Actionable Market and Customer Insight

Home > About us > Kable Global ICT

ICT Client Prospector methodology & definitions

Methodology

Kable’s ICT Client Prospector provides an insight into the ICT budgets of organizations according to their demographic profile.

The ICT Client Prospector is based on an underlying forecasting algorithm which has been developed using an extensive compilation of survey data that Kable has collected on IT spending by organizations. The forecasting algorithm has been developed as a statistical model that provides IT spending predictions based on an organization’s demographic profile.

The ICT Client Prospector tool is a combination of two components – a company database containing demographic profiles of organizations, and an underlying forecasting algorithm providing spending estimates for organizations of all types.

Data provided in the tool is based on the underlying algorithm, which forecasts ICT budgets based on a company’s demographic profile. The algorithm itself is based on a large set of recently-conducted surveys and in-depth interviews, which have included information on ICT budgets and their distribution.

The parameters for the algorithm are the organization’s industry, its annual revenues, its geography of operations, and its employee numbers. Together, these parameters constitute the demographic profile of the organization. The core assumption of the forecasting tool is that the demographic profile sufficiently captures the extent and nature of an organization’s ICT spending. Corresponding to each demographic profile, regression models have been developed, generating coefficients that can be used to forecast the expected extent and nature of ICT spending in that demographic segment.

Definitions – Spend Predictions


General details

ICT budget (US$m) – the size of the budget for information & communications technology products and services.

Internal budget (US$m) – the size of the ICT budget allocated for internal development & maintenance, most notably ICT staff costs.

External budget (US$m) – the size of the ICT budget allocated to third-party ICT products and services.

Outsourcing likelihood – the likelihood that an enterprise will outsource elements of its ICT expenditure, expressed in relative terms as ‘high’, ‘medium’ or ‘low’.

Spending by segment

Hardware - includes computer hardware, devices and peripherals (e.g. printers, semiconductors, servers and mainframes), storage, telephony infrastructure, and data/network infrastructure.

Software - includes enterprise applications & enterprise resource planning, software infrastructure (e.g. operating systems, systems management), and information management (e.g. business intelligence, content management).

IT Services - includes spending on third party IT services e.g. application services, and Infrastructure Services. Business Process Outsourcing services are not included.

Communications - relates to all telecommunications costs in the enterprise. This would include both voice and data communications costs (fixed-line telephony, managed services, connectivity, etc.), as well as mobile telephony and data costs,as well as conferencing services.

Consulting - covers professional services expenditure with third parties, e.g. business and strategy consulting, IT staff contracting, and technology & transformation consulting.

Other - any other areas not included above, where the external IT budget is spent.

Spending by channel

Internal development and maintenance (US$m) – the amount of the ICT budget allocated for internal development & maintenance, most notably ICT staff costs.

ICT product vendors (US$m) – spending directly attributed to vendors selling ICT products.

Local resellers of ICT products (US$m) – the amount of the ICT budget allocated to local resellers of ICT products, including value added resellers and distributors.

Telcos (US$m) – spending with providers of telecommunications services (voice and data, fixed and wireless) and internet services providers (including cloud services).

Systems integrators (US$m) – the amount of the ICT budget allocated to those technology services providers specialising in systems integration.

IT services providers/consulting firms (US$m) – the amount of the ICT budget allocated to firms offering infrastructure and application services, as well as specialist ICT consulting services.

Specialist outsourcers (US$m) – the ICT budget allocated to specialist IT outsourcers.

Spending by function

Data centre – enterprises’ investment in facilities (in-house and from third parties) providing a secure environment for its computer systems and associated components, including servers & mainframes, telecommunications, and data storage systems.

Service desk – expenditure on the provision of desktop services that manage an enterprise’s desktop environment and distributed IT assets.

End-user computing – expenditure on end-user computing equipment, including desktops, laptops, and mobile devices.

Network – investment made in enterprises’ network infrastructure, including its wide area network (WAN) and local area network (LAN).

Applications – expenditure on enterprise software and applications either deployed on-premise or supported remotely and delivered as a service.

Communications – as above, the costs associated with telecommunications in the enterprise, including voice and data communications over fixed and wireless networks.

Management – expenditure on the enterprise-wide administration of distributed computing systems, including both systems management and network management.

