[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2016/03/02 13:59:53

Information security tools from unauthorized access (the information security facility from NSD)

.

Content

2016: PCs in the corporate sector of the Russian Federation protect three security systems

In December, 2016 the Code of Security company announced a research in which, according to the experts, respondents are disturbed illegal access to the protected information, its unauthorized modification, distribution of "mail worms", loss of information media and theft of an account of access to network services.

More than 500 respondents from 11 industries of the industry became participants of a research:

  • heads of the companies,
  • Chiefs information security officer,
  • chiefs of IT departments,
  • heads of security services,
  • IT and cybersecurity specialists.

During the research of analytics identified groups of threats for workstations and servers, defined TOP-5 threats of information security in each group.

Groups of threats, (2016)

According to them, the greatest danger to information at workstations and servers 34% of the total number of relevant security risks pose threats of unauthorized access, it ~. Network threats take the second position, their share ~ 28%. In this group theft of an account of access to network resources became relevant threat almost for all industries. Representatives of the financial sector selected threat of carrying out the attacks like "failure in service" (DoS). Assessment by respondents of level of criticality of security risks of information at workstations and servers:

Top-5 security risks, (2016)

Results of a research testify to business costs, on average, ~ 53% of the cybersecurity budget for protection of workstations, servers and network interaction. Structure of types of the used means of protecting at workstations and servers is as follows:

Structure of types of means of protecting, (2016)

For protection of computers 3 means of protecting are used on average. This indicator varies in relation to the industry: financial and telecommunication companies often apply 6 information security facilities, in a public sector – 4 means of protecting, at one workstation.

For December, 2016 only 8% of the organizations use one means for data protection, all others are forced to increase load of the protected computers by means of several the information security facility that, according to experts of the company, testifies to deficit of complete solutions.

2014: Market size was reduced by 21% to 746 million rub

On December 17, 2015 the Code of Security company announced results of a research of the Russian market of information security tools from unauthorized access (the information security facility from NSD) according to which sizes of the market of this software will depend on the number of the sold computers and activity of customers from a public sector.

Information on information security facility market capacity from NSD and shares of the main vendors during 2012-2014 is provided in a research. Estimates of analysts are based on the open data published on the website of state procurements according to delivery contracts of these products. Price and functional comparison of the solutions which are present at the market is given in the report, the factors promoting growth or decrease in demand for these or those products are analyzed, forecasts concerning perspectives of development of a segment in general are under construction.

The volume of the Russian market of the information security facility from NSD at the end of 2014 is estimated at 746 million rubles. It is 21.82% lower, than in 2013 (954 million rubles). Negative dynamics can be explained with decrease in sales level of personal computers in Russia in 2014. Information security facility sales volume from NSD directly depends on the size of the market of the PC, and it in 2014 was reduced by 22.7% in kind, according to IDC. At the same time the cybersecurity market in general in 2014 grew: growth was 8%, according to TAdviser.

Volume and the information security facility loudspeaker from NSD, 2012-2014

In the report it is told that application by customers of means for protection of workstations and servers against unauthorized access is dictated by need of execution of statutory requirements on protection, including:

  • personal data;
  • state information systems;
  • confidential information;
  • state secret.

All these requirements are imposed to information systems in the organizations of public sector, as a rule. And therefore the share of the purchases made by state companies exceeds 80% of volume of this market.

Information security tools from unauthorized access can be separated into software products and hardware and software systems (modules of a trusted boot, the HSTLM) conditionally. Requirements to them are defined by regulating documents of FSTEC of Russia. As a result – in all systems the same protection gears are implemented, the main distinctions consist in the principles of management for program the information security facility from NSD and quantity of the supported payments – for the HSTLM.

Analysts of "The code of security" provide price comparison of the considered solutions in the report. In particular, at comparable functionality price range on products can differ more than twice.

At the beginning of 2015 at the market there are 22 main information security facilities developed by 17 vendors from NSD. From them are 15 hardware and software systems, 7 – software tools. The market is poorly segmented. The greatest share in 2014 (67%) belonged to Code of Security company, the four of the largest suppliers is closed by Gazinformservice whose market share made 3%.

Structure of the market of the information security facility from NSD (vendors) (2012-2014)

According to a research, on the total sales volume of the solution of "The code of security" – the information security facility from NSD Secret Net and the module of a trusted boot of a HSS Sable – were in the lead for the last three years.

The product Dallas Lock developed by Konfident company which showed rapid growth – from 5% in 2012 to 21% in 2013 – and strengthened the positions for 1% in 2014 became the second in market share. The market share of the information security facility "Blokhost-network K" closing top-3 in 2012-2013 sharply decreased in 2014. Progress of the company in the previous two years was caused by the conclusion of multimillion contracts with the Federal Tax Service.

Structure of the market of the information security facility from NSD (products) (2012-2014)

Estimating trends of market development of the information security facility from NSD, analysts of "The code of security" note that in this time frame - December-January, 2015-2016 players have no possibilities of increasing sales due to natural growth of number of personal computers. Therefore the Russian producers are concentrated on high-quality change of the solutions. One of steps in this direction is adding of new functionality. Gradually products begin "acquire" contiguous functions. Vendors add to them functionality of firewalls and antiviruses.

For example, the complete solution of "The code of security" by Secret Net Studio is positioned by the company as a product for protection against external and internal threats where the functionality of the information security facility from NSD is a component. And TSS company added mechanisms of protection against viruses and rootkits to the solution Diamond ACS.

In the short term the usual market of information security tools from unauthorized access is expected by serious changes. Products will become complex. And emergence of multifunction solutions will have an impact on a landscape of the market of protection of workstations and servers in general.

File:Aquote1.png
The company systematically strengthens own analytical examination. In particular, the new research of "The code of security" became the second in 2015. Earlier we estimated readiness of the Russian companies for import substitution at information security fields, and results of this report were repeatedly quoted by experts. Determination of trends of information security market gives us the chance, relying on the revealed trends, to build effective business strategy when developing own products.
Yulia Dudkina, marketing director of Code of Security company
File:Aquote2.png

See Also

Notes