DEBUG: PAGE=domain, TITLE=Digital Transformation,ID=1573,TEMPLATE=subprogram
toggle expanded view
programcode = ITSDIG
programid = 193
database = t
alerts = t
neat = t
vendors = t
forecasting = f
confidence = f
definitions = t

Search within: Digital Transformation:

Access our analyst expertise:

Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.

To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.

Subscribe to blogs & alerts:

manage email alerts using the form below, in order to be notified via email whenever we publish new content:

has Database = t

Contracts Database

for Digital Transformation

Track the pattern of service adoption by monitoring Digital Transformation contract awards by your peers. Identify who are the successful vendors this industry now. Updated monthly!

These documents are available to logged in clients that have purchased access to this program.

has Confidence = f -- IGNORED

Managed Security Services

Market Analysis

by Mike Smart

published on Aug 21, 2015

Access to this report is restricted to logged in clients with access. Login to get full access

Report Overview:

NelsonHall's market analysis of the managed security services market consists of 78 pages. The report focuses on multi-year managed security services contracts, rather than contracts which are part of systems integration or short term projects.

Who is this Report for:

NelsonHall's "Managed Security Services" report is a comprehensive market assessment report designed for:

  • Sourcing managers investigating sourcing developments within the managed security outsourcing market
  • Vendor marketing, sales and business managers developing strategies to target ITO service opportunities within managed security services
  • Financial analysts and investors specializing in the IT services sector, including IT security services.

Scope of this Report:

The report analyzes the worldwide market for managed security services and addresses the following questions:

  • What is the market size and projected growth for the global managed security services market by geography?
  • What is the profile of activity in the global managed security services market by industry sector?
  • What are the top drivers for adoption of managed security services?
  • What are the benefits currently achieved by users of managed security services?
  • What factors are inhibiting user adoption of managed security services?
  • What pricing mechanisms are typically used within managed security services and how is this changing?
  • Who are the leading managed security services vendors globally and by geography?
  • What combination of services is typically provided within managed security services contracts and what new services are being added?
  • What is the current pattern of delivery location used for managed security services and how is this changing?
  • What services are delivered from onshore and which from offshore?
  • What are the challenges and success factors within managed security services?



Key Findings & Highlights:

The profile of security attackers has changed, from lone attackers to organized crime and cyber espionage at a national level. The cause of the attacks have changed as the attacker profile changes, for example lone attackers a decade ago may have targeted a very high number of email addresses with a phishing scheme, for which the attacker would get a low response rate with each hit, providing a nominal reward. Organized cybercriminals, however, may now be performing attacks targeted at a specific organization over a long period, with the express purpose of copying the organization's IP, or silently disrupting the organization's operations, to gain a competitive advantage.

The general populace is more aware of cybersecurity through the reporting of insider threats such as Snowdon and Wikileaks or mega breaches. Coupled with an increasing number of government regulations on the storage and security of client data, it has become increasingly important for organizations to have an IT security strategy.

With the growth of third party storage such as cloud based storage, a number of organizations have moved from internally managed databases to third party solutions. This move typically causes a disconnect within the organization's security operations, and creates a more attractive target for attackers.

The increasing use of cybersecurity can be attributed to:

  • Increasing cost of cybersecurity
  • Access to cybersecurity skills and up to date information
  • Ability to respond quickly to threats
  • Ability to gain a holistic view of cybersecurity
  • Strengthening social engineering around security
  • Uneven workloads inherent in IT security.

IT security services can broadly be split between application and infrastructure security:

  • Application security includes activities in support of the clients' applications or endpoints, with services including vulnerability testing/management, endpoint security management, application firewall, identity access management (IAM), and application secure development lifecycle (SDLC)
  • Infrastructure security includes activities in support of the client's network, whether this is external or internal, and the information transferred across the network. Services include vulnerability management, SIEM, firewall management, network data loss prevention (DLP), intrusion detection/prevention services (IDS/IPS).

Login to get full access:

Managed Security Services

published 2015-10-02 | Project by Mike Smart

This NelsonHall Vendor Evaluation & Assessment Tool (NEAT) analyzes the performance of vendors offering Managed Security Services. The NEAT tool allows strategic sourcing managers to assess the capability of vendors across a range of criteria and business situations and identify the best performing vendors overall, and in areas such as Offshore Focused Security Management, Industry-Specific Security Capability, and Full-Scope Security Management. Vendors evaluated include CGI, HP, CSS Corp, Cognizant Technology Solutions, MindTree, CSC, Tata Consultancy Services, Symantec, Unisys, Dell SecureWorks, Wipro, and Dimension Data. To find out more, contact Guy Saunders at [email protected].
view NEAT report all NEAT reports about NEAT
close