DDoS Mitigation Global Market Analysis

  • ID: 3455753
  • Report
  • Region: Global
  • 153 Pages
  • Frost & Sullivan
1 of 5
New Solutions Accelerate Market Growth

FEATURED COMPANIES

  • A10 Networks
  • Allot Communications
  • Citrix
  • Corero Network Security
  • Fortinet
  • Level 3
  • MORE
Distributed denial-of-service (DDoS) is an increasingly popular method of cyber attack. DDoS attacks disrupt operations and block access for legitimate end users, customers, and employees, causing missed sales opportunities, end user frustration, service degradation, and embarrassment for targeted organizations. Attacks are growing in volume, sophistication, and frequency, and any online business is a target. As a result, DDoS mitigation solutions are in high demand. However, new attack techniques, growing bandwidth needs, the Internet of Things, and other IT trends will have a profound impact on the development of this high growth market.

Summary:

- DDoS attacks are highly disruptive attacks that hurt victimized organization’s online operations, brand name, and ability to conduct business.

- Consequently, demand for DDoS mitigation solutions continues to grow.

- The DDoS mitigation market revenue grew to $449.5 million in 2014 and is growing rapidly. The DDoS mitigation market is expected to grow to $977.2 million by 2019.

- The high level of demand in recent years has also driven an elevated level of competition.

- Leading vendors include Akamai, Arbor Networks, and Radware.

- However, new competitors are entering the market and entrepreneurial companies are gaining market share.

- Accurate assessment and alignment with customer needs, changing technologies, and new threats is necessary to stay competitive in this high growth market.
Note: Product cover images may vary from those shown
2 of 5

FEATURED COMPANIES

  • A10 Networks
  • Allot Communications
  • Citrix
  • Corero Network Security
  • Fortinet
  • Level 3
  • MORE
1. Executive Summary
  • Executive Summary
  • Market Engineering Measurements
  • CEO’s Perspective
  • Introduction to the Research
2. Market Overview
  • Definitions
  • Market Overview
3. External Challenges: Drivers and Restraints - Total Market
  • Drivers
  • Drivers Explained
  • Restraints
  • Restraints Explained
4. Forecasts and Trends - Total Market
  • Forecast Assumptions
  • Revenue Forecast
  • Unit Shipment and Revenue Forecast Discussion
  • Pricing Trends and Forecast
  • Pricing Trends and Forecast Discussion
  • Percent Revenue Forecast by Segment
  • Segment Percent Revenue Forecast Discussion
  • Percent Revenue Forecast by Horizontal
  • Percent Revenue by Horizontal Discussion
  • Service Provider Revenue Forecast
  • Service Provider Revenue Forecast Discussion
  • Enterprise Revenue Forecast
  • Enterprise Revenue Forecast Discussion
  • SMB Revenue Forecast
  • SMB Revenue Forecast Discussion
  • Percent Revenue Forecast by Region
  • Regional Percent Revenue Forecast Discussion
  • Revenue Forecast by Vertical Market
  • Vertical Market Revenue Forecast Discussion
  • Percent Revenue Forecast by Distribution Channel
  • Distribution Channel Discussion
5. Market Share and Competitive Analysis - Total Market
  • Competitive Environment
  • Competitive Environment Discussion
  • Competitive Factors and Assessment
  • Competitive Factors and Assessment Discussion
  • Competitive Factors and Assessment Discussion
  • Competitive Landscape
  • Competitive Challenges
  • Discussion of Competitive Challenges
6. DDoS Mitigation Appliance Segment Breakdown
  • Appliance Segment Breakdown
  • Appliance Segment - Market Engineering Measurements
  • Appliance Segment - Unit Shipment and Revenue Forecast
  • DDoS Mitigation Appliance Segment - Revenue Forecast Discussion
  • DDoS Mitigation Appliance Segment - Pricing Trends and Forecast
  • Appliance Segment - Pricing Trends and Forecast Discussion
  • Appliance Segment - Market Share
  • Appliance Segment - Competitive Environment
7. DDoS Mitigation Service Segment Breakdown
  • DDoS Mitigation Service Segment Breakdown
  • DDoS Mitigation Service Segment - Market Engineering Measurements
  • DDoS Mitigation Service Segment - Revenue Forecast
  • DDoS Mitigation Service Segment - Revenue Forecast Discussion
  • DDoS Mitigation Service Segment - Pricing Trends and Forecast
  • Service Segment - Pricing Trends and Forecast Discussion
  • Service Segment - Market Share
  • Service Segment - Competitive Environment
8. The Last Word
  • The Last Word - Predictions
  • The Last Word - Vendor Recommendations
  • The Last Word - Customer Recommendations
  • Legal Disclaimer
9. Vendor Profiles
  • Vendor Profile: A10 Networks
  • Vendor Profile: Akamai
  • Vendor Profile: Allot Communications
  • Vendor Profile: Arbor Networks
  • Vendor Profile: Citrix
  • Vendor Profile: CloudFlare
  • Vendor Profile: Corero Network Security
  • Vendor Profile: F5 Networks
  • Vendor Profile: Fortinet
  • Vendor Profile: Imperva
  • Vendor Profile: Level 3
  • Vendor Profile: Nexusguard
  • Vendor Profile: Radware
  • Vendor Profile: Verisign
10. Appendix
Note: Product cover images may vary from those shown
3 of 5

Loading
LOADING...

