Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

9/30/2011
02:02 PM
50%
50%

Database Security Market To Grow 20 Percent Through 2014

Mobility, data volume, and difficulty patching still lead challenges in protecting databases

Two analyst reports out this month show that as organizations struggle to protect databases that touch a multiplying list of applications and endpoints, the uptick in database security product deployments will continue at a considerable growth rate in the next few years.

According to Forrester Research analyst Noel Yuhanna in his most recent database security market overview report, the database security market is expected to grow by 20 percent through 2014. Yuhanna pegs the current market at $755 million including new licenses and support, database auditing, real-time protection, data masking, vulnerability assessment, and database encryption across all database management system (DBMS) platforms. As that figure grows to $1.2 billion in 2014, Yuhanna says to expect continued consolidation in the market.

"The database security market is likely to converge with the overall data security market in the future, as DBMS vendors extend the security features that are bundled with their products," he wrote. "Larger database security vendors such as Fortinet, IBM, McAfee, and Oracle will continue to dominate the database security market and are likely to acquire independent vendors to fill gaps in their security portfolio."

This year has seen the nexus of a number of trends that could add up to big growth in everything from database activity monitoring to data masking during the coming years. According to a recent database market landscape report out by Enterprise Strategy Group (ESG), historical under-investment in database security, combined with the increased sophistication of advanced persistent threats and a spike in data volume and mobile access points, have all contributed to IT's concern over the matter.

ESG analyst Julie Lockner says that it's no surprise that in a recent survey, slightly over half of IT decision makers listed management of security and compliance issues as one of the biggest challenges to meet within the database environment.

"The big issue is dealing with the mobility factor. Everyone wants to access the database through applications on their mobile devices," says Lockner. "It's an issue of both data volume and the increasing number of endpoints that people are accessing that data through."

According to Forrester's Yuhanna, organizations still continue to struggle also with database patching. In his report, he writes that 41 percent of enterprises still find it a challenge to deal with database patches, mostly due to the effort required for application testing and the frequent need for database shutdown to deploy patches. He believes it is incumbent upon the DBMS vendors to grease the skids in this area.

"We are likely to see some DBMS vendors such as IBM and Oracle improve the overall experience with security patching by automating the patching process and delivering real-time patching that requires no shutdown of databases," he wrote.

Forrester also reports that database activity monitoring and other auditing tools still lead deployment numbers, but the biggest growth has been in database vulnerability assessment tools. The firm says that the use of vulnerability assessment tools for database environments grew by 66 percent from 2008 to 2010. According to ESG's Lockner, these tools should be a bare minimum database security technology for enterprises today.

"If you really believe that your database systems are important, then the lowest common denominator should be vulnerability assessment," she says. "Companies that don't do it at this point are not very wise. It takes a minimal amount of effort and saves so many headaches."

As IT organizations continue to bring in more types of database security products into the mix, they will need to follow a thoughtful risk management approach to prioritize which technologies and which databases see the first deployments. This starts with solid data classification.

"Classifying database data is kind of a foundation," Lockner says. "Once you've classified it, the data should have a level of risk associated with it and that should help you weigh what types of products you use or what type of architecture to build."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.