & Vulnerability Management II-32
Table 5: Global Vulnerability Management Market (2011):
Percentage Share Breakdown of Revenues for Device
Vulnerability Assessment and Application Scanners (includes
corresponding Graph/Chart) II-33
Small and Mid-Sized Businesses - An Under- Penetrated
Segment for SVM II-33
Diverse Delivery Systems for SVM Products II-33
Firewall/VPN Software II-33
Encryption for Data Protection II-33
Information Security Hardware II-34
Hardware Authentication - A Trivial but Embryonic Market II-34
Tokens & Smart Cards II-34
Smart Cards Market - A Review II-34
Telecom Sector to Remain Major Driver of Smart Card Demand II-35
Market Overview of Authentication Tokens II-35
Hardware vs. Software Tokens II-35
Demand for Software-Based Authentication Tokens on the Rise II-36
Trends in Authentication Tokens Market II-36
Growing Use of Two-Factor Authentication II-36
Latest Development in Two Factor Authentication Security II-37
New Technologies II-37
Adaptive Authentication II-37
Near Field Communications II-37
New Form Factors II-37
Growing Prominence of Wireless Technology II-37
Biometrics II-38
Table 6: Global Biometrics Market (2011): Percentage Share
Breakdown of Revenues by Technology - Fingerprint
Technology, Facial Scan Technology, and Others (includes
corresponding Graph/Chart) II-38

Table 7: Global Biometrics Market By Application (2015P):
Percentage Share Breakdown of Revenues for Identity
Services, Logical Access, Physical Access, and Surveillance &
Monitoring (includes corresponding Graph/Chart) II-39
Rapid Growth of Biometric Surveillance II-39
Biometric Authentication - Key Issues II-39
Threat Management Security Appliances - Order of the Day II-39
Firewall/VPN Appliances II-39
VPN Market on an Upswing II-40
SSL VPN - A Nascent Market II-40
UTM Appliances - A Whip on Blended Security Threats II-40
Need for Simplifying Information Security Procedures - A
Business Case for UTM II-41
Increasing Fascination for UTM Appliances in Large Enterprises II-41
Shift from UTM to XTMs II-41
Integrated Security Suites Emerge as the Preferred Choice for
Information Security II-41
Information Security Services - Primary Revenue Contributor II-42

Information Security Market - Highly Competitive II-43
Consolidation Wave in Security Software Market II-43
Convergence of Product Portfolio - A Key Competitive Ploy II-43
Key Statistics II-44
Table 8: Leading Vendors in the Global Security Software
Market (2011): Percentage Share Breakdown of Revenues for
Symantec, McAfee, Trend Micro, IBM, CA, and Others (includes
corresponding Graph/Chart) II-44

Table 9: Global Identity and Access Management Market
(2011): Percentage Share Breakdown of Revenues by Leading
Players (includes corresponding Graph/Chart) II-44

Table 10: Worldwide Messaging Security Market (2011):
Percentage Share Breakdown of Revenue by leading Players
(includes corresponding Graph/Chart) II-44

Table 11: Global Security and Vulnerability Management
Market (2010): Percentage Share Breakdown of Revenue by
Leading Players (includes corresponding Graph/Chart) II-45

Table 12: Global Firewall Market (2010): Percentage Share
Breakdown of Revenue by Leading Players (includes
corresponding Graph/Chart) II-45

Table 13: Global Intrusion Detection/Prevention Market
(2011) - Percentage Share Breakdown of Revenues by Leading
Players (includes corresponding Graph/Chart) II-45

Table 14: Global Market for Unified Threat Management
(Q2-2010): Percentage Market Share Breakdown by Leading
Players (includes corresponding Graph/Chart) II-45

Information Security - An Introduction II-46
Organizational Security Strata II-46
Managing Information Security II-46
Measures to Ensure Information Security: II-47
Information Security Projects in Organizations - Ranked in
the Order of Relative Importance II-47

