market overview

  • Theme Overview

    This theme provides a broad analysis of the Privacy and Cyber Security Market and Technological landscape from a number of key commercial, research-oriented, and policymaking perspectives that impact and characterise the domain.

    Scope

    This theme is decomposed further into four subthemes covering different perspectives on the PACs market domain:

    1. “Trends and Challenges” - theme provides a summary of quantatitive statistics from key market analysis sources, as well as a detailed qualitative summary of trends impacting the PACs market
    2. “Market Overview” -  analysis of key horizontal and vertical breakdowns within the PACs market, covering both supply and demand-side considerations
    3. “Science and Technology” – analysis of key scientific and technology activities within PACs research and innovation communities, with particular attention on the EU perspective
    4. “Policy Framework and Legislation” – summary of key bodies and initiatives from policy, legislation and standards perspectives

    The Market Analysis theme complements the “Market” Theme also

    What you will learn

    Analysis in this module will help privacy and cyber security researchers and innovators gain a comprehensive 360 degree understanding of IT/cyber security and privacy marketplace across all key perspectives - providing a strong knowledgebase input for participating effectively in the domain.

    The report will provide readers with a comprehensive baseline understanding of the PACS market and wider domain. From there, innovators will likely have further specific market questions relating to their specific context – finding answers to these specific questions will be supported by other templates and modules in the  with IPACSO framework.[SG1] 

    Potential Uses Uses and applications of content in this module will vary depending on end-user perspective. Examples include:
    • Product development professionals seeking to clarify direction and identify opportunities in security, privacy or broader ICT markets
    • Researchers and research management personnel seeking to extend their understanding of key perspectives influencing the security and privacy commercial and research domain
    • Policymakers looking to understand market landscape and needs of security/privacy innovators and impact on wider ICT space
    • CISOs and IT Decision-makersseeking greater understanding of security and privacy domain from an innovation perspective and potential impacts
    • Investors in security, privacy and ICT areasseeking to identify key trends and opportunities

     [SG1]Reference these when data becomes available

     

  •  

    Supply Side

    A plethora of solution categories and sub-categories exist within the PACs domain. The pace of change in such technologies and related threats mean that defining the market in technology terms can be challenging, with PACs product and feature-set boundaries constantly changing in line with market needs - particularly as new technologies reach the point of commoditisation over time.

    Hence one segmentation standpoint adopted by Pierre Audoin Consultants in recent domain reports [PAC14] is to segment PACs into broad solution types, indicating what is protected by some combination of underlying technologies. This categorisation is particularly useful in order to categorise the real market subdomains that exist in PACs and are defined by key analyst groups, and is leveraged in Section 6. Four solution type areas are identified in this scheme, namely:

    • Infrastructure:  concerned with solutions that secure access/entrance points to the ICT infrastructure being protected, including those offering a secure perimeter, as well as others offering network and device endpoint protection.
    • Systems:  while the Infrastructure solutions above are concerned with entry to key network and infrastructure access points, solutions in the Systems category determine what each user can do across each of the organisation’s internal systems after they have entered. Various nuances of Authentication, Identity Management and Access Management solutions make up the core of this solution segment.
    • Content: concerned with security at the data level, as well as access to documents, applications and crucial details therein. Encryption technologies have been a core solution area within this category, but a broad range of other newer solutions have also emerged.
    • Governance:  solutions in this category provide overall contextual support, acting as an overarching co-ordinator of the cyber security system, with strong emphasis on combining broader PACs service offerings with narrower PACs product offerings. 

    Further detail on key product and solution market sub-segments existing within the overall PACs marketplace is provided in the table links below, mainly focusing on solutions typically used across enterprise and consumer buyer segments, as well as a large part of government needs, which combined define the mass-market segments served by most well-known PACs solution areas. These are also the buyer areas predominantly focused on by most existing PACs market analysis sources. Such solution categories are also used within Defence and some highly security-sensitive government buyer segments, but offerings tend to be more one-off and bespoke to advanced needs - hence differing to needs of the majority of players in the enterprise and consumer mass markets.

      Infrastructure Systems Content Governance
    Solution Context Focus on protecting key perimeter, network and endpoint nodes in infrastructure Focus on assigning and managing specific access rights and controls to ICT systems (internal or cloud based) Focus on enforcing security and privacy at the data and content-levels Overarching solutions (both service and product based) that support overall PACs governance and assurance
    Key PACs solution and technology areas

    Anti-virus, firewalls and UTM, IDS/IPS, VPN, whitelisting, secure email and web gateways, endpoint security management etc.

    Many solution areas in this category increasingly supported by managed service offerings

    Identity and Access Management (IAM) solutions, authentication solutions, directory services

    Many solution areas in this category increasingly supported by managed service offerings

    Encryption, PKI, Data Loss Prevention (DLP), Digital Rights Management(DRM), 

    cloud encryption gateways, archiving, application security and  security-by-design solutions

    PACs strategy, risk management, regulation and certification audit and controls, SIEM and log management, security penetration testing, asset and vulnerability management,  forensics and incident response, continuity planning, etc

    Relevant Market Sub-domains Analysis

     

    (CLICK THROUGH FOR MORE ON EACH SOLUTION TYPE)

    Attack Detection and Prevention Solutions  

    Identity and Access Management Solutions

    Data and Content Security Solutions 

    PACs Governance Solutions[SG1] 

    Table 2.2 – Breakdown of key PACs solution sub-areas (adapted from Pierre Audoin Consultants analysis, 2014)

      
    References:

    [PAC14] Pierre Audoin Consultants, PAC Research Cluster "Cyber Security", https://www.pac-online.com/sites/pac-online.com/files/sitsi_cluster_security_2014.pdf

     

     

Getting Started

Which type of company are you? Choose one of the options below and get a head-start.

Framework Overview

Navigate through the different parts of the Framework

leeg