Cybersecurity (Vol

Total Page:16

File Type:pdf, Size:1020Kb

Cybersecurity (Vol SYNC. Global investment themes: technology, media and telecoms Issue No. 139 Cybersecurity (Vol. II) 4 November 2016 The world has entered the era of the Code War where every digital device, however small and innocuous, can be “weaponised” – as the recent Dyn Inside cyber-attack aptly illustrated – to send “rogue code” deep into the Internet's . Players engine room to create mayhem. Even the spooks are scared. Trends . Value chain Today’s cybersecurity paradigm . Industry analysis Cybersecurity is critical to almost every business. Yet it is a non-core . Regulation competence for most boards. The frequency of high profile corporate data . M&A breaches will accelerate because CEOs are not sufficiently trained in cyber . Timeline risk as they are in other business risks. Stock watch list Almost every cyber-breach is an “inside job” – whether malicious or . Private companies list accidental – so real-time behavioural analytics is becoming increasingly . Cybersecurity scorecard important as a defence. Technology briefing . Glossary Meanwhile, the advent of new technology cycles such as the Internet of Things has dramatically extended the “attack surface” available to hackers. Overstretched IT managers are trying to manage too many piecemeal security products from too many suppliers. This yields an unmanageable volume of alerts to follow up and the curse of “false positives”. Security vendor lists are likely to be slimmed down and Chief Information Security Officers (CISOs) are likely to choose broad-based security Related reports platforms rather than niche security vendors going forward. Cybersecurity (Vol. I) How to invest in the cybersecurity investment theme By 2020, the global cybersecurity market is expected to be worth $170bn, up from $77bn in 2015. But the core issue is that companies need “better” rather than “more” security. Inside, we look at the 12 most important cybersecurity technologies and conclude that the most important ones in terms of driving the cybersecurity industry’s revenues over the next two years are unified threat management, cloud security and artificial intelligence. Our research indicates the winners in these high-growth cyber technology cycles over the next two years are as follows: . Unified threat management: Check Point Software, Cisco, Fortinet, IBM, Palo Alto Networks, SecureWorks, Sophos and Symantec Report type . Single theme . Cloud security: Barracuda Networks, Fortinet, Imperva, Micro Focus, . Multi-theme Qualys and Sophos . Sector Scorecard . Best Ideas . IBM, Microsoft, Alphabet, Splunk and Palantir Artificial intelligence: (privately held but likely to IPO in 2017) Cyrus Mewawalla Mike Orme Elgen Strait www.researchcm.com Managing Director, Research Senior Analyst, Research Managing Director, Sales [email protected] [email protected] [email protected] +44 (0) 20 3393 3866 +44 (0) 20 3393 3867 +44 (0) 20 3744 0105 High quality research requires investment Please do not copy or forward © CM Research 2016 SYNC, Issue 139 Cybersecurity (Vol. II) 4 November 2016 Contents PLAYERS ................................................................................................................................................................................................ 4 TRENDS ................................................................................................................................................................................................. 5 Changing nature of cyber threats .................................................................................................................................... 5 Evolution of key cybersecurity technologies.................................................................................................................... 6 Industry growth drivers .................................................................................................................................................... 8 Corporate governance trends .......................................................................................................................................... 9 Wider industry trends .................................................................................................................................................... 10 VALUE CHAIN ....................................................................................................................................................................................11 Where does cybersecurity sit in the Big Data value chain? .......................................................................................... 11 What are the key cybersecurity technologies? ............................................................................................................ 12 Network security ............................................................................................................................................................ 13 Unified threat management .......................................................................................................................................... 13 Artificial intelligence ...................................................................................................................................................... 14 Deception based cyber defences (subset of AI) ............................................................................................................. 14 Behavioural analytics (subset of AI) ............................................................................................................................... 15 Security information and event management ............................................................................................................... 15 Endpoint security ........................................................................................................................................................... 16 Mobile security (subset of endpoint security) ............................................................................................................... 16 Identity management..................................................................................................................................................... 17 Data security .................................................................................................................................................................. 