Operational ICT

Run the business – the budget allocated to running existing ICT systems and applications.

Change the business – the budget allocated for expenditure on new ICT projects.

Propensity to outsource (Infrastructure) – the likelihood that an enterprise will outsource the management of its ICT infrastructure, including the management of its data centre, storage and network & communications, expressed in relative terms as ‘high’, ‘medium’ or ‘low’.

Propensity to outsource (Applications) – the likelihood that an enterprise will outsource the management of its enterprise applications, expressed in relative terms as ‘high’, ‘medium’ or ‘low’.

Propensity to outsource (Service support & help desk) – the likelihood that an enterprise will outsource the management of its service support & help desk, including managed desktop services, expressed in relative terms as ‘high’, ‘medium’ or ‘low’.

Propensity to outsource (IT management) – the likelihood that an enterprise will outsource its overall IT management, expressed in relative terms as ‘high’, ‘medium’ or ‘low’.

Hardware spending

Desktops/laptops/ thin clients – covers end user computing devices, including personal computers, laptops, thin clients and workstations.

Network & communications equipment – enterprise IT infrastructure for networking and communications covering hubs, switches, routers, access points, and customer premise equipment.

Security – covers security hardware and appliances including content-filtering and anti-spam appliances, encryption/SSL accelerators, firewall and VPN gateways, smart card readers, and smart cards.

Mobile devices (phones, tablets, wearables) – covers all hand-held mobility devices including pocket PCs, mobile devices, smartphones, tables and wearables.

Servers – investment made in the combined categories of low-end, mid-range and high-end server systems.

Storage – IT storage infrastructure, including hard-disk drives, NAS filers and gateways, SAN adaptors and connectors, SAN disk arrays, and tape libraries.

Peripherals – covers expenditure on additional computing devices including printers, phones and adaptors, and scanning and imaging devices.

Infrastructure as a service (IaaS) – includes a set of virtual computing, storage, and network resources combined with a set of associated services.

Software spending

Application lifecycle management – covers application development, application testing, architecture and modelling, change and configuration management, development methodologies, project and portfolio management, and requirements management.

Enterprise applications – covers business process management, commerce applications, customer relationship management (CRM), enterprise resource planning, financial applications, human resources and payroll, product lifecycle management, and supply chain management.

Information management – covers business intelligence, collaboration and knowledge management, content management, data management, portals, and search.

Integration and SOA – covers application integration, data integration, legacy renewal, middleware, and SOA.

IT management software – covers application performance management, desktop management, IT service management, network management, and systems management.

Security – covers application security, business protection, communications security, content and web filtering, end-point security, identity and access management, information protection, network security, security audit and testing, and security management. 

Software infrastructure – covers application platforms, databases, e-mail and communications servers, mobile platforms, operating systems, storage management, and virtualization.

IT services spending

Application services – service expenditure relating to the development of enterprise applications, including the customization, rationalization, or modernization of off-the shelf packages, as well as the development of bespoke applications. Integration services cover the planning, design, and building of enterprise applications which automate business processes.

Hosting & data centre services –includes the management and monitoring of an enterprise’s entire IT platform. As well as covering normal servers, it includes the associated network infrastructure, storage infrastructure, security, and systems management software.

Security & privacy services – Security and privacy services help enterprises protect their IT assets and comply with an increasingly regulated environment. Examples include threat & vulnerability management services, IT security management services, IT security compliance services, secure communications services, and secure content services.

Desktop services & user support – desktop services cover the management of an enterprise’s entire desktop environment and distributed IT assets. User support services give an enterprise’s IT users a single point of contact for IT issues in the desktop environment.

Systems integration – Systems Integration is a process that includes the design, planning, implementation and project management of a solution that addresses a customer’s specific technical or business needs. It includes systems and custom applications development as well as the implementation and integration of enterprise package software.

Storage services – Storage services are the provision of managed storage services and data back-up services. The solutions themselves can be hosted within a service provider’s data centers or on a customer’s premises.

Enterprise Communications Services spending

Network services – includes private line services, ethernet, frame relay/ATM, IP VPN and site-to-site VPN services.

