{"id":2142,"date":"2006-07-06T00:00:00","date_gmt":"2006-07-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/06\/vpn-and-security-services-markets-to-reach-37b-in-2009\/"},"modified":"2021-12-30T11:40:46","modified_gmt":"2021-12-30T11:40:46","slug":"vpn-and-security-services-markets-to-reach-37b-in-2009","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/06\/vpn-and-security-services-markets-to-reach-37b-in-2009\/","title":{"rendered":"VPN and Security Services Markets to Reach $37B in 2009"},"content":{"rendered":"<p>The VPN services market took in a whopping $23 billion in 2005 and is expected to grow another 22% to hit $29 billion in 2009.  Meanwhile, the managed security services market grew to nearly $5 billion in 2005 and is forecast to jump 68% to $8 billion in 2009.  Both markets are increasingly lucrative due to increased worldwide deployment of MPLS and the complexity of deploying VPN and security solutions, says Infonetics Research in its latest market size and forecast report, VPN and Security Services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The report tracks annual VPN service revenue by service type, technology, remote access vs. site-to-site, intranet vs. extranet, and organization size, and tracks security services by service type and organization size.<\/p>\n<p>http:\/\/www.infonetics.com\/resources\/purple.shtml?ms06.vs.nr.shtml<br \/>\nhttp:\/\/www.darkreading.com\/document.asp?doc_id=98632&#038;WT.svl=wire_2<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2142","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2142"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2142\/revisions"}],"predecessor-version":[{"id":4629,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2142\/revisions\/4629"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}