Information Security Software II-49
Identity & Access Management (I&AM) II-49
Key Functionalities of Identity & Access Management Solutions II-50
Authentication II-50
Authorization II-50
Administration II-50
PKI (Public Key Infrastructure) II-50
Benefits of PKI II-51
Glitches with PKI II-51
Single Sign-On (SSO) II-51
Web Single Sign-On II-52
Host Single Sign-On II-52
User Provisioning II-52
Directory Services II-52
Legacy Authorization II-52
Advanced Authentication II-52
Secure Content Management (SCM) II-53
Antivirus Software II-53
Web/Content Filtering II-54
Messaging Security (E-mail Scanning) II-54
Table 15: Principal Factors Affecting Installation of
Web/E-mail Monitoring in Organizations (includes
corresponding Graph/Chart) II-54
Intrusion Detection/Prevention (IDP) II-54
Security & Vulnerability Management II-55
Firewall/VPN II-56
Firewalls II-56
Major Firewall Types II-56
Packet Filter Firewall II-56
Stateful Packet Inspection Firewall II-57
Application Layer Gateways or Proxies II-57
Available Forms of Firewalls II-57
Software Firewalls II-57
Hardware Firewalls II-57
Virtual Private Networks (VPNs) II-57
Key Components of a VPN II-58
VPN Gateways II-58
Security Servers II-58
Keys II-58
Network II-58
Available Forms of VPN II-58
VPN Software II-58
VPN Hardware II-58
Types of VPN II-58
Remote-access VPN II-58
Site-to-Site VPN II-58
Technologies Supporting Delivery of VPN Services II-59
Internet Protocol Security (IPSec) II-59
Point-to-Point Tunneling Protocol (PPTP) II-59
Layer 2 Tunneling Protocol (L2TP) II-59
Secure Socket Layer (SSL) II-59
Multi Protocol Label Switching (MPLS) II-59
Firewall/VPN - The Need for Integration II-60
Encryption II-60
Other Security Software II-60
Information Security Hardware II-60
Hardware Authentication Products II-60
Tokens II-61
Smart Cards II-61
Biometrics II-61
Threat Management Security Appliances II-61
Firewall/VPN Appliances II-62
SCM Appliances II-62
Intrusion Detection/Prevention Appliances II-62
Intrusion Detection System (IDS) II-62
Types of IDS II-63
Intrusion Prevention System (IPS) II-63
Unified Threat Management (UTM) Appliances - The Viable
Solution II-63
Benefits of UTM Appliances II-63
Information Security Services II-64
Information Security Services Life Cycle II-64
Stages of Information Security Life Cycle II-64
Initiation II-64
Assessment II-64
Solution II-64
Implementation II-65
Operations II-65
Closeout II-65
Security Policy II-65
Program Policies II-65
Issue-Specific Policies II-65
System-Specific Policies II-65
Security Services Management Tools II-65
Metrics II-66
Service Agreements II-66
Types of Information Security Services II-66
Consulting Services II-66
Education and Training Services II-66
Implementation Services II-66
Management Services II-67
Response Services II-67
Types of Delivery Models II-67
Software Licenses II-67
Appliance Based Devices II-67
Hosted Services (Security- as- a-Service Solutions) II-68
Complete Outsourcing Models II-68
Hybrid Model II-68

