Skip Navigation

Home Page
Market Research Reports

Table of Contents

A. EXECUTIVE SUMMARY (3 pages)

B. CYBER SECURITY THREAT -- BACKGROUNDER & ASSESSMENT(10 pages)
1. Introduction
2. Historical Perspective: Why IP Networks are Not Secure
3. The Ever-Changing Face of the Malicious Hacker
4. The Urgency of Meeting the Botnet Threat
5. The Botnet Threat to National Governments
6. A Botnet Case Study: Taxonomy of an Attack
    a. Hijacking the Botnet to Better Understand Them
    b. Infecting the Host
    c. Torpig Threats
    d. Botnet Damage Analysis
7. The Distributed Denial of Service Attack
8. Trends in DDoS - Application-Layer Attacks
9. Drive-By Malicious Downloads
10. Masquerading Websites
11. Internal Fraud and Data Theft
12. Exploiting IP Configuration Vulnerabilities
13. How IP Configuration Problems Led to 2009 FAA Outage
14. Government Slowness to Adopt Automated Configuration Assessment

C. PRINCIPLES OF EFFECTIVE CYBER SECURITY DESIGN  (3 pages)
1. Introduction
2. Internal Security
3. Perimeter Security
4. Security Design
5. Network Security

D. THE CYBER SECURITY LIFE CYCLE (4 pages)
1. The Primary Functions: Protect, Detect, and Correct
2. Educate the Workforce
3. Enforce Policy at the Perimeter
4. Assess the Defense for Weaknesses
5. Inspect through a Fine-Grained Analysis
6. Correlate to Find the Needle in the Haystack
7. Mitigate to Minimize the Damage
8. Remediate -- Make the Network Secure Again

E. AN ADVANCED CYBER SECURITY SYSTEM FOR LARGE ENTERPRISES (8 pages)
1. Making the "Protect, Detect, Correct" Trade-Offs
2. The Different Cyber Security Needs of Enterprise Users
3. A Model for an Advanced Security Network Solution for Large Enterprises
4. Firewalls
5. Intrusion Prevention Systems
6. Honeypots
7. DoS Mitigator
8. Web Screener
9. Packet Capture
10. Forensic Analysis
11. Security Information and Event Management (SIEM)
12. Data Logging
13. Network Behavioral Analysis
14. Security Posture Management
15. Data Loss Prevention

F. ANALYSIS AND TRENDS IN CYBER SECURITY SOLUTIONS (8 pages)
1. Security Posture Management -- Assessing Vulnerability
2. Security Posture Management -- Key Regulatory Changes
3. Security Posture: Managing Policies Across Network Zones
4. Security Posture: Tracking the Value of Assets on the Network
5. Deep Packet Inspection -- Moving Beyond Net Neutrality
6. DPI -- Going Beyond Simple Signature Inspection
7. Scaling DPI By Generating & Interpreting Metadata
8. Security Forensics
9. Forensics: TiVo for the Network
10. Forensics: Finding the Needle in a Haystack
11. Forensic Zero Day Vaccine Acceleration
12. Intrusion Protection Systems- Overview and Purpose
13. IPS Scalability Concerns
14. How an IPS Prioritizing Threats - Sourcefire Example
15. IPS Full Protocol Validation -- Top Layer
16. Network Behavioral Analysis
17. NBA -- It's Use in DDoS Detection
18. DDoS Attack Mitigation without Service Loss
19. Three Steps for Preventing a DDoS Service Loss
20. Data Loss Prevention
21. Drive-By Malicious Downloads
22. SIEM -- Expoiting Data Logging to the Fullest
23. SIEM with Network Intelligence Added

G. THE INTANGIBLE REQUIREMENTS OF CYBER SECURITY SOLUTIONS (3 pages)
1. Introduction
2. Adaptability and Customization -- Arcsight and the CIA's Requirements
3. Integrating a Widely Deployed Surveillance Network using Bivio 's Platform
4. Commercial Off the Shelf
5. Software That Cuts Across Multiple Surveillance Hardware
6. Case Management for Threat Mitigation
7. Fast Insertion and Reduced Regression Testing -- CloudShield's Innovation
8. Vendor-Neutral Architecture

H. CYBER SECURITY BEST PRACTICES (4 pages)
1. Best Practice in Security
2. Leveraging a Community of Expert Users
3. Collaboration in Botnet Detection
4. Arbor's Active Threat Level Analysis System
5. Industry-Specific Best Practices
6. Improving Security in Successive Stages
7. Organizational Discipline in Cyber Security

I. GOVERNMENT & REGULATOR CYBER SECURITY POLICIES & TRENDS (5 pages)
1. A National Policy for Cyber Security
2. A New Beginning for Government
3. Consumer Role in Cyber Security
4. Role of Corporations and Service Providers
5. A Future Role for Government in Certification
6. A Security Information Exchange
7. Regulatory Compliance to Security
a. PCI-DSS (Payment Card Industry Data Security Standard)
b. HIPAA (Health Insurance Portability and Accountability Act)
c. FISMA (Federal Information Security Management Act)
d. NERC (North American Electric Reliability Corporation)
e. SOX (Sarbanes-Oxley Act)
f. GLBA (Gramm-Leach-Bliley Act)

J. CLOUD COMPUTING & VIRTUALIZATION (3 pages)
1. Introduction
2. Virtual Networking Security
3. Cloud Computing
4. An Evolutionary Approach to Cloud Computing Security

K. MARKET ANALYSIS AND FORECASTS(6 pages)
1. Revenue Categories
2. Global Revenue by Product Category
3. Global revenue by Geographic Region and Sub-Region
4. Product Category Growth Analysis
5. Enterprise Revenue by Industry
6. Recommendations to the Vendors

L. VENDOR GO-TO-MARKET STRATEGIES (2 pages)
1. Bivio Direct
2. Direct Sales by ArcSight
3. Indirect Distribution
4. The RedHat Model of Sourcefire
5. Security Operations Center Outsourcing Service
6. Flexible Pricing
7. Discount for Long Term Commitment

>M. VENDOR PROFILES (115 pages)