Internet Security: Strategic Market Options and Forecasts to 2001

Order Form

REPORT NO.A791597264   450+ PAGES     105 TABLES AND FIGURES     1997 

    Internet security markets are poised to grow as firewalls, encryption, messaging, and servers are implemented using a range of systems architectures. Market growth is being fueled by the need for transmission of transaction data and preservation of data integrity. Systems architectures are being impacted by the need for integration of security functions.

    Internet Security systems depend on fundamental architecture. Two different security architectures are general perimeter protection and discrete but logically independent domains. New architectures will support administrative protection at multiple levels of the enterprise. The rise of the Internet has posed the problem of protecting against external intrusion into the enterprise network. Discrete but logically independent domains within the enterprise need bi-directional protection from within the network as well as from external threat.

    If the Internet is to support $20 billion of purchases by 2000, security must be possible, implemented, and believable. The AT&T SecureBuy program which guarantees secure transactions over the Internet represents an early Internet initiative poised to reap the benefit of large market share early. Suppliers to this and other Internet initiatives are developing a market leadership position that will be difficult to dislodge by competitors that come later.

 

 

Internet Security 

Strategic Market Options and Forecasts to 2001

 

          Internet market explosive growth is stimulating the need for data security.  Now is the time to achieve a presence in Internet security markets, before the market leaders become entrenched, while the rapid growth phase is still occurring. 

          $500 million markets in 1996 are expected to exceed $5 billion by 2001 as Internet home pages begin to be used for commerce.  The study documents shifts occurring in Internet security markets.  It provides insight about strategic market options in the context of the following:

 

        Security as migration to distributed computing systems occurs

        Security as data is transferred from the client directly into mission critical central computing systems

        Impact of Internet security on development of Internet commercial markets

        Rate of use of Internet by consumers increases

        Speed of adoption of Internet by enterprise increases

        Impact on security architecture as Internet servers are located close to content developers

        Support of Internet in driving development of new applications

        Impact of hybrid fiber optic / coax communications transport lines

        Impact of implementation of broadband communications infrastructure

        Impact of implementation of ATM switching systems


The Study Addresses:

        Market strategies for participating in high growth Internet security market segments

        Strategic positioning of Internet security product providers 

        Market directions and strategic market alliances

        Risk/reward scenarios -- access to existing customer bases

        Strategies for success


You NEED This Study

COMPANIES PROFILED


ANS               

AXENT          

BLUESTONE

CANDLE

CHECKPOINT

CHEYENNE  

CKS SOFTWARE 

CYBERSAFE

CYGNUS SUPPORT     

DIGEX           

DYNASOFT 

FISCHER

FRONTIER

GANDALF

GRADIENT   

HAYSTACK LAB

HEWLETT-PACKARD    

IBM                

TIVOLI SYSTEMS 

MCAFEE ASSOCIATES

MEMCO SOFTWARE 

MERGENT

MICROCOM

MICROSOFT

MILKYWAY NETWORKS

NETSCAPE

ORACLE

PACIFIC BELL

PRETTY GOOD

PRICE WATERHOUSE

PROCESS SOFTWARE 

PSINET         

RAPTOR       

SANTIX         

SECURITY DYNAMICS  

RSA DATA SECURITY

SHIVA           

SOFTBANK CORP            

TREND MICRO     

SOS CORPORATION                 

SPIDER         

SUN MICROSYSTEM

SYMANTEC 

UTIMACO SAFEWARE

VERITY         

WIND RIVER SYSTEMS    

XYLOGICS   

3COM            


REPORT OUTLINE

Executive Summary        

 

1. MARKET DEFINITION     

Internet commerce      

Telecommuting                      

Types of networks        

Security solutions        

Firewalls       

User authentication

Tokens           

Audit trails    

Uses of Internet security          

Internet and Intranet

Encryption     

Graphical management 

Software distribution   

 

2. MARKET FORECASTS     

Market driving forces             

Summary forecasts        

Internet market profile

Users/access/servers       

Penetration analysis     

Internet and Intranets        

Navigation 

Virtual private networks        

Firewalls

Token authentication

Server authentication

Anti virus protection      

Encryption     

Central audit

Middleware messaging     

Market growth factors

Antivirus products         

Digital signatures     

PBX security 

 