17 Application security ....................................................................................................................................................... 18 Email security ................................................................................................................................................................. 18 Cloud security ................................................................................................................................................................ 19 Managed security services ............................................................................................................................................. 19 Post-breach consultancy services .................................................................................................................................. 20 Which of these cyber technologies are the most important? ....................................................................................... 21 INDUSTRY ANALYSIS ......................................................................................................................................................................22 Defining cyber risk.......................................................................................................................................................... 22 Investment landscape .................................................................................................................................................... 23 Today’s cybersecurity paradigm .................................................................................................................................... 23 Human factors ................................................................................................................................................................ 23 Deep learning as a cybersecurity solution ..................................................................................................................... 24 www.researchcm.com 2 SYNC, Issue 139 Cybersecurity (Vol. II) 4 November 2016 Regulation ................................................................................................................................................................... 25 USA ................................................................................................................................................................................. 25 Europe ............................................................................................................................................................................ 25 China .............................................................................................................................................................................. 26 Rest of world .................................................................................................................................................................. 26 Industry size and
Recommended publications
  • Android Euskaraz Windows Euskaraz Android Erderaz Windows Erderaz GNU/LINUX Sistema Eragilea Euskeraz Ubuntu Euskaraz We
    Oharra: Android euskaraz Windows euskaraz Android erderaz Windows erderaz GNU/LINUX Sistema Eragilea euskeraz Ubuntu euskaraz Web euskaraz Ubuntu erderaz Web erderaz GNU/LINUX Sistema Eragilea erderaz APLIKAZIOA Bulegotika Adimen-mapak 1 c maps tools 2 free mind 3 mindmeister free 4 mindomo 5 plan 6 xmind Aurkezpenak 7 google slides 8 pow toon 9 prezi 10 sway Bulegotika-aplikazioak 11 andropen office 12 google docs 13 google drawing 14 google forms 15 google sheets 16 libreoffice 17 lyx 18 office online 19 office 2003 LIP 20 office 2007 LIP 21 office 2010 LIP 22 office 2013 LIP 23 office 2016 LIP 24 officesuite 25 wps office 26 writer plus 1/20 Harrobi Plaza, 4 Bilbo 48003 CAD 27 draftsight 28 librecad 29 qcad 30 sweet home 31 timkercad Datu-baseak 32 appserv 33 dbdesigner 34 emma 35 firebird 36 grubba 37 kexi 38 mysql server 39 mysql workbench 40 postgresql 41 tora Diagramak 42 dia 43 smartdraw Galdetegiak 44 kahoot Maketazioa 45 scribus PDF editoreak 46 master pdf editor 47 pdfedit pdf escape 48 xournal PDF irakurgailuak 49 adobe reader 50 evince 51 foxit reader 52 sumatraPDF 2/20 Harrobi Plaza, 4 Bilbo 48003 Hezkuntza Aditzak lantzeko 53 aditzariketak.wordpress 54 aditz laguntzailea 55 aditzak 56 aditzak.com 57 aditzapp 58 adizkitegia 59 deklinabidea 60 euskaljakintza 61 euskera! 62 hitano 63 ikusi eta ikasi 64 ikusi eta ikasi bi! Apunteak partekatu 65 flashcard machine 66 goconqr 67 quizlet 68 rincon del vago Diktaketak 69 dictation Entziklopediak 70 auñamendi eusko entziklopedia 71 elhuyar zth hiztegi entziklopedikoa 72 harluxet 73 lur entziklopedia tematikoa 74 lur hiztegi entziklopedikoa 75 wikipedia Esamoldeak 76 AEK euskara praktikoa 77 esamoldeapp 78 Ikapp-zaharrak berri Estatistikak 79 pspp 80 r 3/20 Harrobi Plaza, 4 Bilbo 48003 Euskara azterketak 81 ega app 82 egabai 83 euskal jakintza 84 euskara ikasiz 1.
    [Show full text]
  • The Music Industry in the Social Networking Era
    THE MUSIC INDUSTRY IN THE SOCIAL NETWORKING ERA By Xi Yue A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF ARTS Telecommunication, Information Studies and Media 2011 Abstract THE MUSIC INDUSTRY IN THE SOCIAL NETWORKING ERA By Xi Yue Music has long been a pillar of profit in the entertainment industry, and an indispensable part in many people’s daily lives around the world. The emergence of digital music and Internet file sharing, spawned by rapid advancement in information and communication technologies (ICT), has had a huge impact on the industry. Music sales in the U.S., the largest national market in the world, were cut in half over the past decade. After a quick look back at the pre-digital music market, this thesis provides an overview of the music industry in the digital era. The thesis continues with an exploration of three motivating questions that look at social networking sites as a possible major outlet and platform for musical artists and labels. A case study of a new social networking music service is presented and, in conclusion, thoughts on a general strategy for the digital music industry are presented. Table of Contents List of Figures................................................................................................................................ iv List of Tables................................................................................................................................... v Introduction....................................................................................................................................
