Research And Markets Research And Markets
0 CHECKOUT

Firewalls Everywhere! Firewall and VPN Market Opportunities, Market Forecasts and Market Strategies, 2003-2008

  • ID: 34160
  • February 2003
  • Region: Global
  • 440 pages
  • Wintergreen Research, Inc
1 of 3

Firewalls are an integral part of any security architecture. Firewalls enable businesses to build and deploy reliable, scalable e-business applications.
Firewalls offer a complete security platform for Web and wireless e-commerce applications. Firewalls include support for Web servers, enterprise servers, Internet security, database access, and distributed transaction management servers. They have some tools for developing applications.

Firewall and VPN market share analysis indicates that Cisco is the overall market leader. Cisco has 42% of the market followed by Check Point Software Technologies with 26% market share in the first three quarters of 2002.

Worldwide firewall, VPN, and routers with integrated security shipment forecast analysis indicates that markets at $2.1 billion in 2002 are expected to reach $11.1 billion by 2008. As the Internet continues its steady climb toward ubiquitous use, security becomes more significant. Firewalls can protect the perimeter of a network in any location, on any size system.

The following key topics are addressed in this report:

- Firewall Security System Issues And Aspects
- Uses Of Internet Security
- READ MORE >

Note: Product cover images may vary from those shown
2 of 3

TABLE OF CONTENTS:

