This IDC study breaks down security services for countering targeted cyberattacks within the Japan security services market into consulting services, systems installation services, managed security services, and education and training services. It provides an analysis of the market in 2014 and a forecast of it from 2015 to 2019.
There has been greater deployment of multilayer defense products as means of defending against targeted cyberattacks. These multilayer products include next-generation firewalls that control everything from the network layer to the application layer and specialized threat analysis and protection products. However, operating and managing multilayer defense products requires specialist knowledge because malware detection technologies have become more advanced and have more features. Thus, it has become difficult to operate these products in-house. Consequently, there is increasing demand for managed security services that monitor and manage these multilayer defense products. However, even among providers of managed security services there are not enough technicians with advanced specialist knowledge, and it has become difficult to supply enough services to meet user demand. "Vendors that offer managed security, incident response, and other similar services should promote the use of products with interactive intelligence schemes that deliver interlinking of threat intelligence and multilayer defense products, as well as promote the use of forensic tools that automate the investigation and analysis of security incidents. By doing so, they will be able to decrease their dependence on specialist engineers and will be able to provide efficient services," says IDC Japan software and security research manager Tsuneo Tosaka.
This IDC study is a translation of the Japanese document IDC #J15240108 and is summarized to reduce the gap in time since the original version was published.
All of the following sections are, however, fully translated:
- IDC Opinion
- Executive Summary
- Essential Guidance
Disaster recovery, Disk-based data protection, Endpoint security, Firewall and VPN security appliance products, Messaging security, Network security, Networks, Routers, Secure content and threat management, Security software, Server virtualization, Software, Virtual private network products, VoIP, Web security