Broadband – expenditure on fixed data services including internet connectivity, leased lines, WAN connectivity, and other data services such as xDSL (Digital Subscriber Line), SDSL (Symmetric Digital Subscriber Line), ADSL (Asymmetric Digital Subscriber Line), IDSL (ISDN Digital Subscriber Line), ADSL2 (second-generation DSL broadband); VDSL (Very-High-Bit-Rate DSL), and HDSL (High-bit-rate DSL).

Fixed voice – expenditure on fixed-line communications for voice services, including line rental and call charges. VoIP services are excluded, as well as charges for calls routed within the same WAN.

Mobile voice –expenditure on mobile voice telephony services, including monthly subscription costs and voice minutes.

Mobile data – involves data transmission delivered by cellular carriers to cell phones and laptops. Includes charges for SMS, MMS and other data services for internet applications such as World Wide Web access, file transfer, and e-mail.

Conferencing services – expenditure on audio and video conferencing services, including unified communications, web conferencing, HD video conferencing, telepresence and real-presence solutions.

Managed & hosted IP PBX – expenditure on traditional on-premise IP PBXs which helps streamline voice and data services into a single solution. Hosted IP PBX includes a hosted service (i.e. provided outside the client location/premises) that uses IP (Internet Protocol) to provide PBX functionality.

SD-WAN – Software-defined WAN is a WAN composed of MPLS and one or more broadband Internet, Carrier Ethernet and/or LTE connections links.

Cloud computing spending

Infrastructure as a Service (IaaS) – IaaS is a set of virtual computing, storage, and network resources combined with a set of associated services

Platform as a Service (PaaS) – computing platforms typically including an operating system, programming languages and tools for program execution, databases, and web servers.

Software as a Service (SaaS) –Any application (and its associated data) which is hosted and managed by a vendor or service provider, and is delivered to customers over a network.

Public cloud –the standard cloud deployment model, whereby service providers offer computing resources including applications, servers, storage, and platforms, to enterprises over the internet. In this environment the same set of resources are shared by multiple clients.

Private cloud –refers to a secure and separate cloud-based environment that is deployed within the company’s firewall and is used by its internal and authorized stakeholders.

Hybrid cloud –a combination of the private cloud and public cloud. Both the public and private cloud operates as an independent entity, but are connected with each other via an encrypted connection which allows users to take advantage of multiple deployment models.

ICT consulting spending

Systems planning & design consulting – expenditure with IT services providers relating to both the re-design and overhaul of IT systems, as well as the planning phase relating to IT systems integrations.

Disaster recovery & business continuity planning – services that help enterprises ensure the continued availability of mission-critical processes and IT resources against potential loss or damage caused by disruptions, disasters, or IT security breaches.

Training, education and other consulting –investment made with IT consultants to provide training and education services to an enterprise’s in-house IT staff.

Definitions – Technology Priorities


Business Intelligence

Data warehousing/marts – An enterprise data warehouse holds all the business related information from all production databases, in a unified database which meets all enterprise reporting requirements for all levels of users. This data can be accessed by anyone in the extended enterprise including customers, partners, employees, managers, and executives. Data marts are just subsets of large data warehouses which are created for departments or product lines.

Analytics – Analytics software helps in data interpretation and provides visual analytics to represent data in different formats.

Real-time business intelligence –Real-time Business Intelligence (RTBI) solutions sort and analyze operational data as it’s processed and help enterprises evaluate their business processes and take business decisions based on current conditions.

Social sentiment analysis –Social Sentiment Analysis tools typically monitor posts on social media websites, analyze them, and provide meaningful analysis of customers’ sentiments or opinion about a product or brand.

Cloud Computing

Infrastructure as a Service (IaaS) – IaaS providers offer a set of virtual computing, storage, and network resources combined with a set of associated services to their customers. IaaS consumers are allowed to define and configure the IaaS resources they require, as well as the software that is run on their IaaS resources, based on the permissions set by the service provider.

Platform as a Service (PaaS) – PaaS providers offer a computing platform typically including an operating system, programming languages and tools for program execution, databases, and web servers. Customers can develop and run their applications on this platform, and the underlying computing and storage resources scale automatically to match the associated application demand.

Software as a Service (SaaS) –Any application (and its associated data) which is hosted and managed by a vendor or service provider, and delivered to customers over a network (typically the internet), falls under this category. Customers are permitted to define and configure the application resources based on their requirements and the permissions set by the service provider. They are charged based on a pay per use or subscription basis.