FIREWALL AND VPN EXECUTIVE SUMMARY ES-1

Firewall and VPN Market Driving Forces ES-1

Security System Issues And Aspects ES-3

Securing Data Resources ES-4

Summary Firewall and VPN Market Share Analysis ES-4

Summary Firewall And VPN Market Forecasts ES-6

Market Growth Factors ES-8

1. INTERNET SECURITY FIREWALL MARKET DESCRIPTION 1-1

1.1 Firewall Security System Issues And Aspects 1-1

1.1.1 Securing Data Resources 1-1

1.2 Mainframe Clustered Systems As the Model For Internet Security Systems 1-4

1.3 Uses Of Internet Security 1-5

1.4 Firewall Security Products 1-7

1.5 Layers of Application Integration 1-7

1.6 Web Services Positioning 1-15

1.7 Business Imperatives 1-17

1.8 E-Business Platforms 1-18

1.9 Syndication As a Business Model 1-18

1.10 Business Process Management Platforms 1-19

1.11 Business Processes Use Web Services 1-21

1.12 Customer-Centric, Agile Enterprise 1-22

1.13 Managing Transactions in a Distributed Environment 1-24

1.14 Exchanging Information 1-27

1.15 Application Building 1-27

1.16 Software And Platform Interoperability 1-28

1.16.1 Role Of Distributed Transaction Processing 1-28

1.16.2 Transaction-Processing Solution 1-30

1.17 Internet Revolution 1-30

1.18 Business Requirements For Information Security 1-31

1.19 Network Context 1-36

1.20 Siege Problem 1-37

1.21 Internet Commerce 1-39

1.22 Telecommuting 1-40

1.23 Types Of Networks 1-42

1.24 Internet And Intranet Strategy 1-44

2. FIREWALL AND VPN MARKET SHARE ANALYSIS AND MARKET FORECASTS 2-1

2.1 Firewall and VPN Market Segments 2-1

2.2 Firewall and VPN Market Driving Forces 2-2

2.3 Market Growth Factors 2-4

2.4 E-Commerce Target Markets 2-6

2.5 Summary Firewall and VPN Market Share Analysis 2-8

2.6 Summary Firewall And VPN Market Forecasts 2-10

2.6.1 VPN Market Segment Analysis 2-12

2.7 Firewall Market Share Analysis 2-15

2.8 Firewall Key Features 2-18

2.8.1 Cisco IOS Firewall Feature Set 2-19

2.9 Firewall Market Forecasts 2-24

2.10 VPN Market Description 2-29

2.10.1 IP-based Virtual Private Networks (VPN) 2-30

2.11 VPN Market Shares 2-30

2.12 VPN Market Forecasts 2-33

2.12.1 VPN Unit Market Forecast Analysis 2-39

2.13 VPN Regional Market Analysis 2-42

2.14 Security Enabled Router Forecast 2-42

3. INTERNET SECURITY FIREWALL PRODUCTS 3-1

3.1 Firewalls 3-1

3.1.1 Firewall Functions 3-1

3.1.2 Firewall Limitations 3-5

3.1.3 Basic Types Of Firewalls 3-5

3.1.4 Secure Internet Communications 3-7

3.1.5 Firewall Variables 3-7

3.2 Cisco 3-9

3.2.1 Cisco IOS Firewall 3-9

3.2.2 Cisco PIX Firewall 3-11

3.2.3 Cisco PIX 525 Firewall 3-16

3.2.4 Cisco PIX 515E Firewall 3-19

3.2.5 Cisco PIX 506E and 501 Firewalls 3-21

3.2.6 Cisco Systems Cisco PIX Firewall 520 3-26

3.3 Check Point Software Technologies 3-26

3.3.1 Check Point FireWall-1 3-27

3.3.2 Checkpoint Meta IP 3-29

3.3.3 Check Point Provider-1 3-29

3.3.4 Check Point VPN-1 3-30

3.3.5 Key Solutions 3-31

3.3.6 Entrust/PKI 3-37

3.3.7 Check Point Software Technologies (Firewall-1) 3-38

3.3.8 SofaWare Technologies 3-41

3.4 Axent Technologies / Raptor Firewall 3-42

3.4.1 AXENT Technologies Raptor Firewall 3-46

3.5 CyberGuard Firewall 3-48

3.6 Secure Computing SecureZone 3-49

3.7 NetScreen Technologies 3-50

3.7.1 NetScreen-5000 3-50

3.7.2 NetScreen-1000 3-54

3.7.3 NetScreen-500 3-56

3.7.4 NetScreen-100 3-60

3.7.5 NetScreen Appliances 3-61

3.7.6 NetScreen Remote 3-62

3.8 Lucent 3-64

3.8.1 Lucent VPN Firewall Brick 3-64

3.9 Symantec 3-66

3.9.1 Symantec Desktop Firewall 3-67

3.9.2 Symantec Enterprise Firewall 7.0 3-68

3.9.3 Symantec VelociRaptor 3-72

3.10 F-Secure 3-74

3.10.1 F-Secure Distributed Firewall 3-74

3.11 McAfee Desktop Firewall 7.5 3-75

3.11.1 Desktop Firewall ASaP 3-77

3.12 Cyberguard 3-78

3.12.1 CyberGuard LX 3-78

3.12.2 CyberGuard FS 3-79

3.12.3 CyberGuard KS 3-79

3.12.4 CyberGuard SL 3-79

3.12.5 CyberGuard High Availability Firewall Solution 3-79

3.13 Netguard 3-82

3.13.1 NetGuard GuardianPro 3-84

3.13.2 Guardian Firewall 3-86

3.13.3 NetGuard GuardianPro eNT 3-88

3.14 IBM 3-89

3.15 VPNs 3-90

3.15.1 Checkpoint VPN-1 3-91

3.16 Watchguard 3-92

3.16.1 Application Security Proxies 3-94

