Core IDC 404U
Core IDC 404U
com
I D C E X E C U T I V E B R I E F
January 2007
Adapted from Worldwide Vulnerability Assessment and Management 2004–2008 Forecast and 2003
Vendor Shares: Assessing Risk and Compliance, by Charles J. Kolodgy; IDC #32026
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA
Executive Overview
Today, IT managers currently have limited capability to assess real
risk, technically validate the effectiveness of security products they
use, and make intelligent IT security investment decisions.
This Brief will discuss how penetration testing software can efficiently
address these challenges. Penetration testing is an important
addition to the vulnerability assessment and management (VA&M)
portfolio in that it picks up where "scan and identify" products leave
off, substantiating whether theoretical threats to network security are
real or not. Penetration testing software provides the capability to
test the overall IT security infrastructure and polices to ensure that
an organization's security investments are actually working. This
capability will become increasingly important as companies continue
to spend more on solutions to protect their information assets and
meet compliance requirements. Management will need to justify
those investments by proving that they are indeed paying off.
Penetration testing software represents the best option for doing so.
05C4497
Introduction
The network security efforts of IT managers have so far been
focused on keeping the bad guys at bay. Traditionally, this has been
accomplished by trying to outsmart hackers by creating barriers or
providing defensive mechanisms once a vulnerability was identified.
As networks become more complex, however, it's impossible to
protect everything. Instead, managers need to prioritize their security
to protect the most critical assets and ensure the technology they
have deployed is functioning as effectively as possible. Vulnerability
scanners can help, but the list of potential vulnerabilities produced by
a scanner can be dauntingly long and not wholly accurate.
2 ©2007 IDC
of additional security products and services, they are also
seeking ways to measure their risk.
These factors are helping to drive the growth of the VA&M software
market, which achieved $435 million in vendor revenue in 2003. IDC
expects the worldwide revenue for VA&M software to reach $871
million in 2008, representing a compound annual growth rate
(CAGR) of 15% from 2003 (see Table 1).
Table 1
©2007 IDC 3
The Rise of Penetration Testing
IDC expects that proactive security, as embodied in penetration
testing, will take a larger share of the market over time compared
with passive security, as represented by vulnerability scanning.
Penetration testing products attempt to exploit potential
vulnerabilities that the vulnerability scanner identifies. In effect,
penetration testing software discovers which theoretical threats are,
in fact, actual threats, and prioritizes which are most critical in a
network.
Business Benefits
4 ©2007 IDC
IT Benefits
Risk Management
Vulnerability Remediation
VA&M solutions are being asked to discover the existing patch level
and to determine what vulnerabilities exist at that patch level. New
vendors are emerging in this area, as well as existing vulnerability
vendors that are partnering with patch and remediation companies to
provide solutions tied to their vulnerability products.
©2007 IDC 5
Software Evaluation and Vulnerability Testing
These developments will increase the need for VA&M that can meet
the specific needs of the small- and medium-business (SMB) market
and the IT consultants that service them. Indeed, VA&M services
delivered via the Web are becoming quite popular in this segment.
Considerations
Budgetary and staffing constraints will continue to drive
organizations to look for better ways to cost-effectively manage their
security infrastructure. Penetration-testing software products can
simplify the complexity associated with managing multiple security
solutions, while increasing the effectiveness of the protection.
6 ©2007 IDC
Vulnerabilities must be viewed as part of an overall security
management infrastructure that takes into account security policy
and compliance and risk management. VA&M solutions should be
expected to inform IT managers why the vulnerability is a concern
and how each specific vulnerability is ranked, so that remediation
can be performed in a consistent prioritized manner instead of
chaotically.
Conclusion
The growing reliance on IT for corporate operations and the
increasing government and industry regulation are elevating security
policy, adherence to best practices, and measurement to a critical
component of corporate governance. To meet these needs,
vulnerability assessment and management (VA&M) products are
being released that can assist enterprises in handling policy creation,
compliance measurements, increased efficiency, and audits as well
as reporting.
©2007 IDC 7
C O P Y R I G H T N O T I C E
8 ©2007 IDC