Private Cloud –The provision of a secure and separate cloud based environment that is deployed within the enterprise’s firewall and used by its internal and authorized stakeholders. In a private cloud set up, physical computing resources are offered in a virtualized environment, which may be hosted internally or externally and accessed across private leased lines or secure encrypted connections using public networks.

Hybrid cloud (mixed cloud & on-premise models) –The provision of an integrated cloud service that utilizes both private and public cloud models, with each model being used to perform distinct functions within an enterprise. Both the public and private cloud operate as an independent entity, but are connected with each other via an encrypted connection which allows users to take advantage of multiple deployment models.

Communications & collaboration

Managed IP-PBX – A traditional on-premise IP PBX which helps streamline voice and data services into a single solution.

Hosted IP-PBX – A hosted service (i.e. provided outside the client location/premises) that uses IP (Internet Protocol) to provide PBX functionality.

IP-Contact Center –IP contact center uses session initiated protocol (SIP) based IP communications enabling routing of both voice and data communications to any agent having access to an IP connection, hence eliminating the need for a centralized call center.

Unified communications: VoIP/Presence/Instant messaging –Unified communications (UC) is the assimilation of real-time, communication services including instant messaging, IP telephony, mobility, conferencing, fixed-mobile convergence (FMC), data sharing, and call control with non-real-time communication services such as voicemail, e-mail, SMS and fax.

Web/video/audio conferencing –Audio communication services which enable sessions among three or more people who are geographically dispersed.

Services allowing the transmission of live video images and participants’ audio. Typically includes room-based, desktop, telepresence, service-based and hybrid video conferencing services.

Offers functionalities such as real-time electronic meetings and content delivery, screen and application sharing, text chat, and group document markups with electronic whiteboarding, augmented by audio, data and video. Web conferencing services are primarily available as software, platforms and portals. Kable considers the maintenance, support, and management costs for software clients in the web conferencing market forecasts.

Content Management

Document management – Document management software offers functionalities such as document authoring, versioning, revision and access control, and workflow integration.

Records management – Records management software offers functionalities such as access management, retention, discovery, digital rights, and physical records management.

Web content management –Web content management solutions offer functionalities such as pre built templates for quick web site development, the ability to create XML files, and multi site management carried out in single environment.

Digital asset management –Digital asset management software manages an enterprises’ digital content, including video, collaborative filtering capabilities, and allowing thumbnail representations of a digital asset.

E-mail archiving –E-mail archiving software typically captures, indexes and stores e-mails on external storage devices, allowing enterprises to free up space on production servers and speed up backup times. It uses automated policies to classify, organize, retain and delete e-mail information based on requirements set by the organization.

Enterprise search –Enterprise Search tools include applications that search, discover, retrieve, analyze, and present information in response to queries generated by users or other applications, across multiple data repositories both inside and outside the organization.

Enterprise applications

Commerce Applications – Commerce applications include software products that support trading in goods and services and facilitate business functions such as online shopping, payments and order processing.

Customer Relationship Management Applications – Customer Relationship Management (CRM) applications provide enterprises with better customer insight and interactions, increased customer access, and tight integration across all customer channels and back office processes. CRM applications typically cover areas such as Customer Service Automation, Marketing Automation & Sales Force Automation.

Enterprise Resource Planning Applications –Enterprise Resource Planning is an integrated suite of business applications which supports all the core functions of an organization, including areas such as inventory control, accounting, production, logistics, and human resources.

Financial Applications –Financial Applications include software products that typically offer some or all of the following functionalities: Financial Asset Management, Purchase Order & Receivables Management, General Ledger, Tax Accounting, Management Accounting, Financial Reporting, Invoicing and Payments Management, Cash Flow Management, and Financial Planning and Budgeting.

Human Resource & Payroll Applications –Human Resource & Payroll applications include software products for the management of HR-related transactions, best practices and enterprise reporting that typically provide some or all of the following functionalities: Payroll, Workforce and Recruitment Management, Time and Attendance Management, Benefits and Incentives Management, Competency Management, and Employee Performance Management.

Office Productivity Applications –Office Productivity products typically include an integrated suite of applications that allows enterprises to manage their internal and external communications (through e-mail and social media), analyze data (using spreadsheets or in-built databases), and create documents which can be easily exchanged and modified.

