{"id":1850,"date":"2006-02-17T00:00:00","date_gmt":"2006-02-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/17\/secure-router-market-more-than-doubled-in-2005\/"},"modified":"2021-12-30T11:40:08","modified_gmt":"2021-12-30T11:40:08","slug":"secure-router-market-more-than-doubled-in-2005","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/17\/secure-router-market-more-than-doubled-in-2005\/","title":{"rendered":"Secure Router Market More than Doubled in 2005"},"content":{"rendered":"<p>It&#8217;s one of the most fundamental components of networking technologies, and the market is still growing, at least in terms of unit shipments.  According to Infonetics Research, the global enterprise market shipped 14 percent more routers in 2005 than 2004.  Despite that growth, pricing pressures actually caused a 3 percent decline in overall revenues to $3.3 billion, down from $3.4 billion in 2004.  Growth in the secure router segment, both in terms of units and revenues, was positive.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure router revenues on a year-over-year basis grew by 121 percent to $803 million in 2005; shipments nearly tripled.<\/p>\n<p>Matthias Machowinski, directing analyst for enterprise voice and data at Infonetics, said the difference between a secure and insecure router is that the former has some form of included firewall or encryption capability built in.<\/p>\n<p>http:\/\/www.internetnews.com\/infra\/article.php\/3586186<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1850","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1850"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1850\/revisions"}],"predecessor-version":[{"id":4337,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1850\/revisions\/4337"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}