CloudPassage Introduces Halo NetSec Security Solution for
Public Clouds II-69
Stonesoft Launches IPS-1302 for Encrypted Traffic Inspection
and Web II-69
IBM Releases Latest Security Software for Mobile Applications II-69
SafeNet Launches Enhanced Version of Sentinel Cloud II-70
Proofpoint Unveils Enhancements Proofpoint Enterprise Product
Portfolio II-71
Lumension Releases New Endpoint Management and Security Suite
v7.2 Integrated with Endpoint Integrity Service II-72
Norman Introduces New Malware Analyzer G2 Platform Version II-73
Norman Announces Improvements to Email Protection Solution II-73
Proofpoint Launches Proofpoint Android App and Mobile
Decryption App II-74
Fortinet® Launches a Range of Network Security Appliances II-74
Fortinet® Introduces FortiGate™-5101C and FortiGate™-3240C
Firewall Products II-75
Symantec Announces Updation of Backup Exec 3600 and NetBackup
5220 II-76
Symantec Releases Enterprise Mobile Enhancements II-77
McAfee Releases New Database Security Solution II-78
F-Secure Unveils Safe Anywhere II-78
Fujitsu Develops 5mm Sensor, World's Slimmest Sensor for
Biometric Authentication II-79
F-Secure Launches Server and Email Security Solution II-79
IBM Launches SmartCloud Foundation II-80
ActivIdentity Integrates CIV-Compliant Credential Management
System with Crescendo Card Platform II-81
Juniper Introduces Upgraded Mykonos Web Security Platform II-81
Juniper Launches Universal Access Solutions with ACX Series
Platforms II-82
Novell Launches ZENworks® 11 Support Pack 2 II-83
Norman Launches NSP System II-84
Proofpoint Launches Proofpoint Enterprise Governance II-84
SafeNet Launches White Box Cryptography II-85
SafeNet Launches eToken 3500 II-85
Trustwave Launches Innovative Managed Security Services II-86
Check Point Launches Check Point R75.40 II-87
Check Point Launches Check Point ThreatCloud II-88
Websense Launches Websense X10G II-88
Fortinet to Launch FortiDDoS Series II-89
ActivIdentity Unveils Enhancements to 4TRESS Authentication
Solution II-90
RSA Integrates KMIP Specification into RSA Data Protection
Manager Solution II-91
WatchGuard® Technologies Introduces WatchGuard XCSv series II-91
WatchGuard® Technologies Introduces WatchGuard XTM 25 and
WatchGuard XTM 26 UTM Appliances II-91
HP Introduces Thin Clients Featuring Windows Embedded Standard
7 WS7P SKU II-92
HP Introduces New Solutions for Converged Cloud Portfolio II-92
Grid Infocom Introduces Information Security Solutions and
Services Bundle for Mid-Sized Companies II-94
Okta Launches New Service to Offer Single Sign-on for All Web
Apps II-94
EdgeWave Launches New Messaging Security Suite II-95
Raytheon Launches SureView 6.6 for Information Protection II-95
Fox Technologies Introduces FoxT SOX Report Pack II-95
Check Point Launches R75, Latest Version of Network Security
Suite for Better Control, Visibility II-96
Sophos Introduces Mobile Control, SafeGuard Enterprise 5.60, &
Endpoint Security and Data Protection 9.7 Solutions II-97
Sophos Unveils Mobile Management Platform II-99
Symantec Launches Endpoint Protection 12 and Protection 2.0
Security Solutions II-100
Trustwave Launches MyIdentity II-100
Symantec Launches Encryption Solutions Specialization II-101
Norton Launches NortonLive Ultimate Help Desk Service II-102
Clearswift Launches SECURE Email Gateway 3.4 and SECURE Web
Gateway 2.5 II-103
Trustwave Launches an Innovative Suite of Web Security Solutions II-104
Trustwave Launches FIM Solution II-105
CA Technologies Introduces CA Service and Portfolio Management