Product Lifecycle Management Applications –Product Lifecycle Management Applications include software products that support product portfolio strategy, product lifecycle planning, management of activities, and the execution of those activities through each phase in a product’s life. They typically offer some or all of the following functionalities: Product Ideation, Product Design, Product Engineering, Manufacturing Process Management, Product Data Management and Product Portfolio Management.

Supply Chain Management Applications –Supply Chain Management applications include software products that streamline the flow of products, services and related information from source to customer, typically offering some or all of the following functionalities: Supplier Relationship Management, Supply Chain Planning, and Supply Chain Execution.

Vertical Specific Applications –Vertical Specific Applications include all software products which facilitate business functions in different industry verticals, and which do not fit into our existing enterprise application categories (HR, ERP, Finance, CRM, PLM, Office Productivity, and SCM).

Enterprise Networking

DC Network Hardware – Networking hardware used to connect the physical and network devices and equipment within a data center, facilitating the communication and exchange of data between them and to other external networks. The hardware components of a data center network include: networking equipment; network cabling; and network security hardware.

Campus Network Hardware – Hardware devices which are used to set up a local area network (LAN) or set of connected LANs in an organization campus (a set of buildings located in close proximity).

WLAN – Wireless local area networking (WLAN) systems provide the wireless infrastructure for laptops, mobile devices, cameras, and other disconnected networking equipment. They also provide support for Low Energy BlueTooth (BLE) location services.

Software Defined Networking – Software Defined Networking (SDN) are software and hardware products that enable a high degree of automation, automated reaction to network conditions, and tight integration to public and private cloud systems.

SD-WAN – Software Defined WAN (SD-WAN) includes overlay networking products that interconnect remote offices and cloud services to central sites. SD-WAN products maximize application reliability, by intelligently load balancing WAN connections and simplifying WAN management.

Branch Routers – Branch Routers are a class of networking equipment that interconnect a series of remote, satellite office locations with a main office. They provide security, performance, and orchestration services that adhere to central data center requirements.

Green IT & virtualization

Server virtualization – Server virtualization software helps in increasing the utilization rates of physical servers. The software typically partitions a physical server into smaller virtual servers, with each virtual server acting like a unique device running its own operating system.

Storage virtualization – Storage virtualization software pools physical storage form multiple network storage devices into a single storage device which can be managed from a single console. The software abstracts or isolates the internal functions of a storage system or service from applications, host computers or general network resources, thereby enabling application and network independent management of storage or data.

Network virtualization –Network virtualization technologies abstract the services provided by a physical network infrastructure to create a flexible pool of transport capacity that can be allocated, utilized and repurposed on demand. These virtualized networks are programmatically created, provisioned and managed, and present logical network components such as logical switches, routers, firewalls, load balancers, and VPNs to the connected workloads.

Data center power and cooling reduction technologies –These technologies help enterprises in addressing their key power and cooling challenges which include increasing computing capacity, reducing power consumption and maintaining business continuity. They measure and report on the power consumptions of devices, and if required regulate individual server power consumption. They also offer thermal monitoring and management for servers, racks or groups of servers in data centers.

Desktop virtualization –Desktop Virtualization software delivers virtualized desktop environments, which can be accessed by end users from different devices at different locations, through a single platform.

Power management tool for PCs and monitors –Software which reduces the power consumption of PCs and monitors, by automatically turning them off or moving them to a sleep state, when these devices remain idle for a long duration.

Printing and paper usage management –Software which allows enterprises to monitor and manage printing and paper usage, thereby reducing their costs and environmental impact.

Automation/Orchestration –Software which automates and reduces the operational workload of configuration, troubleshooting and IT asset management fall under the category of automation software. Orchestration tools help in co-ordinating or arranging these automated IT processes, ultimately resulting in a consolidated IT workflow.

Internet of Things (IoT)

AutoID and mobility technologies – Technologies which facilitate the automatic identification of data objects using a diverse set of methods and devices such as scanners, readers, and RFID.

Real-time location tracking – Systems that identify the current location of an object by embedding a real-time location tracking system hardware/chip in the object, consisting of wireless nodes such as tags or badges. Most real-time location tracking systems are based on Wi-Fi, Bluetooth, RFID, and GPS wireless technologies. Typical applications of real-time location tracking systems include: fleet tracking, inventory and asset tracking, network security, and navigation.

