Atos - Registration Document 2016

B Atos positioning and strategy B.1 Market trends

A fast growingmarket for security and data privacy

B.1.6

the coming year analysts are advising security teams and enterprise architects to consider a security approach in the very world $US6 trillion annually by 2021. In addition the IoT growth is making cybersecurity an increasingly pressing challenge. For 2017 to 2021. Despite that, Cybercrime is expected to cost the privacy in private and public organizations. Indeed, it’s expected that $US1 trillion will be spent on cybersecurity globally from There is a growing concern from customers on security and IoT. early stage of IoT and applications design, predicting that by 2020, more than 25% of identified enterprise attacks will involve On one hand, we have the well-established one from Managed Security Services (MSS), to tools such as encryption, IAM From the market side there are nowadays a variety of solutions. Technology Cybersecurity Framework, and SANS Critical Controls. In addition, IAM (Identity and Access identify security gaps, prioritize threats, and mitigate risks such as ISO 27001, the US National Institute of Standards and Currently over 90% of organizations have adopted a security framework or, more often, an amalgam of frameworks to help that are still being discovered in some of the oldest technologies. compliance regulations are another way to combat new security risks arising from new technologies and also new vulnerabilities include AT&T, Dell, IBM, Symantec, and Verizon who are increasingly providing for. Then standardization and Management) addresses appropriate access authentication, protecting user’s digital identity from theft, and dictating what customers who are focusing on proactive threat management. There are many providers in the market but leading vendors split into, Cloud-based MSS and on-premises MSS. The cloud based MSS solution are relatively easy to implement for (Identity Access Management). MSS market can be roughly model by 2020, up from just 20% in 2016. identity and access management (IAM) purchases will use the identity and access management as a service (IDaaS) delivery times and for the right reasons. Analysts predict that 40% of individuals can access and/or perform to ensure that only the right individuals have to access the right resources at the right positions which includes: On the other hand, there is a new market where Atos clearly Prescriptive Security: This tool monitors and recognizes • threat patterns, using adaptive, self-learning to orchestrate

be in a position to effectively automate incidence response by 2018, up from zero today; happen. It is expected that by 2018, at least 10 percent of security solutions using user and entity behavior analytics will attacks before they can harm the organization or even automated tasks and respond immediately to thwarting 2017, 50% of all network attacks will take advantage of Secure Sockets Layer/Transport Layer Security (SSL/TLS) to the growing use of encryption has turned out to be a double • edge sword for many enterprises. Indeed it’s predicted that by hide their malware from security systems. This is leading organizations to extend existing network security protection to decrypt SSL/TLS traffic for deep packet inspection; cover encrypted communications by scanning SSL traffic at the enterprise gateway, using tools such as firewalls, to instance as any change will be quickly detected, helping ensure that the communicated data remains private. quantum cryptography is used to detect eavesdropping for • ElGamal, and schemes based on elliptic curves, using Shor’s algorithm for factoring and computing discrete logarithms, we However, as other quantum computers can already break the more popular encryption signature schemes such as RSA, quantum resistant cryptography. It is expected that by 2020, the quantum market will pass the five billions; are now seeing growing research in post-quantum, or will be worth $US10 Billion. of conveyance of data. Atos expects that in 2017 multimode blockchains will be deployed across industries in a market that the relatively new Blockchain technology is considered to • have the potential to enhance privacy, security and freedom era, the deployment of solutions that rapidly identify threats and As Atos considered last year, with security entering the big data detect frauds becomes a priority. But, with the current growth rate, traditional technologies could soon be simply unable to security, through real-time monitoring to enable. increasing emphasis on areas like information security and risk management machine learning, resulting in intelligence-led analyze the huge amounts of data from across a customer’s network. In order to keep pace Atos can therefore expect

B

Atos | Registration Document 2016

25

Made with