Cybersecurity surpasses $360 billion for the channel by 2027
Jay McBain
Chief Analyst - Channels, Partnerships & Ecosystems - Canalys - Channel Influencer of the Year
The cybersecurity market
This market is dominated by the partner channel as more than 90% of it is sold and/or serviced by the ecosystem.
Emerging technologies
Systems integrators
Categories:
Security technologies designed to be deployed onto a compute device or instance with the purpose of protecting it from malicious software. This is done either by scanning for known threats or identifying malicious traits of a particular set of code. Responses taken can include blocking the threat and ensuring it is quarantined or removed.??
Security technologies designed to protect business and service provider core, access and edge networks by enforcing policies, blocking unauthorized access, inspecting traffic in real-time to identify breaches and malicious content, or establishing virtual networks for safe access.
领英推荐
3. Web and email security
Security technologies designed to protect users from accessing malicious email or websites, as well as provide secure access to web-based applications and services.?
4. Data security
Security technologies designed to help organizations identify sensitive data, and thereafter, prevent loss or theft of such data through pre-defined usage rules, behavioral analytics and/or encryption protocols.
5. Vulnerability and security analytics
Security technologies designed to log and store data, either by sensors residing in the network or by capturing output from third-party devices. This enables visibility and analysis of the security environment through management dashboard interfaces in order to either determine the root cause of breaches or identify potential points of weakness.??
Security technologies designed to provide secure, privileged and trusted connections between users and technologies. This includes single sign-on, multi-factor authentication, authorization, user management, universal directory, lifecycle management, API access management, server access and access gateway.?
Senior Managing Director
1 年Jay McBain Thanks for taking the time to share your insights on this important topic.?
Empowering Contracts, Policy & Regulations Compliance through AI
1 年Is this increase sustainable? Is it time to optimize and do more with less? I am already hearing that organization cybersecurity budgets are flat or lower for next year. What gives?
Channel Partnerships @ Vanta
1 年Aaron Melear Elliot Goldwater John Kelly Jackson Tovar Seth Wolin Sunshine Arcilla, CPA Chris Ektov Jacob Flores Kove Young Michael G. Jon Lindstrom
Cryptography doesn't have to be hard
1 年Very interesting study.??One of the questions I've been asking any of Fortanix’s new and old reselling partners is "What does security mean to you?"??The majority of the time, the partners are STILL saying that network, firewall, "micro-segmentation", analytics and the like are their main focus.??NOT Encryption, key management or key protection or frankly cryptography at all.??This study confirms that.??Companies are still relying on Walls (Firewalls), Armed Guards (Identification) and Spies (Analytics) to protect their assets (Data).??Somehow, companies need to change a pre-21st century mindset that these ancient tactics alone still work in the modern world.??Combined, this article states that pre-21st century security measures will account for almost 50% of the cyber security market growth and data protection is expected to grow by only 6.7%.??Somehow this paradigm needs to change.??Protecting data at the source is the only way to effectively protect data.
Jay, any thoughts on the intersection between cyber security, network security, and lastly physical security? I believe the market is more interconnected and needs to be looked at as a whole. And typically it is up to Channel Partners and System Integrators to deploy, connect all the pieces, and get them all working.