Advanced Threats to Drive Growth in Defense Analysis Market: IDC
Organizations are realizing that they need improved protection against targeted attacks that use malware to steal financial information.To defend against specialized threats such as financial and intellectual property theft through malware, a new segment of products has emerged that leverage a variety of technologies above and beyond signature-based defenses, which research firm IDC has dubbed Specialized Threat Analysis and Protection (STAP). The worldwide market for STAP solutions is forecast to have a compound annual growth rate (CAGR) of 42.2 percent from 2012 through 2017 with revenues reaching $1.17 billion in 2017, according to IDC's study "Worldwide Specialized Threat Analysis and Protection 2013-2017 Forecast and 2012 Vendor Shares," which examines the STAP market and provides a market size for 2011, vendor shares for 2012 and a forecast for 2013–2017. The market also includes products that allow for the reverse engineering and forensic analysis of discovered malware. Since the malware used in these types of advanced attacks is simply a tool for the collection and exfiltration of data, sophisticated hackers are using different pieces of code for each phase of the offensive, making the detection of advanced attacks much more difficult. "Organizations have quickly begun to realize that they need improved protection against targeted attacks," John Grady, research manager with IDC's Security Products group, said in a statement. "IDC has seen these solutions become a strategic necessity for many organizations, especially in the financial services and government sectors, with budget being quickly allocated to prioritize deployment."
The STAP competitive security products, which use a predominantly signature-less technology like sandboxing, emulation, big data analytics and containerization to detect malicious activity, can be based at the network level, on the endpoint or both, and scan both inbound and outbound traffic for anomalies including botnet and command and control traffic.