Partner Solution Center II-105
Crossbeam Expands X-Series Security Platform II-105
Crossbeam Launches X50 II-106
Entrust Launches Entrust IdentityGuard 10.0 II-106
Entrust Launches Entrust IdentityGuard Mobile SDK II-107
CA Technologies Updates Advanced Authentication Cloud Security
Service II-108
Crossbeam Launches XOS 9.6 II-109
Trustwave Launches Apache Software License v2 II-110
Sophos Introduces Upgraded SafeGuard(R) Full-Disk Mac
Encryption Software (UK) II-111
McAfee Introduces Upgraded Security Management Solution II-111
RSA Introduces Upgraded Data Loss Prevention Suite II-112
WatchGuard Introduces the XTMv Series for Virtual Infrastructures II-113
F-Secure Introduces New Mobile Security Solutions II-113
Juniper Networks Introduces New Improvements for Pulse Mobile
Security II-114
Norman Launches Endpoint Protection 9 Information Security System II-115
Norman Enhances Direct Quarantine Email Security Solution II-115
Norman Unveils Upgraded Norman Network Protection Antimalware
Security Appliance II-116
Norman Launches Latest and Superior Security Appliance Version
4.0 II-116
Norman Launches Latest Edition Security Suite 9 Software II-117
RSA Introduces Automated Security Incident Management Solution II-117
Stonesoft Launches StoneGate Mass Security Solution II-118
Stonesoft Unveils AERT II-119
HID Global Rolls Out Certified PIV-I Service II-120
WatchGuard Introduces Next-Generation Firewall XTM 2050 II-121
F-Secure Launches Anti-Virus for Mac II-121
WatchGuard Introduces Security Appliance for Small Businesses II-121
Fortinet® Introduces FortiScan-VM™ and FortiGate-VM™ for
Citrix™ XenServer II-122
F-Secure Launches F-Secure Mobile Backup Solution II-123
Juniper Launches WLA532 II-123
Fortinet Launches FortiGate-600C and FortiGate-1000C II-124
Fortinet® Launches FortiClient II-125
Fortinet® Launches FortiAnalyzer 4.0MR3 and FortiManager 4.0MR3 II-126
Juniper Networks Launches Simply Connected Line of Security,
Switching and Wireless Products II-126
Juniper Networks Launches MAG Series Junos Pulse Gateways II-127
Juniper Introduces New Integrated Virtualization-Aware Solution II-127
Norman Unveils Malware Analyzer G2 Platform II-127
Novell Releases New Healthcare Solution Pack II-128
Norman Introduces New Advanced Free Malware Cleaner Version 2.1 II-129
Proofpoint Releases New Cloud-Based Compliance for Microsoft
Office 365 II-129
Proofpoint Introduces New Proofpoint Mobile, Security and
Compliance Platform for Mobile Enterprise II-130
SafeNet Introduces Ultra-Small Sentinel HASP HL MaxMicro
Licensing Dongle II-130
SafeNet Unveils KG-345 Ethernet Encryptor II-130
SafeNet Unveils SafeNet Authentication Manager 8.0 II-131
SafeNet Unveils MDeX System II-132
Check Point Introduces New Range of Security Appliances II-132
Symantec Expands Encryption Solution Range for Improved
Organizational Flexibility and Mobile Device Connectivity II-133
SafeNet Introduces New Mobile Device Credentialing Solution
for Secure Utilization of End-User Mobile Devices II-133
Sophos Introduces Advanced Anti-Virus Software for Mac OS X Lion II-134
Check Point® Launches New 3D Security Solution II-134
SafeNet Introduces Two Innovative Authentication Migration
Products II-134
Check Point Launches Check Point 61000, the Swiftest Security
Gateway Available II-134
Check Point Unveils ZoneAlarm SocialGuard, a Tool to Secure
Children from Facebook-based Threats II-136
ActivIdentity Launches 4TRESS Authentication Appliance FT2011 II-137
Fortinet to Launch FortiGate and FortiWiFi Series II-138