3.16.2 SMTP Proxy 3-95

3.16.3 HTTP Proxy 3-96

3.16.4 FTP Proxy 3-97

3.16.5 DNS Proxy 3-98

3.16.6 H.323 Proxy 3-98

3.16.7 RTSP Proxy 3-99

3.16.8 SOHO Management 3-99

3.16.9 Firebox III Management 3-100

3.16.10 Firebox Monitors 3-100

3.16.11 Logging and Notification 3-101

3.16.12 WebBlocker Web Content Filtering 3-101

3.16.13 HostWatch 3-102

3.16.14 Firebox Vclass 3-104

3.17 SonicWALL 3-105

3.17.1 SonicWALL TELE3 Overview 3-106

3.17.2 SonicWALL TELE3 TZ 3-107

3.17.3 SonicWALL TELE3 SP 3-108

3.17.4 SonicWALL SOHO3 Overview 3-109

3.17.5 SonicWALL PRO 100 3-110

3.17.6 SonicWALL PRO 200 3-111

3.17.7 SonicWALL PRO 300 Overview 3-112

3.17.8 PowerVPN Server 3-114

3.17.9 Symantec Enterprise VPN 3-114

3.17.10 WatchGuard Firebox Management VPN Manager 3-116

3.17.11 SonicWALL GX Series 3-118

3.17.12 CyberGuard VPN 3-119

3.17.13 Netguard 3-121

3.17.14 Nokia IP Network Security Solution 3-123

3.17.15 Adtran 3-124

3.17.16 NetVanta 2100 3-126

3.17.17 NetVanta 2300 3-127

3.17.18 NetVanta 2400 3-128

3.17.19 Microsoft 3-130

3.18 Remote-Access VPN 3-132

3.18.1 ActiveLane 3-132

3.18.2 ActiveLane's Secure Virtual Private Network Server 3-132

3.18.3 Web Administration 3-135

3.18.4 ActiveLane Products 3-137

3.19 Intrusion Detection 3-138

3.19.1 Intrusion 3-138

3.19.2 SecureNet Pro 3-139

3.19.3 SecureNet Provider 3-139

3.19.4 SecureNet 7000 Security Appliance 3-140

3.19.5 SecureNet 5000 Security Appliance Series 3-141

3.19.6 SecureNet 2000 Security Appliance Series 3-142

3.19.7 Intrusion SecureNet SP 3-142

3.19.8 Intrusion SecureNet SME System 3-143

3.19.9 Proactive Host Intrusion Protection 3-143

3.19.10 SecureHost Series 3-144

3.19.11 SecureNet Provides 3-145

3.19.12 eTrust Intrusion Detection 3-145

3.19.13 eTrust Defense 3-146

3.20 Firewall System Management Products 3-147

3.20.1 Checkpoint FireWall-1 / SiteManager-1 3-147

3.20.2 Nokia Intrusion Detection 3-147

4. FIREWALL TECHNOLOGY 4-1

4.1 Network Security 4-1

4.2 Firewall Is Positioned Between Networks 4-1

4.3 Need For A Firewall 4-2

4.4 Firewall Technology 4-2

4.4.1 Packet Filters 4-3

4.4.2 Application-Layer Gateways 4-3

4.5 Rapid Technological Change 4-3

4.5.1 Internet Security Infrastructure Architecture 4-4

4.5.2 Stateful Inspection 4-5

4.5.3 Stateful Inspection Technology 4-5

4.5.4 Check Point Secure Virtual Network (SVN) Architecture 4-6

4.6 Open Platform for Security (OPSEC) 4-8

4.7 Message Oriented Middleware 4-9

4.7.1 IBM WebSphere Middleware Messaging Product De Facto Industry Standard 4-10

4.8 Multicast Application Software 4-11

4.8.1 Publish / Subscribe 4-11

4.8.2 Tibco 4-13

4.8.3 Tibco Rendezvous 4-14

4.8.4 Tibco Rendezvous Benefits 4-15

4.8.5 Tibco Rendezvous Architecture 4-15

4.8.6 Tibco Rendezvous Platforms 4-16

4.9 Linux 4-16

4.10 ISAKMP 4-16

4.10.1 Oakley 4-17

4.11 IPsec 4-17

4.12 Internet System Architectures 4-19

4.13 Security Architecture 4-23

4.13.1 Rule Based Models 4-26

4.14 Network Benefits 4-31

4.15 Network Risks 4-32

4.16 Security Auditing 4-35

4.17 Internet 4-40

4.17.1 Browser Security Architectures 4-43

4.17.2 Sophisticated Mail Processing 4-44

4.17.3 Web Authoring Security Tools 4-45

4.17.4 Web Wireless Software 4-45

4.18 Virtual Private Networks 4-46

4.19 Application Programming Interfaces (APIs) 4-47

4.20 Export Regulation 4-48

5. FIREWALL AND VPN COMPANY PROFILES 5-1

5.1 3Com Corporation 5-1

5.1.1 Business Networks Company 5-2

5.1.2 3Com Revenue 5-4

5.1.3 3Com Sales By Segment: 5-4

5.2 Alcatel 5-5

5.3 Asita Technologies 5-7

5.4 Avaya Communication 5-8

5.4.1 Avaya Operating Segments 5-9

5.4.2 Converged Systems And Applications Segment 5-9

5.4.3 Avaya Customer Relationship Management 5-12

5.5 Check Point Software Technologies 5-12

5.5.1 Check Point Software Technologies Revenue 5-13

5.5.2 Check Point Products 5-17

5.5.3 Check Point Target Markets 5-17

5.5.4 Checkpoint Software Partners 5-18

5.6 Checkpoint Systems 5-19

5.6.1 Checkpoint Business Strategy 5-21

5.7 CyberGuard 5-21

5.7.1 Firewalls 5-22

5.7.2 Encryption 5-24

5.7.3 Anti-Virus 5-24

5.7.4 Identification and Authentication 5-25

