SYS-CON MEDIA Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, Ian Khan

News Feed Item

Infonetics: Cisco Gobbles SourceFire, Gains Share in Network Security Market

Market research firm Infonetics Research released excerpts from its 4th quarter 2013 (4Q13) and year-end Network Security Appliances and Software report, which tracks integrated security appliances, secure routers, SSL VPN gateways, VPN and firewall software, and IDS/IPS products.

ANALYST NOTE

Cisco completed its acquisition of Sourcefire in the fourth quarter of 2013, and in the process posted its highest security revenue quarter ever, gaining three points of market share,” says Jeff Wilson, principal analyst for security at Infonetics Research.

Wilson continues: “The network security market nearly hit double-digit growth in 4Q13, and we expect growth to accelerate this year as service providers and enterprises increase security investment to improve security performance and keep up with a changing threat landscape.”

NETWORK SECURITY MARKET HIGHLIGHTS

  • The global network security appliance and software market grew 9.8% from 3Q13 to 4Q13, to $1.8 billion
  • For the full year 2013, network security revenue totaled $6.4 billion, a 2.6% increase over 2012
  • Integrated security products (integrated security appliances, secure routers, SSL VPN gateways, and VPN and firewall software) make up the majority of revenue
  • Looking at the top 3 vendors' quarter-over-quarter (4Q13 vs 3Q13) performance, Cisco increased overall revenue 20%; Check Point had a typically strong 4th quarter, and Juniper posted its second consecutive quarter of growth
  • Palo Alto Networks and Fortinet once again posted strong quarter-over-quarter and year-over-year growth in 4Q13, and are well positioned to continue gaining share
  • Infonetics forecasts the worldwide network security market to reach $7.3 billion in 2018, a 2013–2018 CAGR of 2.5%

SECURITY ANALYST CONFERENCE CALL FOR CLIENTS

Clients, log in to view on-demand Jeff Wilson’s quarterly network security market recap and outlook: https://www.infonetics.com/cgp/login.asp?id=897

SECURITY WEBINAR

View on-demand security analyst Jeff Wilson’s Using Big Data Analytics to Amplify Security Intelligence webinar, a primer for enterprises and service providers looking to use big data to detect, mitigate, and prevent malicious attacks:

http://w.on24.com/r.htm?e=752135&s=1&k=0982A14627EA5282D4986F686F78F03E

NETWORK SECURITY REPORT SYNOPSIS

Infonetics’ quarterly network security report provides worldwide and regional market size, vendor market share, forecasts through 2018, analysis, and trends for integrated security appliances, secure routers, SSL VPN gateways, VPN and firewall software, and IDS/IPS products. Vendors tracked: Alcatel-Lucent, Array Networks, CA, Check Point, Cisco, Citrix, D-Link, Extreme Networks, eSoft, F5, Fortinet, GTA, HP, Huawei, Intrusion, ISS, Juniper, McAfee, NetASQ, Palo Alto Networks, SonicWall, Sourcefire, Stonesoft, WatchGuard, ZyXel, and others. To buy the report, contact Infonetics: http://www.infonetics.com/contact.asp.

RELATED REPORT EXCERPTS

RECENT AND UPCOMING SECURITY RESEARCH

Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at http://www.infonetics.com/login.

INFONETICS WEBINARS

Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

  • Virtualizing Networks with SDN NVOs and Bare Metal Switches (Mar. 25: Attend)
  • The Increasing Threat of Compromised Web Servers and How to Mitigate It (Apr. 2: Attend)
  • Security at the Speed of VoLTE (Apr. 10: Attend)
  • Using Big Data Analytics to Amplify Security Intelligence (View on-demand)
  • Redefining Network Security Performance: The Speed You Really Need (View on-demand)
  • Data Center Firewalls: The New Performance Requirements (View on-demand)
  • DDoS Mitigation Strategies: What's Next (June 10: Sponsor)
  • Protecting Infrastructure Control Systems from Cyber Attacks (Aug. 14: Sponsor)

TO BUY REPORTS, CONTACT:

N. America (West), Asia Pacific: Larry Howard, [email protected], +1 408-583-3335

N. America (East, Midwest), L. America: Scott Coyne, [email protected], +1 408-583-3395

EMEA, India, Singapore: George Stojsavljevic, [email protected], +44 755-488-1623

Japan, South Korea, China, Taiwan: http://www.infonetics.com/contact.asp

ABOUT INFONETICS

Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
It's time to put the "Thing" back in IoT. Whether it’s drones, robots, self-driving cars, ... There are multiple incredible examples of the power of IoT nowadays that are shadowed by announcements of yet another twist on statistics, databases, .... Sorry, I meant, Big Data(TM), tiered storage(TM), complex systems(TM), smart nations(TM), .... In his session at WebRTC Summit, Dr Alex Gouaillard, CTO and Co-Founder of Temasys, will discuss the concrete, cool, examples of IoT already happening tod...
SYS-CON Events announced today that Site24x7, the cloud infrastructure monitoring service, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Site24x7 is a cloud infrastructure monitoring service that helps monitor the uptime and performance of websites, online applications, servers, mobile websites and custom APIs. The monitoring is done from 50+ locations across the world and from various wireless carr...
ScriptRock has been included in the list of "Cool Vendors" in the "Cool Vendors in DevOps 2015" report by Gartner, Inc.* ScriptRock provides visibility into the configuration state of an organization's IT environments, enabling the continuous delivery of mission critical services. For enterprises where downtime is not an option, ScriptRock's system-wide overwatch offers the assurance that misconfigurations and anomalies are caught before they affect the business. By satisfying this fundamental ...
What exactly is a cognitive application? In her session at 16th Cloud Expo, Ashley Hathaway, Product Manager at IBM Watson, will look at the services being offered by the IBM Watson Developer Cloud and what that means for developers and Big Data. She'll explore how IBM Watson and its partnerships will continue to grow and help define what it means to be a cognitive service, as well as take a look at the offerings on Bluemix. She will also check out how Watson and the Alchemy API team up to off...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...
While Docker continues to be the darling of startups, enterprises and IT innovators around the world, networking continues to be a real mess. Indeed, managing the interaction between Docker containers and networks has always been fraught with complications. Without automation in networking, the vision of running Docker at scale and letting IT run the same apps unchanged on the laptop and in the data center or for any cloud cannot be realized.
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
"SOASTA built the concept of cloud testing in 2008. It's grown from rather meager beginnings to where now we are provisioning hundreds of thousands of servers on a daily basis on behalf of customers around the world to test their applications," explained Tom Lounibos, CEO of SOASTA, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Recent technology advances in miniaturization has positioned the wearables as the pinnacle of technology convergence with the human body. We inquire if wearables are mere standard miniaturized devices extended with the connectivity and present our views on considerations like design, applications, performance, efficiency, interoperability, usage scenarios, human device interaction and consequent trade-offs enabling wearables to impart optimal value.