    [Show full text]
  • Convention Program, 2008 Fall 1 Technical Progra M CA
    AAEESS112255th CCoonnvveennttiioonn PPrrooggrraamm Oct ober 2 – 5, 2008 Moscone Convention Center, San Francisco, CA, USA The AES has launched a new opportunity to recognize James D. (JJ) Johnston student members who author technical papers. The Stu - Michael Nunan dent Paper Award Competition is based on the preprint Mike Pappas manuscripts accepted for the AES convention. Tom Sahara Forty-two student-authored papers were nominated. Jim Starzynski The excellent quality of the submissions has made the Speed Network, NFL Films, NPR, and others selection process both challenging and exhilarating. to be announced The award-winning student paper will be honored dur - ing the convention, and the student-authored manuscript NOTE: Program subject to change based on avail will be published in a timely manner in the Journal of the ability of personnel. Audio Engineering Society . Nominees for the Student Paper Award were required Building from the five previous, highly successful Sur - to meet the following qualifications: round Live symposia, Surround Live Six, will once again explore in detail, the world of Live Surround Audio. (a) The paper was accepted for presentation at the Frederick Ampel, President of consultancy Technology AES 125th Convention. Visions, in cooperation with the Audio Engineering Soci - (b) The first author was a student when the work was ety, brings this years event back to San Francisco for the conducted and the manuscript prepared. third time. (c) The student author’s affiliation listed in the manu - The event will feature a wide range of professionals from script is an accredited educational institution. both the televised Sports arena, Public Radio, and the (d) The student will deliver the lecture or poster pre - digital processing and encoding sciences.
    [Show full text]
  • Ernesto Corrêa ( Nei.Son Dimas Ôrgao Dos "D
    40 Pgs. NCr$ 0,30 DIÁRIOI DE NOTICIASI 8. A DIÁRIO DE NOTICIAS "DIÁRIOS ÔRGAO DOS PONLS. Snperlnlendftnrta DIRETORES < ERNESTO CORRÊA ASSOCIADOS" FUNDADO â 1* DE MARÇO DE U)2& — 438*1; Hut»e- Ma#,i Reíiçái. - ( NEI.SON DIMAS Iínrtí T t-JSWI , M|2J| ANO XLIIIPÕRTO ALEGRE, DOMINGO, 4 DE JUNHO CircmUt&O - 4-SM4- l-ubllrlilad, _ DE 1967 N.° 77 ITUSt Administração j-jdjj. GRE CRENAL LEVA TODOo MUNID IMPICO ¦ESPORTES' Russos no rumo da guerra O ATAQUE FEMI1SIISO ISTAMBUL, PORT SAID, TEL de perança .que a crise no Oriente "NICANOR"HICANOR AVIV, WASHINGTON, PARIS, MON- Médio seja resolvida pelo caminho VAI TREAL E NAÇÕES UNIDAS, 3 (Con. da diplomacia, não afastando, en. — DIZfRTUDO dentado do noticiário da FP) Trés tretanto, a hipótese do emprégo da DIZf R TUDO navio* soviéticos, armados com fo- fôrça, se as não propostas pacíficas o0 QUE DEVE" guetes, passaram hoje pelo estreito conseguirem romper o bloqueio de. A propósitopropdsito de uma do Bòsforo, na Turquia, rumo ao Me. nota. chamada cretado pelos egfpcios, no Gâlfo de publl cada na l.a páginapaglna diterrâneo, continuando assim a mo- Akaba. do DIÁRIODIARIO DE NO vimentação da marinha russa TICIAST1CIAS de domingo para Em Paris, o general De Gaulle passado,passado. sob o titulotltulo Oriente Médio, depois da voltou "Nlcanor garantia a pedir uma arbitragem dos Vai Dlier "quatro 1 de Irrestrito apoio aos árabes no con. Tudo o Que Deve" grandes", para contornar a recebemo-recehemo- oficiooflclo do flito com os israelenses. possibilidade de um conflito armado sr. RubiRub' M D.ehl ins-ins.