Network sensors – A group of sensor nodes with each node capable of detecting physical phenomena such as light, heat, pressure, etc.

Near field communications – A short-range wireless connectivity technology that works on the mechanism of magnetic field induction facilitating contactless communication between devices thereby enabling them to exchange data.

Telematics and RFID – Telematics refers to the use of wireless devices in facilitating the real time transmission/exchange of data. Typical applications of telematics include vehicle tracking, fleet management, satellite navigation, wireless vehicle safety communications, emergency warning systems for vehicles, and carsharing.

RFID (Radio-Frequency Identification) are electronic devices which consist of a chip and antenna and are capable of carrying small amounts of data, providing a unique identifier to the object it is embedded in. The RFID device must be scanned to retrieve the stored information about the object. Typical applications of RFID include tags, readers, signaling, and miniaturization.

Grid sensors – Grid sensors facilitate the detection of events in a sensor network, thereby enabling the remote monitoring of power generation and transmission equipment such as transformers and power lines. They also facilitate the demand-side management of resources on an energy smart grid.

Constrained application protocol – A web transfer protocol designed for machine-to-machine (M2M) applications, which is used with constrained nodes and constrained networks in the Internet of Things framework.

Security sensors – Devices that sense unusual conditions within a communication system and provide a warning signal indicating the occurrence/presence of a disturbance to the remote alarm indicator.

Supervisory control and data acquisition (SCADA) – Includes systems which gather and analyze real time data. It is used to monitor and control industrial equipment, alerting organizations about abnormal events or any wear and tear in the equipment. The system also identifies the exact part which is hit by an unusual event and the criticality of the event.

Mobility Management

Mobile Application Platform Management – Includes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile applications. These are used in a business context on “bring your own” smartphones and tablet computers, as well as those provided by the company.

Mobile Content Management – A type of content management system capable of storing and delivering content and services to mobile devices, such as mobile phones, smartphones, and PDAs.

Mobile Device Management –Software which helps enterprises secure, monitor, manage and support a variety of mobile devices deployed across an organization.

Mobile Telecom Expense Management –Includes all types of software solutions that enable systematic analysis of telecom service orders, inventory and bills regarding enterprise telecom services.

Network Services

IP/MPLS VPNs – Enables routing of network traffic across a MPLS (Multi Protocol Label Switching) backbone, usually paired with traffic marking and network performance guarantees. IP/MPLS VPNs are typically configured to be logically separate from public IP traffic for greater network security.

Site-to-site VPNs – Includes all site-to-site VPN services offered by service providers. CPE-based VPNs use IPSec tunneling over the public Internet as the primary mechanism for traffic segregation. The investment priorities for CPE-based VPN also include SSL (Secure Sockets Layer) VPNs and Remote Access VPNs.

Managed WAN – Covers the range of features and functionality that carriers offer in their wide area data networks and at the customer point of demarcation, from the transport to the network layers. Companies choosing to outsource WAN management tap deeper into carrier partner functionality, such as NOC resources and customer portal features; disaster recovery and business continuity options; and premium SLAs for the networks under management.

Ethernet – Covers the range of features and functionality that carriers offer in their wide area data networks and at the customer point of demarcation, from the transport to the network layers. Companies choosing to outsource WAN management tap deeper into carrier partner functionality, such as NOC resources and customer portal features; disaster recovery and business continuity options; and premium SLAs for the networks under management.

Optical Transport – Uses point-to-multipoint fiber to the premises in which unpowered optical splitters are used to enable an optical fiber to serve multiple premises. PON is becoming widely used by telecommunications providers to transmit telephone signals, Internet communication, and cable television signals.

Broadband – A wide bandwidth data transmission which enables simultaneous transportation of multiple signals and traffic types. The medium can be coaxial cable, optical fiber, radio or twisted pair.

WAN Acceleration and Optimization – The category of technologies and techniques used to maximize the efficiency of data flow across a wide area network (WAN). Typically includes traffic shaping, data de-duplication, compression, data caching, network monitoring, and protocol spoofing.

Voice and Access Bundles – Combines voice, data and Internet services into cost-effective packages.