3. PRODUCTS

Firewalls       

Interlocks  

Firewall functions   

Firewall limitations 

Basic types of firewalls

Checkpoint Software    

Raptor       

Gradient technologies

Token-based security          

Security Dynamics ID

Secure Computing

Digital Pathways  

Encryption     

RSA encryption capability  

Internet servers           

Secure browsers    

Cybersafe corporation

Virus protection      

Mcafee Associates 

Symantec/Norton          

Softbank/Trend Micro   

Messaging middleware   

System management 

Hewlett-Packard      

Tivoli         

Digital signatures

Utimaco Safeware

PBX security 

Ottawa Telephony Group

 

4. ARCHITECTURE INFRASTRUCTURE                        

Internet architectures 

Security architecture  

Rule based models       

Intranet benefits          

Intranet risks

Security auditing         

Internet         

Browser security

Sophisticated mail

Web security tools          

Web wireless software    

Virtual private networks        

Applications (APIS)            

 

5. COMPANY PROFILES

 

6. INTERNET SECURITY APPLICATIONS

Mobile and telecommuting

Intranet         

Store-and-forward mail 

Online information

Sales applications   

Human resources

Internet banking         

Technical support/help

Network security services          

IBM MQSeries Internet

AT&T securebuy services      

Pacific Bell network

ANS          

System administration

Tasks/Administration

 

 

LIST OF TABLES AND FIGURES

FORECASTS 1996-2001

Market Shares for 1996

U.S. Markets

Shipments in Millions of Dollars

FORECASTS

Internet summary market forecast

Internet users. number

Internet access market forecast, dollars

Software server shipments

Firewall, user authentication, and central audit LAN installed base, market penetration

LAN ports, installed base, market forecast

Firewall market shares

Firewall market forecast

Token authentication market shares

Token authentication market forecast

Server authentication market shares

Server authentication market forecast

Virus protection market shares

Virus protection market forecast

Encryption market shares

Encryption market forecast

Central audit market shares

Central audit market forecast

Messaging middleware market shares

Messaging middleware market forecast

Digital signature market forecast

PBX security market forecast

 

PRODUCTS

Telecommuting access needing Internet

Networks requiring security          

Domains of network security          

Aspects of tokens            

Network security issues

Security system aspects

Use of Internet security          

Industries using Internet security          

Organizational challenges of security          

Internet security market driving forces             

Internet security market drivers

Functions of the firewall   

Checkpoint firewall software features         

Gradient webcrusader features         

Gradient DCE features         

Security Dynamics server features

Security Dynamics token server location

Security Dynamics token product forms              

Messaging middleware distributed computing     

Components for digital signatures     

 

ARCHITECTURES

Security system architecture  

Model for security system rule definition      

Security system access controls          

Rule constraints    

Time based authentication

Authentication history

Corporate Intranet definition and segments       

Benefits of Intranet and Internet         

Risks of interconnected computing networks        

Compromised integrity of security systems          

Different Internet and Intranet servers           

Aspects of Intranet implementation                     

 

STRATEGIC POSITIONING

Spider scalable Internet products         

Spider strategic alliances/corporate customers

Acquisitions by Symantec      

Types of paper-based information moving to on-line distribution   

Intranet browser access /employee information   

AT&T network-based hosting services          

Multiple ANS interlock protections    

System administration tasks               

Levels of administration control           

 

     REPORT METHODOLOGY

     This is the twenty-first in a series of market forecasts of Internet data communications, telecommunications,  and

     information services.  The project leaders have significant experience preparing industry studies.  Forecasts are

     based on primary research and proprietary data bases.  In-depth interviews are conducted with a broad range of

     key participants in the market.

 

Order Form

Download Brochure & Outline

Download Report Summary

                                                                                           

                                            

 
Home Page
Consulting
What's New?
Complete List of Publications
 
About The Company
About The Principals

 WinterGreen Research, Inc

6 Raymond St
Lexington, MA 02173
Tel: 781-863-5078
Fax: 781-863-1235
© 1998 WinterGreen Research, Inc. All Rights Reserved.