Vulnerability Management (VM)—Global Market Analysis

Adding Actionable Intelligence to Network Scan Technology

USD 4,950

* Required Fields

USD 4,950

PAY BY INVOICE

Be the first to review this product

A vulnerability assessment (VA) runs a script of known vulnerabilities against an endpoint. Vulnerability management (VM) is the formal reporting and prioritization of what is found after the scan. In 2016, VM vendors achieved $768.3 million in licenses, appliances, and related services; representing an improvement of 13.4% over 2015. VM vendors are challenged because VM scanning/reporting is a static technology, and network defenses require a combination of static and dynamic tools. Additionally, several adjacent network security technologies such as SIEM, NAC, and endpoint detection and response (EDR) also make use of behavioral analytics and machine listening technologies. However, VM has always been designed to protect the enterprise network surface. The enterprise network surface is expanding to include cloud, mobile, and Internet of Things (IoT). As much as any other network security technology, VM vendors are in a prime position to provide detection and protection products for the heterogeneous network.

A vulnerability assessment (VA) runs a script of known vulnerabilities against an endpoint. Vulnerability management (VM) is the formal reporting and prioritization of what is found after the scan. In 2016, VM vendors achieved $768.3 million in licenses, appliances, and related services; representing an improvement of 13.4% over 2015. VM vendors are challenged because VM scanning/reporting is a static technology, and network defenses require a combination of static and dynamic tools. Additionally, several adjacent network security technologies such as SIEM, NAC, and endpoint detection and response (EDR) also make use of behavioral analytics and machine listening technologies. However, VM has always been designed to protect the enterprise network surface. The enterprise network surface is expanding to include cloud, mobile, and Internet of Things (IoT). As much as any other network security technology, VM vendors are in a prime position to provide detection and protection products for the heterogeneous network.

Table of Contents

1. Executive Summary
Key Findings
Executive Summary—Market Engineering Measurements
Market Engineering Measurements
Executive Summary—Introduction to the Research
Executive Summary—CEO’s Perspective
2. Market Overview
Market Overview
Market Overview—Distribution Channels
3. Market Overview—Evolution of Vulnerability Management
Market Overview—About the Evolution of VM
Market Overview—Introducing the 4 x 4 VM Matrices
Market Overview—Historical View of VM Landscape 2010
Market Overview—Historical View of VM Landscape 2013
Market Overview—Current View of VM Landscape 2016
Market Overview—Forecast View of VM Landscape 2019
4. Market Overview—Roll-up Tables for the Evolution of Vulnerability Management
Market Overview—Roll-up Tables for the Evolution of Vulnerability Management
Market Overview—Network Environment 4 x 4 VM Metric View
Market Overview—Endpoints/Devices in VA Scans 4 x 4 VM Metric View
Market Overview—Product Deployment 4 x 4 VM Metric View
Market Overview—Revenues 4 x 4 VM Metric View
Market Overview—Definitions for Roll-up Tables for the Evolution of Vulnerability Management
5. External Challenges: Drivers and Restraints—Total Market
Drivers and Restraints
Market Drivers
No other technology does what vulnerability management does to ensure secure configurations
Vulnerability assessment scanning has visibility into each discrete endpoint which is the basis of a strong security posture
Bidirectional integration with other cyber security technologies improves both VM and the integrated technologies
VM is one of the technologies used to prove compliance
VM scales to match the architectural needs of heterogeneous networks
Market Restraints
VM scanning/reporting is a static technology, and cyber defenses require a combination of static and dynamic tools
Vulnerability management alone is not a comprehensive indicator of a network’s threat environment
Vulnerability assessment (scanning) is becoming commoditized
Other cyber security defenses are better at determining if a breach has occurred
6. Forecasts and Trends—Total Market
Total VM Market—Revenue Forecast
Total VM Revenue Forecast and Unit Shipments
Total VM Market—Pricing Trends and Forecast
Total VM Market—Revenue Forecast by Region
Total VM Market—Unit Shipments Forecast by Region
Total VM Market—Average Selling Price Forecast by Region
Total VM Market—Revenue Shipments Forecast by Product Type
Total VM Market—Unit Forecast by Product Type
Total VM Market—Average Selling Price Forecast by Product Type
Product Type Revenue Forecast and Unit Shipments (Product Definitions)
Total VM Market—Revenue Forecast by Vertical Market
Total VM Market—Unit Shipments Forecast by Vertical Market
Total VM Market—Average Selling Price Forecast by Vertical Market
Total VM Market—Revenue Forecast by Size of Business
Total VM Market—Unit Shipments Forecast by Size of Business
Total VM Market—Average Selling Price Forecast by Size of Business
7. Market Share and Competitive Analysis—Total Market
Competitive Analysis—Market Share
Qualys
Rapid7
Tenable Network Security
Tripwire
BeyondTrust
Beyond Security
Others
Competitive Analysis—Market Share (LEGACY 2015 VM Report)
Qualys
Tenable Network Security
Rapid7
Intel Security (McAfee)
Tripwire
BeyondTrust
Others
Competitive Factors and Assessment
Competitive Environment
8. Points of Competitive Differentiation
Points of Competitive Differentiation
Best Scan Engine—Qualys (tie)
Best Scan Engine—Digital Defense, Inc. (tie)
Best Continuous Monitoring Platform—Tenable Network Security
Best Privileged Account Management (PAM)?BeyondTrust
Best Use of Analytics?Rapid7
Most Versatile and Extensible Platforms/Products?Tenable Network Security
Best Cloud Scanner/Environment?Qualys
Best Threat Simulation and Countermeasures?Rapid7
Best Vulnerability Scoring?Tripwire
Best Reporting Tools?BeyondTrust
Best Remediation?Flexera Software
Best VM Value Small-to-Midsized Businesses (1-999 endpoints)?Beyond Security and AlienVault (tie)
Ease of Use VM Appliances for Enterprises?Tripwire IP360
9. Market Segmentation by Size of Business—Enterprise Segment Breakdown (10,000 or More Endpoints)
Enterprise VM Segment—Market Engineering Measurements
Enterprise Market Engineering Measurements
Enterprise VM Revenue Forecast and Unit Shipments
Enterprise VM Market—Pricing Trends and Forecast
Enterprise Competitive Environment
10. Large Business (2,500?9,999 Endpoints) Segment Breakdown
Large Business VM Segment—Market Engineering Measurements
Large Business Marketing Engineering Measurements
Large Business VM Revenue Forecast and Unit Shipments
Large Business VM Market—Pricing Trends and Forecast
Large Business Competitive Environment
11. Midsized Business (1,000?2,499 Endpoints) Market Breakdown
Midsized Business Segment—Market Engineering Measurements
Midsized Business Marketing Engineering Measurements
Midsized Business VM Revenue Forecast and Units Shipments
Midsized Business VM Market—Pricing Trends and Forecast
Midsized Business Competitive Environment
12. Small/ROBO Segment Breakdown (1-999 Endpoints)
Small/ROBO VM Segment—Market Engineering Measurements
Small/ROBO Marketing Engineering Measurements
Small/ROBO VM Unit Shipments and Revenue Forecast
Small/ROBO VM Market—Pricing Trends and Forecast
Small/ROBO Competitive Environment
13. The Last Word
The Last Word—Predictions
The Last Word—Recommendations
Legal Disclaimer
14. Vendor Profiles
Vendor Profile: AlienVault
Vendor Profile: Beyond Security
Vendor Profile: BeyondTrust
Vendor Profile: Digital Defense, Inc.
Vendor Profile: Flexera Software (formerly Secunia)
Vendor Profile: Outpost24
Vendor Profile: Promisec
Vendor Profile: Qualys
Vendor Profile: Rapid7
Vendor Profile: Tenable Network Security
Vendor Profile: Tripwire
15. Appendix
Market Engineering Methodology
Market Engineering Measurements
List of Abbreviations and Acronyms Used in the Report
Additional Sources of Information on Study Topic Area
Partial List of Companies Interviewed
List of Companies Included in “Others”
Learn More—Next Steps

