Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Study: UTM Market To Grow To Nearly $4B In Next Three Years

Blended attacks strengthen business case for unified threat management, Frost & Sullivan says

A rising tide of sophisticated, blended threats that employ multiple attack vectors will help drive the unified threat management technology market to double in a five-year span, according to a report released this week.

According to new projections from market research firm Frost & Sullivan, the demand for UTM -- a technology that combines multiple security functions into a single firewall-based appliance -- will grow from about $1.8 billion in 2010 to more than $3.7 billion in 2015.

"The value of integrated solutions becomes all the more apparent in an environment of advanced attacks, wherein cyber criminals favor blended attacks that use multiple vectors and require more than one security function," Frost & Sullivan says.

The compound annual growth rate for UTM technology is more than 15 percent, according to the report. There are some 43 vendors that offer UTM tools.

In recent years, UTM has become identified with small businesses and branch offices that purchased consolidated security appliances because they had neither the budget nor the skills to maintain multiple fixed-function devices. But larger enterprises are now moving UTM closer to the core, says Rob Ayoub, former global program director for network security at Frost & Sullivan and current CTO for Fortinet, a leading seller of UTM technology.

"When a blended attack occurs, some or all of it may get through a single-function device or application," Ayoub says. "UTM gives you that layered defense, in which one tool may stop an attack that another tool doesn't."

"UTM provides fundamental security technologies that organizations, regardless of industry or size, require," the Frost & Sullivan report states.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
An Improper Access Control vulnerability in the logging component of Bitdefender Endpoint Security Tools for Windows versions prior to allows a regular user to learn the scanning exclusion paths. This issue was discovered during external security research.
PUBLISHED: 2021-05-18
Uncontrolled Search Path Element vulnerability in the openssl component as used in Bitdefender GravityZone Business Security allows an attacker to load a third party DLL to elevate privileges. This issue affects Bitdefender GravityZone Business S...
PUBLISHED: 2021-05-17
Cross Site Scripting (XSS) in emlog v6.0.0 allows remote attackers to execute arbitrary code by adding a crafted script as a link to a new blog post.
PUBLISHED: 2021-05-17
Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete a specific article via the component " /admin.php?action=page."
PUBLISHED: 2021-05-17
Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete specific images via the component " /admin.php?action=images."