{"id":2048,"date":"2004-08-23T00:00:00","date_gmt":"2004-08-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/23\/report-says-virtually-all-big-companies-will-outsource-security-by-2010\/"},"modified":"2021-12-30T11:40:33","modified_gmt":"2021-12-30T11:40:33","slug":"report-says-virtually-all-big-companies-will-outsource-security-by-2010","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/23\/report-says-virtually-all-big-companies-will-outsource-security-by-2010\/","title":{"rendered":"Report says Virtually All Big Companies Will Outsource Security By 2010"},"content":{"rendered":"<p>A Yankee Group report suggests that the need to stay ahead of hackers will drive a move to outsource security to managed service providers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The need to stay ahead of the hacker curve will drive nearly 90% of big U.S. companies to outsource their security to managed service providers by the end of the decade, a report released Monday suggested.<\/p>\n<p>According to the Yankee Group, businesses will hand over security&#8211;initially for perimeter defenses but eventually for inside-the-firewall protection&#8211;to managed security service providers to the tune of $3.7 billion by 2008, a jump from 2004&#8217;s estimated $2.4 billion.<\/p>\n<p>&#8220;Enterprises are outsourcing more technology in general,&#8221; said Matthew Kovar, a VP at Yankee Group&#8217;s security solutions group.<\/p>\n<p>Enterprises know what they have to do, but more of them will see that [security] isn&#8217;t a core competency,&#8221; he added, and will hand the reins to a managed security service provider.<\/p>\n<p>Security outsourcing will prove attractive, said Kovar, for reasons other than the cost savings typically cited by companies that farm out business processes.<\/p>\n<p>Among the drivers toward managed services are the accelerated attacks of today&#8217;s threats&#8211;giving enterprises virtually no time to put up defenses on their own before an attack infiltrates a network&#8211;legislative requirements such as HIPAA and Sarbanes-Oxley, and the trend toward pushing out the network perimeter to include partners and remote workers.<\/p>\n<p>These and other factors are outpacing the average company&#8217;s ability to keep up with the latest counter-measures and techniques to thwart attacks, Kovar said in his report.<\/p>\n<p>While managed services biggest number of customers are currently those subscribing to anti-spam services, managed firewalls aren&#8217;t far behind, said Kovar.<\/p>\n<p>And as the trend continues, other security defenses now solved by hardware, such as intrusion detection and intrusion prevention, will also be shipped out for others to handle.<\/p>\n<p>&#8220;One of the easiest managed services to see success is E-mail anti-spam services,&#8221; Kovar said.<\/p>\n<p>The vendors that Yankee Group sees in the top tier include TruSecure and Symantec, with Unisys, Netsec, Solutionary, Internet Security Systems, and RedSiren close on their heels.<\/p>\n<p>http:\/\/www.informationweek.com\/story\/showArticle.jhtml?articleID=29116929<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2048","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2048"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2048\/revisions"}],"predecessor-version":[{"id":4535,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2048\/revisions\/4535"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}