Britestream Networks, which commissioned the report, contends that's a reversal from the past.
Slightly more IT managers prefer using hardware to secure their networks than software, according to a new research report commissioned by security hardware vendor Britestream Networks Inc. The survey, based on online interviews with more than 300 IT professionals working with companies with $30 million or more in annual revenue, was conducted by independent market-research firm Q&A Research.
Among the significant findings: 54% of respondents prefer a hardware-based product--a hardware appliance or an embedded feature in network hardware equipment--over software when asked how they would prefer to deploy network security in their organization. While this may seem like an insignificant majority, Britestream contends that it's a reversal from the past, when companies preferred software because it was easier and faster to develop. Companies now want the ease of management and high performance associated with hardware, Britestream says.
"Security in software is very slow, and people underestimate the impact that has on their network," says Mike Salas, VP of marketing for Britestream. Hardware is more easily managed and maintained than software, he says, and hardware is more secure. "People find ways to hack into software."
He points to recent hardware product introductions by Symantec Corp. and Check Point Software Technologies Ltd.--traditionally software vendors--as an indication that the industry is aware of the growing preference for boxes among customers.
Andrew Singer, manager of market intelligence at Check Point, says customers want proven security systems but their needs vary. While he acknowledges that his company has seen strong sales from the Nokia Firewall/VPN appliance, which includes Check Point's VPN-1 Pro software, he's also seeing a trend in the proliferation of open, low-cost Intel servers in the enterprise. That's an environment, he says, that offers increasing opportunities to software vendors.
It's hardly unusual for vendors to commission reports and for those reports to end up validating their business models. But some industry analysts note similar findings in related markets. The January 2005 Messaging Technology Report, issued by The Radicati Group, a technology market-research firm, predicts, "E-mail security appliances will be on the top of many organizations' shopping list for 2005. Products that can address [security and policy] needs with a 'plug it in and forget about it' approach will lead the market."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.