    [Show full text]
  • Evaluating Effectiveness of Mobile Browser Security Warnings
    ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, SEPTEMBER 2016, VOLUME: 07, ISSUE: 03 DOI: 10.21917/ijct.2016.0203 EVALUATING EFFECTIVENESS OF MOBILE BROWSER SECURITY WARNINGS Ronak Shah1 and Kailas Patil2 1,2Department of Computer Engineering, Vishwakarma Institute of Information Technology, India E-mail: [email protected], [email protected] Abstract utmost goal of this paper is to investigate whether modern mobile This work precisely evaluates whether browser security warnings are browser security warnings protect users in practice. as ineffective as proposed by popular sentiments and past writings. This According to previous study, more than 50% users click research used different kinds of Android mobile browsers as well as through SSL warnings and simply ignore security measures [1]. desktop browsers to evaluate security warnings. Security experts and There are many reasons why user ignores security warnings, SSL developers should give emphasis on making a user aware of security warnings and should not neglect aim of communicating this to users. warnings and other security related warnings. Lot of work has Security experts and system architects should emphasis the goal of done on desktop browsers but still there is no effective work has communicating security information to end users. In most of the been done in case of mobile browsers. browsers, security warnings are not emphasized, and browsers simply Unfortunately, most of the mobile browsers did not show any do not show warnings, or there are a number of ways to hide those security warnings while assessing through site which has a weak warnings of malicious sites. This work precisely finds that how encryption key, a site with an invalid certificate, a site with inconsistent browsers really are in prompting security warnings.
    [Show full text]
  • What Is the Best Download Browser for Android How to Set a Default Browser on Android
    what is the best download browser for android How to Set a Default Browser on Android. This article was written by Nicole Levine, MFA. Nicole Levine is a Technology Writer and Editor for wikiHow. She has more than 20 years of experience creating technical documentation and leading support teams at major web hosting and software companies. Nicole also holds an MFA in Creative Writing from Portland State University and teaches composition, fiction-writing, and zine-making at various institutions. The wikiHow Tech Team also followed the article's instructions and verified that they work. This article has been viewed 4,187 times. This wikiHow teaches you how to change your Android’s default web browser to another app you’ve installed. Best Fastest Android Browser Available On Play Store 2021. Anyone know, what’s powering the Smartphone? Battery! No. Well, that’s the solution first involves your mind right. But the solution is the INTERNET. Yes without the internet what’s the purpose of using a smartphone. So to interact with the internet, we’d like some kinda tool, that features an interface. Here comes the BROWSER. Its main job is to attach us to the web . Fastest Android Browser. So why not we just look for Browser and install any random browser from play store and begin interacting with the internet. And why there are numerous Browsers to settle on from, confused right? Yeah, there are many Browsers with its unique features aside from just surfing the web. And now we’re only getting to mention Speed here because everyone loves Fast browsing experience.
    [Show full text]
  • Mobile Security 2015
    Product Review: Mobile Security 2015 www.av-comparatives.org AV-Comparatives Mobile Security Review Language: English August 2015 Last revision: 17th September 2015 www.av-comparatives.org Product Review: Mobile Security 2015 www.av-comparatives.org Contents Overview ............................................................... 6 Products tested ...................................................... 8 Battery usage ......................................................... 9 Protection against Android malware ......................... 11 AVC UnDroid Analyser ............................................. 11 Test Set & Test Results ........................................... 12 Android Security .................................................... 14 AVG AntiVirus ........................................................ 16 AhnLab V3 Mobile Security ...................................... 19 Antiy AVL for Android ............................................. 22 Avast Mobile Security ............................................. 24 Avira Antivirus Security .......................................... 28 Baidu Mobile Guard ................................................ 31 Bitdefender Mobile Security and Antivirus ................. 34 CheetahMobile Clean Master .................................... 37 CheetahMobile CM Security Antivirus ........................ 40 ESET Mobile Security .............................................. 44 G Data Internet Security ......................................... 47 Kaspersky Internet Security ....................................
