2010 to be a year of change for the security industry
Friday, 15 January 2010 18:52

2010 is going to be a dramatic year for the security industry.  Vendors and security professionals should prepare for a sea change.   Here are my predictions for the year. 
1.    Crowd sourced Denial of Service attacks will be used against websites of US candidates in US elections.  The attacks against Iranian web sites during June 2009 educated a lot of Twitter users on how to take down web sites of people they disagree with.  Simple page refreshes on a candidate’s web site are enough to bring it down.  Candidates should consider hosting their sites on robust platforms that can take the loads.
2.     Despite efforts of the new Cybersecurity Coordinator in the White House the US Federal Government will continue to experience loss of data to cyber spies. 
3.    The security industry will experience a record number of mergers and acquisitions.
4.    Cisco and Juniper will each acquire a UTM vendor.  Despite being included in IDC’s rankings of UTM vendors, Cisco and Juniper do not have true UTM solutions.  Fortinet’s IPO in 2009 has highlighted that there is indeed a UTM market and Cisco and Juniper are missing out on the fastest growing segment of network security.  Possible candidates for acquisition could be Watchguard, Sonicwall, Astaro, Cyberoam, NetASQ, Ahn Labs, and Clavister.
5.    The biggest change to the security industry is going to come from large vendors getting into the space.   The largest IT company in the world, HP, is in the process of acquiring 3Com and will probably complete that acquisition in the first half of 2010. Public announcements of the acquisition did not give much weight to the H3C and Tippingpoint components of an otherwise stodgy networking company.  Once HP realizes the security portfolio they have acquired there could be significant disruption in the firewall and security appliance industry.   Lockheed Martin has already announced that cyber security will be one of the main focuses of their acquisition strategy in 2010 and I believe Northrup Grumman,  IBM, Raytheon, L3 and other defense contractors will also make security acquisitions.  Expect some familiar names in the IT security space to become part of large defense contractors.
6.    Around the world countries will announce new cyber security initiatives as the barrage of espionage, DDoS, and cyber crime continues to hamper their industry, communications, and banking infrastructure. 

In the ten years that I have covered the security industry as an analyst, 2010 is going to bring the biggest changes to an industry that has always been chaotic.

Add New Search
Lisa Valentine  - To Block or Not. Is that the question?   |96.56.140.xxx |2010-04-07 13:49:07
Speaking of change in 2010, I just wanted to share an excellent whitepaper on
the subject of blocking social networking apps, “To Block or Not. Is that the


It has lots of insightful and useful
information about identifying and controlling Enterprise 2.0 apps (Facebook,
Twitter, Skype, etc.)

I’m a consultant working with Palo Alto Networks, a
network security company that helps enterprises manage social networking apps on
the corporate network. IT departments are stuck between a rock and a hard place.
They know that end-users and the business units will revolt if these apps are
outright blocked. At the same time, they know these apps carry risks and
can’t leave them unchecked. It requires a good balance between enablement and
[b] [i] [u] [url] [quote] [code] [img] 
Please input the anti-spam code that you can read in the image.

3.26 Copyright (C) 2008 Compojoom.com / Copyright (C) 2007 Alain Georgette / Copyright (C) 2006 Frantisek Hliva. All rights reserved."