SHI, Solutionary Unveil ActiveGuard UTM Complete for Small to
Mid-Sized Businesses II-140
IBM to Launch InfoSphere Guardium 8 II-140
Portcullis Launches Threat Management Gateway II-141
Barracuda Networks Rolls Out NG Firewall II-142
NTT America Partners with Integralis to Introduce Superior
Information Security Solutions (USA) II-142
Cyberoam Introduces Virtual SSL VPN Device II-143
ConvergEx Introduces Management Access Service to Enable
Direct Access to Senior Executives II-144
St. Bernard Software Unveils Red Condor 7.3 Version II-144
CSI Launches Version 3 SSO v3.7.5 II-145
ActivIdentity Launches ActivID CMS Appliance II-146
WatchGuard Launches Innovative Authentication Updates for
Firewalls II-147
WatchGuard Launches WatchGuard SSL 560 II-147
ActivIdentity Launches 4TRESS Authentication Server 7.0 II-148
ActivIdentity Launches FIPS 201 Partner Program and F5 PAC
Solution with API II-148
ActivIdentity Unveils Appliance-based Model of ActivIdentity
4TRESSTM Authentication Server II-149
Fortinet Launches Fortigate-5001B Security Blade and
FortiSwitch-5003B Switching Blade II-150
Fortinet Unveils New E-Mail Security Solution II-151
Websense Launches Websense® Web Security Gateway Anywhere™ II-152
Norman Releases Norman Security PRO II-153
Fortinet Launches Two Novel Multi-Threat Security Systems with
Industry-Best Firewall and IPS Performance II-153
ActivIdentity Launches New PKI Secure Mobile Solution for
Smart Phones II-154
Check Point® Introduces New ZoneAlarm DataLock to Prevent
Unauthorized Access to Private Data II-154
Trustwave Debuts an Integrated Managed Security Portal II-154
Novell Introduces Novell Cloud Security Service II-155
Novell Cloud Security Service Extends WorkloadQ Profile II-156
Fortinet Releases New Multi-Threat Security Device FortGate-3040B II-156
Entrust Launches Secure E-mail Certificates II-157
Websense Launches DLP for Download II-157
Juniper Launches LN1000 II-158
Norman Unveils Norman Patch and Remediation Advanced
Vulnerability Solution II-159
Norman Launches Norman Network Protection 3.7 Security Solution II-159
SafeNet Launches Luna SA 5.0 HSM II-160
SafeNet Integrates ProtectServer HSM with DS3 Authentication
Toolkit II-161
Check Point Launches New Version of ZoneAlarm® Free Firewall II-162
F-Secure Security Gateway Launches E-mail Encryption Features II-163
Trustwave Introduces Powerful SSL Management Solution II-163
Entrust Launches IdentityGuard Mobile Solution II-164
Proofpoint Unveils an Advanced Version of SaaS Email Security
and DLP Platform in Europe II-164
Netgear Introduces Prosecure UTM5 II-165
WatchGuard Technologies Rolls Out WatchGuard XTM Multifunction
Security II-166
Nokia Siemens Networks and Juniper Networks Launch New
Security Solutions II-166
Netgear Introduces Prosecure UTM25 and UTM10 Security Solutions II-167
Global Secure Systems and QinetiQ Roll Out New Managed Digital
Security Service II-167
Netmagic Solutions and iViZ Security to Unveil New Security
Solutions II-167
SafeNet Introduces eSafe® SmartSuite™ Mail and Web Security
Gateway II-167
Splunk and GlassHouse Technologies Develop Enterprise Security
Suite II-168