    [Show full text]
  • Dolphin Browser Request Desktop Site
    Dolphin Browser Request Desktop Site Glossy Parry decays his antioxidants chorus oversea. Macrobiotic Ajai usually phenomenalizing some kinos or reek supinely. Felicific Ramsay sequesters very sagittally while Titos remains pyogenic and dumbstruck. You keep also half the slaughter area manually, by tapping on the screen. You can customize your cookie settings below. En WordPresscom Forums Themes Site by link doesn't work on. Fixed error message in Sync setup sequence. The user agent is this request header a grade of metadata sent west a browser that. Dolphin For Android Switch To stock Or Mobile Version Of. Fixed browser site is set a clean browser? 4 Ways to turning a Bookmark Shortcut in contemporary Home Screen on. What gear I say? Google Chorme for Android offers this otherwise known as Request that site. The desktop version of gps in every data, its advanced feature. It is dolphin browser desktop sites from passcards and loaded. Tap on account settings screen shot, dropbox support the best android browser desktop site design of ziff davis, gecko include uix. But, bush too weary a premium service. Store only hash of potato, not the property itself. Not constant is Dolphin Browser a great web browser it also needs a niche few. Download Dolphin Browser for PC with Windows XP. Dolphin browser Desktop Mode DroidForumsnet Android. For requesting the site, which you use is not, identity and telling dolphin sidebar function to manage distractions and instapaper sharing menu. Note If for desktop version of iCloudcom doesn't load up re-type wwwicloudcom in the address bar. This already horrible ergonomics.
    [Show full text]
  • Indonesia Most Popular Mobile Browser Apps 2014
    Indonesia Most Popular Mobile Browser Apps 2014 Omnibus Popular Brand Index Date: December 2014 A. Detail findings 1. Popular Brand Index 2. Brand awareness 3. Expansive 4. Frequent User 5. Future Intention 6. Switching 7. General Information 2 A. Detail findings 1.1. Popular Brand Index Concept One of the most important Assets of the company and represent identity of a company is the Brand. "Brand or trademark is a name or symbol that is associated with the product/service and Top of Mind cause psychological meaning/association". In addition, the brand (TOM) also as a promotional tools, so that a product with certain brand would likely gain popularity or awareness in the community level that will affect consumer behaviour in the community. To determine organization performance we could see from POPULAR development of the brand. W&S study based on development of Future BRAND Expansive PBI (Popular Brand Index) concept which included community top Intention INDEX (PBI) of mind brand, expansive or spread of the brand, total purchase or last used of the brand, and consumer intention to purchase brand. Last Used 푃퐵퐼 = 푤1 ∙ 푇푂푀 + 푤2 ∙ 퐸푥푝푎푛푠푖푣푒 + 푤3 ∙ 퐿푎푠푡푈푠푒푑 + 푤4 ∙ 퐼푛푡푒푛푡푖표푛 Additional Information : • Top of Mind (TOM) = First brand mentioned by respondents. • Expansive = Scope and spread of brand. • Last Used/ Market Share = Total purchase or last used brand in past 3 months. • Future Intention = Consumer intention to purchase brand. 3 A. Detail findings 1.2. Popular Brand Index Results (PBI) PBI is obtained by the Internet sampling (Online Panel) and with samples of 1400 respondents in the W&S database Indonesia (nusaresearch).
    [Show full text]
  • Browser Terbaik 2020 Android
    Browser terbaik 2020 android Continue When it comes to browser apps, there are currently many options in the app store, such as the Google Play Store or the App Store. From legendary browsers such as Google Chrome, Opera, Firefox, to other browser apps that are starting to show teeth, such as Dolphin, Apus and more. But, of the many browser apps available today, unfortunately, few of them offer fast internet gangs. Well, for those of you who are looking for the fastest browser app, this article Jaka will give you some recommendations nih, gang. Let's check the next article! The fast speed of the App 2020 browser browser is important, although there are actually several other factors that affect the speed of the browser, such as internet connection, the device used, and the location when accessing the Internet. However, each browser app now comes with some of the best featured features to interest you in using it. There are some that prioritize fast connections to download and download, some focus on creating speed while watching only. Instead of being curious, here are some of the fastest web browser app recommendations that you should have. 1. Google Chrome, Google Chrome Most popular browser App is one of the most popular browser applications and is widely used today on both HP devices and PCs. Rated as one of the fastest browser apps, Google Chrome provides many interesting features such as Google Secure Browsing, access to downloaded content offline, and more. In addition, the browser app also has a data saver feature that is said to be able to save up to 60% of the data with the function of compression of text, images, videos and sites, without reducing its quality, gangs.