4 of 5

FEATURED COMPANIES

  • A10 Networks
  • Allot Communications
  • Citrix
  • Corero Network Security
  • Fortinet
  • Level 3
  • MORE
- DDoS attacks are coordinated, targeted attacks against specific organizations.

- Threat actors utilize DDoS attacks to disrupt business operations, communications capabilities, and to harass and embarrass targeted organizations.

- DDoS attacks accomplish this goal by overwhelming the victim's network bandwidth and computing resources, thereby blocking access or degrading performance for legitimate users.

- However, DDoS attacks range in effectiveness, complexity, size, frequency, and duration, making DDoS attacks difficult to anticipate, prepare for, detect, and mitigate without specialized solutions.

- For example, a volumetric attack is a coordinated and purposeful deluge of unsolicited traffic that is designed to consume all available network resources and bandwidth.

- This is the most familiar and simple DDoS attack. It typically requires attackers to coordinate a massive number of infected “bot” computers to direct “garbage” traffic to a specific target.

- However, the means for accomplishing volumetric attacks continue to evolve as evidenced by growing frequency of attacks and record setting attack volumes.

- An application layer attack is a more sophisticated attack that targets weaknesses in logic in Web applications. Some application layer attacks require little bandwidth and are therefore stealthy and difficult to detect.

- For example, Slowloris opens connections to a Web server and maintains the connections partially open until all connections are full, thereby blocking legitimate connections. The attack is “low and slow” in order to avoid detection.

- Application layer attacks are becoming more common and challenge traditional DDoS defenses.

- Similarly, attackers vary greatly in terms of motives, capabilities, and resources. Attacker profiles include:

-- Cyber criminals that are opportunistic and profit-driven
-- Activists that are less sophisticated but highly motivated
-- Nation-states that have tremendous resources

- Risk can be difficult to measure due to the wide range of attack types, attacker profiles, motives, and many other factors.

- Essentially, any online organization is vulnerable and should measure DDoS risk in terms of “when?” instead of “what if?”

- Businesses have many options to mitigate DDoS attacks. Some of these most basic and low-cost options include setting Access Control Lists (ACLs) and rate-limiting in switches and routers to drop traffic that “looks like” a DDoS attack or that comes from known bad IP addresses.

- These practices are able to defend against relatively basic attacks but are static and are therefore easily defeated by more skilled threat actors.

- Businesses may also choose to use existing security tools such as firewalls and intrusion prevention systems (IPS) to stop DDoS attacks. Often, these tools are only effective against basic DDoS attacks and can be disabled by a DDoS attack on their own right.

- For example, a stateful firewall maintains a table of connection states. An attacker could fill up this table and block network access for employees or to bypass firewall inspections.

- Over provisioning is the strategy to buy extra bandwidth to handle spikes in network traffic. This approach is not cost effective and only serves to “complete” the DDoS attack on behalf of the attacker.

- Organizations can utilize “clean pipes” services provided by ISPs and CSPs but may need additional, specialized capabilities

- Basic DDoS mitigation efforts are “better than nothing” but are ineffective against well motivated or skilled attackers. Even partially successful attacks can degrade performance for end users and put a strain on IT staff and network resources.

- Consequently, the demand for DDoS mitigation solutions is growing rapidly. Though the market for DDoS mitigation has grown steadily for years, solutions have primarily focused on large scale products for service providers that were interested in protecting their networks.

- Given the wide range of DDoS attack types and severity of these attacks, a wide range of solutions have emerged to protect organizations of all sizes. Now, businesses of all sizes are investigating solutions to mitigate the impact of a DDoS attack.

- As a result, the DDoS mitigation market is growing rapidly. The specific trends that are driving growth and restricting growth are discussed in the following section.

- Additionally, the DDoS mitigation market is becoming increasingly competitive, and a few select vendors are growing at a rapid pace.
Note: Product cover images may vary from those shown
5 of 5
- A10 Networks
- Akamai
- Allot Communications
- Arbor Networks
- Citrix
- CloudFlare
- Corero Network Security
- F5 Networks
- Fortinet
- Imperva
- Level 3
- Nexusguard
- Radware
- Verisign
Note: Product cover images may vary from those shown
6 of 5
Note: Product cover images may vary from those shown
Adroll
adroll