Sterling Takes Over AISS II-169
Integralis Acquires Secode II-169
Edelman Launches Data Security & Privacy Group II-170
IBM Acquires Q1 Labs II-170
Quantum Telecom to Acquire Zebra Technologies II-171
QuadraMed Inks Contracts with Three Healthcare Organizations
for Identity Management Products II-171
Telaid Deploys NLSS Networking Gateway II-171
ValidSoft Inks Agreement with Utiba (Singapore) II-172
Vanguard Inks Agreement with 3CON and MSCS-X II-173
Trustwave Acquires M86 II-173
Red Bull Technology Selects HP 3PAR Storage Solution of HP II-174
HP Enterprise Services Bags Contract from Defense Information
Systems Agency II-174
Ping Identity and IIJ Global Solutions Enter into Partnership II-175
O'Neill Europe Chooses MobilePASS© Multi-Factor Authentication
Solution of SafeNet II-175
Crossbeam Systems Certifies R75.40 Security Gateway of Check
Point on X-Series Security Platforms II-176
CSC Inks Technology Collaboration Agreement with Ping Identity II-176
SafeNet Acquires Cryptocard II-177
RSA Join Forces with Zscaler to Develop Cloud Based solution
for Secure Identities II-177
Winvale Inks Partnership Agreement with Ping Identity II-177
Ping Identity Collaborates with Macnica Networks II-178
Dell Acquires SonicWALL II-178
Sophos Collaborates with Egnyte II-179
Verizon Enters into Strategic Alliance with Cellcrypt II-179
Bright House Networks Partners with Cisco II-180
Spirent and Crossbeam Partner for Real-time Network Security
Tests II-181
McAfee Acquires NitroSecurity II-181
Sophos Acquires Astaro II-182
ePlus Acquires NCC II-182
Intel Acquires McAfee II-183
The Attachmate Group Acquires Novell II-183
WISeKey and The Bancorp Ink Agreement to Set Up Joint Venture II-184
Sophos Inks Distribution Pact with D&H Distributing II-184
EMC Takes Over NetWitness II-185
BAE Systems Takes Over II-185
GCA Technology Services and Symplified Ink Partnership Agreement II-186
Quest Software Acquires BiTKOO II-186
MobileIron Inks Promotion Agreement with Box II-186
HID Inks Agreement with NXP II-187
VASCO Acquires A & A II-187
CSI Transitions Assets to UBM TechWeb II-188
Student Flights Selects Multicard to Offer Identity Management
Services II-188
Thales Collaborates with Imprivata II-189
GSA Grants Blanket Purchase Agreement to Telos II-189
Dell Acquires SecureWorks II-190
Xceedium Purchases Password Management Business of Irdeto II-190
VASCO Data Security Acquires DigiNotar to Enhance Market
Position and Product Offering II-191
Radiant Logic and ForgeRock Forge Partnership to Deliver Web
Access Management Software II-192
CyberPoint Inks Agreement with Integrita II-193
Clearswift Introduces Clearswift SECURE Email Gateway 3.3.1
and Clearswift SECURE Web Gateway 2.4 II-193
Sprint and McAfee Introduce McAfee® Mobile Security Technology , II-194
CA Technologies Introduces CA Virtual Placement and Balancing II-195
Ping Identity Forms Alliance with Symantec II-195
Fujitsu Laboratories Develops Biometric Authentication Technology II-196
Intel Selects McAfee to Develop Anti-theft Software for
Ultrabook Devices Microsoft to Incorporate RSA SecurID® in
Microsoft Windows® Active Directory® Federation Services 2.0 II-197
WatchGuard® Technologies Introduces XTMv Range of Virtual
Firewalls II-198
Security First and IBM Sign Joint Development Agreement for
Security System II-198
Lyceum Takes Over Clearswift II-198
Novell Commences Sale of Patents to CPTN Holdings II-199
Sophos Signs OEM Agreement with BlockMaster to Integrate Anti
Virus Technology into USB Drives II-199
Proofpoint Collaborates with VMware to Deliver Advanced
Security and Compliance for Zimbra® platform II-200
Entrust in Partnership with INTERPOL and EDAP Launches
INTERPOL Smartcard II-201
Good Technology Inks Delivery Agreement with ActivIdentity II-201
Nexus Inks Reseller Agreement with Accumulate II-202
ActivIdentity and Realsec Enter into Strategic Alliance Agreement II-203
ThreatMetrix Enters into Partnership with ActivIdentity II-203
IBM Acquires BigFix II-204
EDB ErgoGroup SYSteam Inks Agreement with Nexus II-204