    [Show full text]
  • Music Business Handbook from Berkleemusic.Com
    MUSIC VOL B U S I N E S S HANDBOOK 2 2 M U S I C VOL BUSINESS HANDBOOK 2 PAGE TOPIC Attention Music Managers and Artists: You May Be 3 Owed BILLIONS in Unpaid Royalties by Dave Kusek Living in the Past Beats Dying in the Present 8 by Eric Beall Sponsorship: An Artist’s Answer to Financial 12 Relief by John Czajkowski & Jeff Dorenfeld Copyright Law and Online Music Royalty Structures 15 by Allen Bargfrede Releasing an Album in 2011 and Beyond 19 by Jon Vanhala Entrepreneurship: Lessons Learned from Start-Ups 22 by Peter Gotcher Using Fan-Funding Techniques to Help Direct a 25 Direct-to-Fan Marketing and Sales Campaign by Mike King www.berkleemusic.com 3 TOPIC Attention Music Managers and Artists: You May Be Owed BILLIONS in Unpaid Royalties by Dave Kusek Attention Music Living in the Past Beats Dying in the Present by Eric Beall Managers and Artists: Sponsorship: An Artist’s Answer to Financial You May Be Relief by John Czajkowski & Jeff Dorenfeld Owed BILLIONS in Copyright Law and Online Music Royalty Structures by Allen Bargfrede Unpaid Royalties Releasing an Album in 2011 and Beyond By Dave Kusek by Jon Vanhala If you are a recording artist or a manager and have been distributing music on iTunes under a Entrepreneurship: Lessons Learned from Start-Ups deal with one of the big record labels, pay attention. by Peter Gotcher F.B.T. Productions in Detroit, the producers who helped Eminem achieve his success are Using Fan-Funding Techniques to Help Direct a paving the way via a lawsuit against Universal Music and others, to larger payouts for digital Direct-to-Fan Marketing and Sales Campaign music sales via iTunes and other digital services both past and future.
    [Show full text]
  • Ipad Air E Ipad Mini Retina I Due Tablet Apple Del 2014
    estratto da dday.it n.78 / 4 NOVEMBRE 2013 Ora è ufficiale Lumia 2520 è La “vera” novità La visione Panasonic dà addio il primo tablet Apple è il software e il coraggio al plasma 10 di casa Nokia 18 gratuito 26 II mondo della consumer electronics non sa più sognare. E chi non sa so- gnare non fa sognare. Sono gli effetti della crisi; o meglio, bisognerebbe dire delle crisi. Sulla crisi economica si innesta quella creativa: due mostri che si alimentano l’un con l’altro. L’attenzione spasmodica ai costi iPad Air e iPad Mini Retina deprime gli investimenti; fa sparire il coraggio dai laboratori di ricerca, quando proprio non fa sparire i laboratori tutti interi. La mancanza I due tablet Apple del 2014 di nuove idee deprime gli acquisti; ma prima ancora delle nuove idee, manca lo stimolo al mercato, i negozi si impoveriscono, le fiere non iPad cambia design e diventa iPad Air esistono più, le riviste di settore sono spesso considerate (dagli operatori) mentre il Mini ottiene il display Retina superflue. I negozi fanno sparire dagli scaffali le merceologie che ruotano meno velocemente, ma Entrambi usano il processore a 64 bit, non inseriscono nuovi prodotti dal futuro promettente con sufficiente coraggio semplicemente perché lo stesso di iPhone 5S non sono ancora diffuse e popolari. Serve visione. Visione e coraggio. Le due cose si alimentano l’una con l’altra: se si riesce a leggere i trend di mercato e le tecnologie 17 promettenti, si diventa anche più coraggiosi negli investimenti e nelle scommesse. Senza visione, si I costi “nascosti” del cambio gestore ADSL diventa cauti, se non addirittura spaventati.
    [Show full text]