Strategic CIO // IT Strategy
News
8/23/2004
05:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Report says Virtually All Big Companies Will Outsource Security By 2010

A Yankee Group report suggests that the need to stay ahead of hackers will drive a move to outsource security to managed service providers.

The need to stay ahead of the hacker curve will drive nearly 90% of big U.S. companies to outsource their security to managed service providers by the end of the decade, a report released Monday suggested.

According to the Yankee Group, businesses will hand over security--initially for perimeter defenses but eventually for inside-the-firewall protection--to managed security service providers to the tune of $3.7 billion by 2008, a jump from 2004's estimated $2.4 billion.

"Enterprises are outsourcing more technology in general," said Matthew Kovar, a VP at Yankee Group's security solutions group. "But we'll see a lot more in the security space. Enterprises know what they have to do, but more of them will see that [security] isn't a core competency," he added, and will hand the reins to a managed security service provider.

Security outsourcing will prove attractive, said Kovar, for reasons other than the cost savings typically cited by companies that farm out business processes. Among the drivers toward managed services are the accelerated attacks of today's threats--giving enterprises virtually no time to put up defenses on their own before an attack infiltrates a network--legislative requirements such as HIPAA and Sarbanes-Oxley, and the trend toward pushing out the network perimeter to include partners and remote workers.

"The well-defined perimeter just doesn't exist anymore," Kovar said.

These and other factors are outpacing the average company's ability to keep up with the latest counter-measures and techniques to thwart attacks, Kovar said in his report. At the same time, security is moving from the network perimeter to protecting critical network links, key servers, databases, and end-user desktops, in part because of worms that other exploits that managed to sneak through the perimeter on laptops or through remote sessions.

While managed services biggest number of customers are currently those subscribing to anti-spam services, managed firewalls aren't far behind, said Kovar. And as the trend continues, other security defenses now solved by hardware, such as intrusion detection and intrusion prevention, will also be shipped out for others to handle.

"One of the easiest managed services to see success is E-mail anti-spam services," Kovar said. "People saw the pain and saw that they needed to outsource the solution."

Companies such as Brightmail and MessageLabs have capitalized on the anti-spam managed approach, grabbing part of the $140 million business that Kovar said "cropped up almost overnight."

The outsourcing of security will follow other IT outsourcing trends by going offshore, said Kovar, who expects that "security will be the next to go to Ireland, India, and beyond." Services such as application code review, he said, simply can't be done cost effectively in North America.

The vendors that Yankee Group sees in the top tier include TruSecure and Symantec, with Unisys, Netsec, Solutionary, Internet Security Systems, and RedSiren close on their heels. Notable by its absence, said Kovar, is McAfee. "That would concern me if I was an enterprise investing in their technologies," he said.

In the end, the winners will be the vendors with the best security gurus, or as Kovar put it, "the best knowledge gatherers. The real intellectual property for security is in advanced algorithms, intelligence, and the ability to rapidly deploy new security countermeasures in real time to a large installed base of enterprise customers and their global networks."

Comment  | 
Print  | 
More Insights
Transformative CIOs Organize for Success
Transformative CIOs Organize for Success
Trying to meet today’s business technology needs with yesterday’s IT organizational structure is like driving a Model T at the Indy 500. Time for a reset.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.