Symantec to Take Over Gideon Technologies II-205
Symantec Takes Over the Security Business of VeriSign II-205
TrustWave Purchases Breach Security II-206
HP Acquires Fortify II-207
Stratsec Inks Agreement with Cybersecurity II-207
CCTV High-Tech Development Partners with Intertrust for
Technology Development II-207
Raytheon Purchases Trusted Computer Solutions II-208
Kaspersky Lab and IceWarp Enter into Technological Partnership II-208
Cyber-Ark Enters into a Partnership Agreement with Avecto II-208
ADTRAN Partners with NetVanta to Launch UTM Security System II-209
IQ Global Re-launches itself as SecureIQ II-209
CA Technologies Acquires Arcot II-210
Quest Unveils Acquisition of Völcker II-210
Cadre Inks Agreement with Quaresso II-211
Metro Bank Selects ActivIdentity4TRESSTM Authentication Server
of ActivIdentity II-211
idOnDemandTM Selects ActivIdentity ActivIDTM Card Management
System of ActivIdentity II-212
Fujitsu Laboratories Develops Cloud Information Gateway
Technology II-212
ASSA ABLOY to Acquire ActivIdentity II-212
Crossbeam Inks Agreement with McAfee II-213
Nexus Merges with PortWise II-213
Nexus Inks Agreement with Utimaco II-214
Vietnam Posts and Telecommunications Enters into Partnership
with F-Secure II-214
Stonesoft Signs Partnership Agreements with System Integrators
in Saudi Arabia II-214
Crossbeam Widens Strategic Partnership Agreement with Check Point II-214
HID Global Acquires ActivIdentity II-215
Stonesoft Inks Agreement with Teamsun II-215
Oracle Corporation Takes Over Sun Microsystems II-216
Trustwave Takes Over Intellitactics II-216
AuthenTec Acquires Embedded Security Solutions Division of
SafeNet II-216
Prolifics Takes Over Watson SCS II-217
ANXeBusiness Takes Over ETSec II-217
Cisco Acquires Rohati Systems II-217
EMC to Take Over Archer Technologies II-217
SHI International Enters into Partnership with Solutionary II-217
Torrid Networks and Beyond Security Enter Into Partnership II-218
CentraComm Selects eIQnetworks to Provide SecureVue II-218
WatchGuard® Technologies Takes Over BorderWare Technologies II-218
SafeNet Takes Over Assured Decisions II-218
Check Point® Acquires Nokia Security Appliance Business II-219
IBM Takes Over Guardium II-219
Cryptzone to Acquire AppGate Network Security II-219
M86 Security Takes Over Finjan II-220
Rapid7 Takes Over Metasploit II-220
Fortinet® Acquires Intellectual Property and Assets of Woven
Systems II-220
SecureWorks Acquires MSS Business of VeriSign II-220
McAfee Acquires Solidcore Systems II-221
SIFT and stratsec Merge II-221
SCM Microsystems Merges with Hirsch Electronics II-221
LogLogic Takes Over Exaprotect II-221
netForensics Acquires Cinxi Product Appliances from High Tower
Software II-222
Novell Takes over Fortefi's Technology Assets II-222
CA Takes Over Orchestria Corporation II-222
Ping Identity Acquires Sxip Access II-222
Aladdin Offers eToken NG-Flash to Zagrebacka Bank of Croatia II-223
Evidian Enters into Partnership with Gemalto II-223
Prism Microsystems Inks Contract with EWA-Canada II-224
HITRUST to Deploy nCircle HIT Security Solutions II-224
Bivio Networks Acquires FlowInspect SpA II-225
Department of Homeland Security and SecureInfo Renew Contract II-225
WISeKey Acquires from WISeKey ELA II-225
Mindware Signs Distributor Deal with Huawei Symantec II-226
LogRhythm and Sapphire Enters into Partnership II-226
Trend Micro to Acquire Third Brigade II-226
FutureSoft Renews Reseller Partnership with TigerRidge II-227
GigaTrust Enters into Agreement with Siemens PLM Software II-227
Q1 Labs Signs Distribution Agreement with VADition II-228
SRM Acquires InfoSec Associates II-228
Good Harbor Acquires TECHMARK Security II-228
Vector Capital Acquires Aladdin Knowledge Systems II-229
AIA Teams Up with Internet ISA II-229
NitroSecurity Acquires Assets of Chronicle Solutions II-229
Berkana and Waterfall Security Solutions Sign Reseller Agreement II-230
ManTech Completes Acquisition of DDK Technology Group II-230
Optenet and FishNet Security Partner to Provide SaaS Solutions II-231
SecureWorks Teams Up With ETEK International to Extend
Security Service Portfolio II-231
Integralis and TELEHOUSE America Announce Alliance II-231
Promisec and Internet Binat Announce New Information Security
Service II-232
LogRhythm forms Distribution Partnership with Excelerate Systems II-232
Motion Computing Partners with Sig-Tec II-232
QSGI Selects Fujitsu Mag EraSURE Data Degausser II-233
Agilex Technologies forms Partnership with HBGary II-233
Kaizen and RSA Join Forces for Information Security Solutions II-234
Cygate Partners with Sourcefire II-234 Collaborates with Symantec to Enhance Web Search Safety II-234
Workshare Enters into Partnership with ABBYY® II-234
DeviceLock and ATHENA in Distribution Agreement II-235
Q1 Labs Combines QRadar Network Security Management with
McAfee's ePO II-235
Authentic Response Enters into Partnership with RelevantView© II-235
Perimeter Enters into Partnership with Techmate II-236
elQnetworks Joins McAfee's Security Innovation Alliance Program II-236
ClearPoint Metrics Inks Partnership with Lumeta for Software
Integration II-236
Cobham to Take Over Argotek II-237
VidSys and Harris Stratex Networks Ink Partnership II-237
Cyber-Ark Finalizes Distribution Deal with DLT Solutions II-237
BigFix and Trend Micro in Licensing Agreement II-238
Trustwave Takes Over Mirage Networks II-238

