Press Release

Data Center Operators Looking to Security Infrastructure for New Revenue

Want to learn more?
Have an expert contact you.

CAMPBELL, Calif. (December 23, 2015) - IHS (NYSE: IHS) today released excerpts from its 2015 IHS Infonetics Cloud and Data Center Security Strategies and Vendor Leadership: Global Service Provider Survey, for which data center and cloud operators were interviewed about their strategies for deploying security in the data center and their ratings of security vendors.

“Many of the data center operators participating in our study are looking to turn their security infrastructure into a revenue-generation tool, providing off-premises security services to customers,” said Jeff Wilson, Senior Research Director for Cybersecurity Technology at IHS.

“As virtualization and SDN (software-defined networking) deployment increases, it becomes easier and easier for service providers to provide protection for their virtualized infrastructure and deliver customized for-revenue security services to customers,” Wilson said.

CLOUD AND DATA CENTER SECURITY SURVEY HIGHLIGHTS

  • When asked about basic strategies for deploying security in the data center, survey respondents clearly favor a multi-layered approach, with most already deploying a mix of hardware appliances, virtual appliances and per-VM software
  • Respondents’ highest-rated drivers for deploying virtual appliances for security are diverse: adding cloud-based services for security, deploying SDN and improving agility when deploying new security services
  • Operators surveyed have deployed or are evaluating security products from a massive list of vendors, and there is no clear leader

SECURITY SURVEY SYNOPSIS

For the 30-page 2015 cloud and data center security survey, IHS interviewed 26 incumbent, competitive, mobile and data center/cloud specialist carriers in North America, EMEA, and Asia about their strategies for deploying security in the data center. The study provides insights into data center and cloud security drivers, requirements, spending plans, deployments, suppliers and more, and features operator ratings of 11 vendors (Arbor Networks, Check Point, Cisco, F5, Fortinet, HP, Intel Security, Juniper, Palo Alto Networks, Trend Micro, VMware) on 11 criteria. This report is part of the IHS Cybersecurity Technology Intelligence Service. To inquire about research subscriptions, please visit https://www.ihs.com/about/contact-us.html.

TO SUBSCRIBE TO RESEARCH, CONTACT:

IHS: +1 844-301-7334

https://www.ihs.com/about/contact-us.html

###

About IHS (www.ihs.com)

IHS (NYSE: IHS) is the leading source of insight, analytics and expertise in critical areas that shape today’s business landscape. Businesses and governments in more than 140 countries around the globe rely on the comprehensive content, expert independent analysis and flexible delivery methods of IHS to make high-impact decisions and develop strategies with speed and confidence. IHS has been in business since 1959 and became a publicly traded company on the New York Stock Exchange in 2005. Headquartered in Englewood, Colorado, USA, IHS is committed to sustainable, profitable growth and employs approximately about 8,600 people in 32 countries around the world.

IHS is a registered trademark of IHS Inc. All other company and product names may be trademarks of their respective owners. © 2015 IHS Inc. All rights reserved.


All Industries
IHS Media Relations, +1 303 305 8021
press@ihs.com
or
Technology
Kim Howard, +1 408 483 4583
kim.howard@ihs.com

 
Related Research:
Total Security Pivot - Q3 2015
Cloud & DC Security Strategies & Vendor Leadership Service Provider Survey - 2015

Share facebook Twitter Google Plus Linked In Add This Contact Us