5.7.5 CyberGuard Solutions 5-25

5.8 D-Link 5-28

5.8.1 D-Link Multi-Layered Channel Distribution 5-28

5.9 Enterasys Networks 5-31

5.9.1 Enterasys Customers 5-31

5.9.2 Enterasys Networks Restructuring 5-32

5.9.3 Enterasys Networks Philosophy 5-32

5.9.4 Enterasys Networks Multi-layer Switching 5-33

5.9.5 Enterasys Networks High-End Switch Routing 5-33

5.9.6 Enterasys Networks Intrusion Detection Systems 5-33

5.9.7 Enterasys Technology 5-34

5.9.8 Enterasys Networks Revenue 5-34

5.9.9 Cabletron Systems 2001 Revenue 5-34

5.9.10 Enterasys Customers 5-36

5.9.11 Enterasys Revenue Recognition Practices 5-36

5.10 ESoft 5-37

5.11 IBM 5-39

5.11.1 Websphere MQ Product Family 5-40

5.11.2 IBM Middleware 5-42

5.11.3 IBM Middleware Products 5-42

5.11.4 IBM / Nortel 5-44

5.11.5 OS/390 Firewall Technologies Tools 5-45

5.12 Intel 5-46

5.12.1 Intel Major Customers 5-47

5.13 Intrusion 5-49

5.13.1 Intrusion Solution And Products 5-49

5.13.2 PDS Family Of Security Appliances 5-51

5.14 Linksys 5-52

5.15 Lucent Technologies 5-54

5.15.1 Lucent Strategy 5-55

5.16 Nortel Networks 5-56

5.16.1 Strategies 5-57

5.16.2 Lines Of Business 5-57

5.16.3 Nortel Enterprise Solutions 5-57

5.16.4 Nortel Networks Realignment Plan 5-58

5.16.5 Nortel Reorganization 5-59

5.16.6 Nortel Networks Optical Networks 5-60

5.16.7 Nortel Networks Customers 5-60

5.16.8 Nortel Networks Open Optical Dense-Wavelength Division Multiplexing (DWDM) System 5-63

5.16.9 IP-Ready Open Optical Interfaces 5-63

5.16.10 Nortel Networks Optical Packet Network Solution 5-65

5.16.11 IP Data Services 5-66

5.16.12 Sonet/SDH 5-67

5.16.13 Optical IP Network Backbones 5-67

5.16.14 Acquisitions 5-68

5.16.15 Focus On Solutions 5-68

5.16.16 Nortel Revenues 5-69

5.16.17 Nortel Networks Second Quarter of 2002 Revenue 5-69

5.16.18 Nortel Networks Third Quarter 2002 5-71

5.16.19 Motorola / Nortel In Wireless Merger Talks 5-71

5.16.20 Nortel Networks / Sprint 5-73

5.16.21 Nortel Networks / Cingular 5-73

5.17 NEC 5-74

5.17.1 NEC Handsets 5-75

5.17.2 NEC Handset Customers 5-76

5.17.3 NEC Third Quarter Revenue Of The Fiscal Year Ending March 31, 2002 5-76

5.17.4 NEC Networks 5-77

5.17.5 NEC Solutions (America) 5-81

5.18 NetScreen 5-81

5.18.1 NetScreen Security 5-82

5.18.2 NetScreen Revenue 5-84

5.18.3 NetScreen Positioning 5-86

5.19 Network Associates 5-88

5.20 Nokia 5-89

5.20.1 Nokia Networks 5-89

5.20.2 Nokia Customers 5-90

5.20.3 Nokia Mobile Phones 5-90

5.20.4 Open Mobile Architecture Initiative 5-91

5.20.5 Nokia Networks 5-91

5.20.6 Nokia Ventures Organization 5-92

5.20.7 Nokia Revenue 5-92

5.20.8 Nokia Broadband DSL 5-93

5.20.9 Nokia / Proximus 5-94

5.20.10 Smart Communications (Philippines) / Nokia 5-95

5.20.11 Orange(UK) / Nokia 5-95

5.20.12 Nokia Provider Partnerships 5-95

5.20.13 Nokia Revenue 5-96

5.20.14 Nokia Acquisitions 5-97

5.20.15 Nokia Joint Initiatives 5-98

5.21 RapidStream 5-99

5.22 RSA Security 5-100

5.22.1 RSA Security Acquitions 5-101

5.22.2 RSA Security Strategy 5-102

5.22.3 RSA Security Strategic Partners 5-104

5.22.4 RSA Customers 5-106

5.22.5 RSA Keon Digital Certificate Management 5-107

5.22.6 RSA Revenue 5-108

5.23 SafeNet 5-108

5.24 ServGate Technologies 5-110

5.25 SonicWall 5-111

5.25.1 SonicWall Revenues 5-112

5.25.2 SonicWall Partnerships 5-113

5.25.3 SonicWALL Solution 5-113

5.25.4 SonicWALL Strategy 5-116

5.25.5 SonicWALL Technology and Products 5-119

5.25.6 SonicWALL Security Services 5-121

5.26 Symantec 5-124

5.26.1 Symantec Revenue 5-124

5.26.2 Symantec Acquisitions 5-129

5.26.3 Symantec / AXENT 5-130

5.26.4 Symantec Operating Segments 5-131

5.27 V-One 5-132

5.27.1 V-One Key Customers 5-133

5.27.2 V-ONE Products 5-134

5.28 WatchGuard 5-136

5.28.1 WatchGuard Strategy 5-137

5.28.2 WatchGuard Live Security Service 5-138

5.28.3 WatchGuard Acquistions 5-139

5.28.4 WatchGuard Distribution Channel 5-139

5.28.5 WatchGuard Brand 5-141

5.28.6 WatchGuard Products and Services 5-143

5.28.7 WatchGuard Revenue 5-147

Note: Product cover images may vary from those shown
3 of 3
Note: Product cover images may vary from those shown

RELATED PRODUCTS from Db