+353-1-416-8900REST OF WORLD
1-800-526-8630U.S. (TOLL FREE)

Internet Security: Strategic Market Options And Forecasts To 2001

  • ID: 32345
  • Report
  • January 1996
  • Region: Global
  • 450 pages
  • Wintergreen Research, Inc
1 of 4
Internet security markets are poised to grow as firewalls, encryption, messaging, and servers are implemented using a range of systems architectures. Market growth is being fueled by the need for transmission of transaction data and preservation of data integrity. Systems architectures are being impacted by the need for integration of security functions.

Internet Security systems depend on fundamental architecture. Two different security architectures are general perimeter protection and discrete but logically independent domains. New architectures will support administrative protection at multiple levels of the enterprise. The rise of the Internet has posed the problem of protecting against external intrusion into the enterprise network. Discrete but logically independent domains within the enterprise need bi-directional protection from within the network as well as from external threat.

If the Internet is to support $20 billion of purchases by 2000, security must be possible, implemented, and believable. The AT&T SecureBuy program which guarantees secure transactions over the Internet represents an early Internet initiative poised to reap the benefit of large market share early. Suppliers to this and other Internet initiatives are developing a market leadership position that will be difficult to dislodge by competitors that come later.

Internet market explosive growth is stimulating the need for data security. Now is the time to achieve a presence in Internet security markets, before the market leaders become entrenched, while the rapid growth phase is still occurring.

$500 million markets in 1996 are expected to exceed $5 billion by 2001 as Internet home pages begin to be used for commerce. This report provides insight about strategic market options in the context of the following:

- Security as migration to distributed computing systems occurs
- Security as data is transferred from the client directly into mission critical central computing systems
- Impact of Internet security on development of Internet commercial markets
- Rate of use of Internet by consumers increases
- Speed of adoption of Internet by enterprise increases
- Impact on security architecture as Internet servers are located close to content developers
- Support of Internet in driving development of new applications
- Impact of hybrid fiber optic / coax communications transport lines
- Impact of implementation of broadband communications infrastructure
- Impact of implementation of ATM switching systems

The Study Addresses:

- Market strategies for participating in high growth Internet security market segments
- Strategic positioning of Internet security product providers
- Market directions and strategic market alliances
- Risk/reward scenarios -- access to existing customer bases
- Strategies for success

The following companies are profiled in this report:

- ANS
- Axent
- Bluestone
- Candle
- Checkpoint
- Cheyenne
- CKS Software
- Cybersafe
- Cygnus Support
- Digex
- Dynasoft
- Fischer
- Frontier
- Gandalf
- Gradient
- Haystack LAB
- Hewlett-packard
- IBM
- Tivoli Systems
- Mcafee Associates
- Memco Software
- Mergent
- Microcom
- Microsoft
- Milkyway Networks
- Netscape
- Oracle
- Pacific Bell
- Pretty Good
- Price Waterhouse
- Process Software
- Psinet
- Raptor
- Santix
- Security Dynamics
- RSA Data Security
- Shiva
- Softbank Corp
- Trend Micro
- SOS Corporation
- Spider
- SUN Microsystem
- Symantec
- Utimaco Safeware
- Verity
- Wind River Systems
- Xylogics
- 3COM

This report consists of over 450 pages and includes 105 tables and figures.
READ MORE
Note: Product cover images may vary from those shown
2 of 4

Loading
LOADING...

3 of 4
TABLE OF CONTENTS:

Executive Summary

1. MARKET DEFINITION

Internet commerce

Telecommuting

Types of networks

Security solutions

Firewalls

User authentication

Tokens

Audit trails

Uses of Internet security

Internet and Intranet

Encryption

Graphical management

Software distribution

2. MARKET FORECASTS

Market driving forces

Summary forecasts

Internet market profile

Users/access/servers

Penetration analysis

Internet and Intranets

Navigation

Virtual private networks

Firewalls

Token authentication

Server authentication

Anti virus protection

Encryption

Central audit

Middleware messaging

Market growth factors

Antivirus products

Digital signatures

PBX security

3. PRODUCTS

Firewalls

Interlocks

Firewall functions

Firewall limitations

Basic types of firewalls

Checkpoint Software

Raptor

Gradient technologies

Token-based security

Security Dynamics ID

Secure Computing

Digital Pathways

Encryption

RSA encryption capability

Internet servers

Secure browsers

Cybersafe corporation

Virus protection

Mcafee Associates

Symantec/Norton

Softbank/Trend Micro

Messaging middleware

System management

Hewlett-Packard

Tivoli

Digital signatures

Utimaco Safeware

PBX security

Ottawa Telephony Group

4. ARCHITECTURE INFRASTRUCTURE

Internet architectures

Security architecture

Rule based models

Intranet benefits

Intranet risks

Security auditing

Internet

Browser security

Sophisticated mail

Web security tools

Web wireless software

Virtual private networks

Applications (APIS)

5. COMPANY PROFILES

6. INTERNET SECURITY APPLICATIONS

Mobile and telecommuting

Intranet

Store-and-forward mail

Online information

Sales applications

Human resources

Internet banking

Technical support/help

Network security services

IBM MQSeries Internet

AT&T securebuy services

Pacific Bell network

ANS

System administration

Tasks/Administration

Note: Product cover images may vary from those shown
4 of 4
Note: Product cover images may vary from those shown
Adroll
adroll