Security Products

Identity & access management – Identity & access management (IAM) solutions are used to set privileges to end-users based on their profiles to access company resources. IAM solutions are mainly used to restrict end-users from unauthorized access within and outside a company and to monitor end-users’ behavior in a network.

Security & vulnerability management – Vulnerability assessment solutions scan computing devices, such as servers and PCs, to establish security vulnerabilities. Such solutions examine device settings to find out vulnerabilities and provide detailed threat statuses. Device vulnerability solutions use network or host-based scanners to scan a device in order to identify security vulnerabilities.

End-point security & anti-virus –Endpoint security solutions help in securing the network when it is accessed remotely from computing devices such as laptops and smartphones. As users try and connect to the corporate network, they create potential entrance points for viruses to enter a company’s IT systems. Endpoint security solutions are therefore deployed at device-level to secure each device from security threats and provide secure access to the corporate network.

Network security –Network security safeguards a company’s IT network infrastructure by allowing network administrators to implement policies to secure the network from unauthorized access. It includes a wide range of sub-segments such as Network Intrusion Prevention Systems, Unified Threat Management and other Network Security solutions.

Content and web filtering, including firewalls – Web Security solutions help in providing secure access to websites and web based applications. The Web security market consists of solutions such as URL filtering, Web anti-malware, Web application firewalls, and Web content filtering products.

Application Security – Application security solutions help enterprises to assess the strength of the software code relating to applications, by scanning and identifying vulnerabilities, and defending themselves against security threats.

Backup & archive – Software solutions which enable enterprises to back up their databases, files, applications, endpoints and virtual machines, offering backup monitoring, analysis and reporting capabilities. They also offer e-mail and file system archiving functionalities.

Database security – Database security products helps enterprises in securing and protecting their databases through user activity monitoring, access control, data classification and discovery, data encryption, configuration management and data masking.

Data Loss Prevention (mobile security) – Data Loss Prevention software helps enterprises in detecting potential data breaches by setting business rules for classification and the protection of business critical information. They monitor, detect and block the leakage of sensitive data while in use (at the endpoints), in motion (at network gateways) or at rest (lying in storage devices).

Security Services

Intrusion Detection and Prevention – Intrusion Detection and Prevention services involve continuous monitoring, detection, and reporting on any intrusion attempts or misuse of enterprise information, inside and outside the enterprise network.

DDoS Mitigation – These services enable organizations to protect themselves from Distributed Denial of Service (DDoS) attacks, which are intended to bring down enterprise networks, applications and services by overwhelming these enterprise resources with too much data.

Clean Pipes – These services ensure that all volumetric data traffic approaching an enterprise’s network are checked (or pass through a cleaning process), where malicious traffic is identified and blocked from reaching the servers.

Managed Authentication – Using managed authentication services enterprises ensure that the right person is accessing corporate resources. Service providers use multi-factor authentication processes for validating a user’s credentials – typically a second level authentication along with the traditional user id and password.

Identity Management – Identity and Access Management (IAM) services focus around addressing the complete requirement of the customer relating to Identity management, starting from the time they join the organization and get automated access to the various applications, to requesting for access to new applications or being able to seamlessly reset their own credentials and conduct self-service around the provisioned identities. IAM services include user provisioning, web access management, enterprise single sign-on, multi-factor authentication, and user activity compliance services.

Mobile Security – Mobile security services aim to protect devices from malware and reduce the risk of a data breach. Service providers safeguard corporate data and applications by ensuring secured access to enterprise systems. They also include consulting services for the identification and mitigation of risks in applications and mobile endpoints throughout the enterprise.

Governance, Risk and Compliance – Governance, Risk and Compliance services enables enterprises to manage regulatory and compliance requirements, identify risks and take well informed decisions to mitigate those risks.

Business Continuity – Business continuity management services ensure the continued availability of critical IT resources against the potential loss or damage caused by disruptions, disasters, or IT security breaches.

Security Information and Event Management – Security Information and Event Management (SIEM) service providers offer real-time SIEM through user activity log collection, aggregation, and storage services. Enterprises get access to global security skills and research capabilities to help them effectively identify and respond to security threats, manage compliance and reduce the cost and complexity of managing SIEM technology.

Patch management – Patch management service providers run diagnostic tests of all software installed in an enterprise, determine which devices are not secure or which software updates are missing, and patch those endpoints using systems management tools.