Table of Contents Table of Contents
Previous Page  25 / 334 Next Page
Information
Show Menu
Previous Page 25 / 334 Next Page
Page Background

B

Atos positioning and strategy

B.1

Market trends

Atos

|

Registration Document 2016

25

B

A fast growingmarket for security and data privacy

B.1.6

the coming year analysts are advising security teams and

enterprise architects to consider a security approach in the very

world $US6 trillion annually by 2021. In addition the IoT growth

is making cybersecurity an increasingly pressing challenge. For

2017 to 2021. Despite that, Cybercrime is expected to cost the

privacy in private and public organizations. Indeed, it’s expected

that $US1 trillion will be spent on cybersecurity globally from

There is a growing concern from customers on security and

IoT.

early stage of IoT and applications design, predicting that by

2020, more than 25% of identified enterprise attacks will involve

Technology Cybersecurity Framework, and SANS Critical

Controls. In addition,

IAM (Identity and Access

identify security gaps, prioritize threats, and mitigate risks such

as ISO 27001, the US National Institute of Standards and

Currently over 90% of organizations have adopted a security

framework or, more often, an amalgam of frameworks to help

that are still being discovered in some of the oldest technologies.

compliance regulations are another way to combat new security

risks arising from new technologies and also new vulnerabilities

include AT&T, Dell, IBM, Symantec, and Verizon who are

increasingly providing for. Then

standardization

and

model by 2020, up from just 20% in 2016.

identity and access management (IAM) purchases will use the

identity and access management as a service (IDaaS) delivery

times and for the right reasons. Analysts predict that 40% of

individuals can access and/or perform to ensure that only the

right individuals have to access the right resources at the right

Management)

addresses appropriate access authentication,

protecting user’s digital identity from theft, and dictating what

customers who are focusing on proactive threat management.

There are many providers in the market but leading vendors

split into, Cloud-based MSS and on-premises MSS. The cloud

based MSS solution are relatively easy to implement for

(Identity Access Management).

MSS market

can be roughly

On one hand, we have the well-established one from Managed

Security Services (MSS), to tools such as encryption, IAM

From the market side there are nowadays a variety of solutions.

positions which includes:

On the other hand, there is a new market where Atos clearly

be in a position to effectively automate incidence response by

2018, up from zero today;

happen. It is expected that by 2018, at least 10 percent of

security solutions using user and entity behavior analytics will

attacks before they can harm the organization or even

threat patterns, using adaptive, self-learning to orchestrate

automated tasks and respond immediately to thwarting

Prescriptive Security:

This tool monitors and recognizes

2017, 50% of all network attacks will take advantage of

Secure Sockets Layer/Transport Layer Security (SSL/TLS) to

the growing use of

encryption

has turned out to be a double

edge sword for many enterprises. Indeed it’s predicted that by

hide their malware from security systems. This is leading

organizations to extend existing network security protection to

decrypt SSL/TLS traffic for deep packet inspection;

cover encrypted communications by scanning SSL traffic at

the enterprise gateway, using tools such as firewalls, to

ElGamal, and schemes based on elliptic curves, using Shor’s

algorithm for factoring and computing discrete logarithms, we

However, as other quantum computers can already break the

more popular encryption signature schemes such as RSA,

instance as any change will be quickly detected, helping

ensure that the communicated data remains private.

quantum cryptography

is used to detect eavesdropping for

quantum resistant cryptography. It is expected that by 2020,

the quantum market will pass the five billions;

are now seeing growing research in post-quantum, or

will be worth $US10 Billion.

of conveyance of data. Atos expects that in 2017 multimode

blockchains will be deployed across industries in a market that

the relatively new

Blockchain technology

is considered to

have the potential to enhance privacy, security and freedom

era, the deployment of solutions that rapidly identify threats and

As Atos considered last year, with security entering the big data

security, through real-time monitoring to enable.

increasing emphasis on areas like information security and risk

management machine learning, resulting in intelligence-led

analyze the huge amounts of data from across a customer’s

network. In order to keep pace Atos can therefore expect

detect frauds becomes a priority. But, with the current growth

rate, traditional technologies could soon be simply unable to