B
Atos positioning and strategy
B.1
Market trends
Atos
|
Registration Document 2016
25
B
A fast growingmarket for security and data privacy
B.1.6
the coming year analysts are advising security teams and
enterprise architects to consider a security approach in the very
world $US6 trillion annually by 2021. In addition the IoT growth
is making cybersecurity an increasingly pressing challenge. For
2017 to 2021. Despite that, Cybercrime is expected to cost the
privacy in private and public organizations. Indeed, it’s expected
that $US1 trillion will be spent on cybersecurity globally from
There is a growing concern from customers on security and
IoT.
early stage of IoT and applications design, predicting that by
2020, more than 25% of identified enterprise attacks will involve
Technology Cybersecurity Framework, and SANS Critical
Controls. In addition,
IAM (Identity and Access
identify security gaps, prioritize threats, and mitigate risks such
as ISO 27001, the US National Institute of Standards and
Currently over 90% of organizations have adopted a security
framework or, more often, an amalgam of frameworks to help
that are still being discovered in some of the oldest technologies.
compliance regulations are another way to combat new security
risks arising from new technologies and also new vulnerabilities
include AT&T, Dell, IBM, Symantec, and Verizon who are
increasingly providing for. Then
standardization
and
model by 2020, up from just 20% in 2016.
identity and access management (IAM) purchases will use the
identity and access management as a service (IDaaS) delivery
times and for the right reasons. Analysts predict that 40% of
individuals can access and/or perform to ensure that only the
right individuals have to access the right resources at the right
Management)
addresses appropriate access authentication,
protecting user’s digital identity from theft, and dictating what
customers who are focusing on proactive threat management.
There are many providers in the market but leading vendors
split into, Cloud-based MSS and on-premises MSS. The cloud
based MSS solution are relatively easy to implement for
(Identity Access Management).
MSS market
can be roughly
On one hand, we have the well-established one from Managed
Security Services (MSS), to tools such as encryption, IAM
From the market side there are nowadays a variety of solutions.
positions which includes:
On the other hand, there is a new market where Atos clearly
be in a position to effectively automate incidence response by
2018, up from zero today;
happen. It is expected that by 2018, at least 10 percent of
security solutions using user and entity behavior analytics will
attacks before they can harm the organization or even
threat patterns, using adaptive, self-learning to orchestrate
automated tasks and respond immediately to thwarting
Prescriptive Security:
This tool monitors and recognizes
•
2017, 50% of all network attacks will take advantage of
Secure Sockets Layer/Transport Layer Security (SSL/TLS) to
the growing use of
encryption
has turned out to be a double
•
edge sword for many enterprises. Indeed it’s predicted that by
hide their malware from security systems. This is leading
organizations to extend existing network security protection to
decrypt SSL/TLS traffic for deep packet inspection;
cover encrypted communications by scanning SSL traffic at
the enterprise gateway, using tools such as firewalls, to
ElGamal, and schemes based on elliptic curves, using Shor’s
algorithm for factoring and computing discrete logarithms, we
However, as other quantum computers can already break the
more popular encryption signature schemes such as RSA,
instance as any change will be quickly detected, helping
ensure that the communicated data remains private.
quantum cryptography
is used to detect eavesdropping for
•
quantum resistant cryptography. It is expected that by 2020,
the quantum market will pass the five billions;
are now seeing growing research in post-quantum, or
will be worth $US10 Billion.
of conveyance of data. Atos expects that in 2017 multimode
blockchains will be deployed across industries in a market that
the relatively new
Blockchain technology
is considered to
•
have the potential to enhance privacy, security and freedom
era, the deployment of solutions that rapidly identify threats and
As Atos considered last year, with security entering the big data
security, through real-time monitoring to enable.
increasing emphasis on areas like information security and risk
management machine learning, resulting in intelligence-led
analyze the huge amounts of data from across a customer’s
network. In order to keep pace Atos can therefore expect
detect frauds becomes a priority. But, with the current growth
rate, traditional technologies could soon be simply unable to