ActivIdentity Corporation (USA) II-239
AuthenTec (USA) II-239
Check Point Software Technologies Ltd (Israel) II-239
Cisco Systems, Inc. (USA) II-240
Clearswift Ltd (UK) II-241
CA Technologies, Inc. (USA) II-241
Crossbeam Systems, Inc. (USA) II-242
Entrust, Inc. (USA) II-242
F-Secure Corporation (Finland) II-242
Fortinet, Inc. (USA) II-243
Fujitsu Ltd. (Japan) II-243
Hewlett-Packard Development Company, L.P. (USA) II-244
IBM Corporation (USA) II-244
Juniper Networks, Inc. (USA) II-245
Keyware Technologies NV (Belgium) II-245
Lumension Security, Inc. (USA) II-245
McAfee, Inc. (USA) II-245
Norman ASA (Norway) II-246
Novell, Inc. (USA) II-246
Ping Identity Corp. (USA) II-247
Proofpoint, Inc. (USA) II-247
EMC Corporation II-247
SafeNet, Inc. (USA) II-248 Co., Ltd. (Korea) II-248
SonicWALL, Inc. (USA) II-249
Sophos Plc (UK) II-249
Utimaco Safeware AG (Germany) II-250
Stonesoft Corporation (Finland) II-250
Symantec Corporation (USA) II-250
Technology Nexus AB (Sweden) II-251
Thales Group (France) II-251
Trend Micro Incorporated (Japan) II-252
Trustwave (USA) II-252
Verizon Business (USA) II-253
WatchGuard Technologies, Inc. (USA) II-253
WebSense, Inc. (USA) II-254
Leading Global Information Security Research Institutes II-254
Center for Education and Research in Information Assurance
and Security (CERIAS) (USA) II-254
Information Security Group (UK) II-255

Table 16: World Recent Past, Current & Future Analysis for
Information Security Products & Services by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-256

Table 17: World Historic Review for Information Security
Products & Services by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-257

Table 18: World 15-Year Perspective for Information Security
Products & Services by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America and Rest of
World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-258
Information Security Software Market by Product Group/Segment II-259
Information Security Software II-259
Table 19: World Recent Past, Current & Future Analysis for
Information Security Software by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-259

Table 20: World Historic Review for Information Security
Software by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-260

Table 21: World Recent Past, Current & Future Analysis for
Information Security Software by Product Segment - Identity
& Access Management, Secure Content Management, Intrusion
Detection/ Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-261

Table 22: World Historic Review for Information Security
Software by Product Segment - Identity & Access Management,
Secure Content Management, Intrusion Detection/ Prevention,
Security & Vulnerability Management, Firewall/VPN and Other
Security Software Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2004 through 2009
(includes corresponding Graph/Chart) II-262

Table 23: World 15-Year Perspective for Information Security
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004

To order this report:
Security_Systems Industry:
Global Information Security Products And Services Industry

Contact Clare: [email protected]
US:(339) 368 6001
Intl:+1 339 368 6001


SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.