Blended attacks strengthen business case for unified threat management, Frost & Sullivan says
A rising tide of sophisticated, blended threats that employ multiple attack vectors will help drive the unified threat management technology market to double in a five-year span, according to a report released this week.
According to new projections from market research firm Frost & Sullivan, the demand for UTM -- a technology that combines multiple security functions into a single firewall-based appliance -- will grow from about $1.8 billion in 2010 to more than $3.7 billion in 2015.
"The value of integrated solutions becomes all the more apparent in an environment of advanced attacks, wherein cyber criminals favor blended attacks that use multiple vectors and require more than one security function," Frost & Sullivan says.
The compound annual growth rate for UTM technology is more than 15 percent, according to the report. There are some 43 vendors that offer UTM tools.
In recent years, UTM has become identified with small businesses and branch offices that purchased consolidated security appliances because they had neither the budget nor the skills to maintain multiple fixed-function devices. But larger enterprises are now moving UTM closer to the core, says Rob Ayoub, former global program director for network security at Frost & Sullivan and current CTO for Fortinet, a leading seller of UTM technology.
"When a blended attack occurs, some or all of it may get through a single-function device or application," Ayoub says. "UTM gives you that layered defense, in which one tool may stop an attack that another tool doesn't."
"UTM provides fundamental security technologies that organizations, regardless of industry or size, require," the Frost & Sullivan report states.
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024