Infographic



List of Figures & Charts

1. VM Market: Key Market Drivers and Restraints, Global, 2016–2021
2. Total VM Market: Competitive Structure, Global, 2016
3. Total VM Market: Points of Competitive Differentiation, Global, 2016
4. Enterprise Segment: Market Engineering Measurements, Global, 2016
5. Enterprise VM Market: Competitive Structure, Region, 2016
6. Large Business Segment: Market Engineering Measurements, Global, 2016
7. Total Large Business VM Market: Competitive Structure, Global, 2016
8. Midsized Business Segment: Market Engineering Measurements, Global, 2016
9. Midsized VM Market: Competitive Structure, Region, 2016
10. Small/ROBO Segment: Market Engineering Measurements, Global, 2016
11. Small/ROBO VM Market: Competitive Structure, Region, 2016
12. Total VM Market: Global, 2016?2021
13. Total VM Market: Global, 2016


1. Total VM Market: Global, 2016
2. Total Vulnerability Management Market: Distribution Channel Analysis, Global, 2016
3. Total VM Market: Revenue Forecast, Global, 2013–2021
4. Total VM Market: Revenue Forecast and Unit Shipments, Global, 2013?2021
5. Average Selling Price, Total VM Market: Global, 2013–2021
6. Total VM Market: Revenue Forecast by Region, Global, 2013–2021
7. Total VM Market: Unit Shipments Forecast by Region, Global, 2013–2021
8. Total VM Market: Average Selling Price Forecast by Region, Global, 2013–2021
9. Total VM Market: Revenue Forecast by Product Type, Global, 2013–2021
10. Total VM Market: Unit Shipments Forecast by Product Type, Global, 2013–2021
11. Total VM Market: Average Selling Price Forecast by Product Type, Global, 2013–2021
12. Total VM Market: Revenue Forecast by Vertical Market, Global, 2013–2021
13. Total VM Market: Unit Shipments Forecast by Vertical Market, Global, 2013–2021
14. Total VM Market: Average Selling Price Forecast by Vertical Market, Global, 2013–2021
15. Total VM Market: Revenue Forecast by Size of Business, Global, 2013–2021
16. Total VM Market: Unit Shipments Forecast by Size of Business, Global, 2013–2021
17. Total VM Market: Average Selling Price Forecast by Size of Business, Global, 2013–2021
18. Percent of Revenue, Total VM Market: Global, 2016
19. Percent of Revenue, Total VM Market: Global, 2014
20. Total Enterprise VM Market: Revenue Forecast and Unit Shipments, Global, 2013?2021
21. Average Selling Price, Enterprise VM Market: Global, 2013–2021
22. Total Large Business VM Market: Revenue Forecast and Unit Shipments, Global, 2013?2021
23. Average Selling Price, Large Business VM Market: Global, 2013–2021
24. Midsized Business VM Market: Revenue Forecast and Unit Shipments, Global, 2013?2021
25. Average Selling Price, Midsized Business VM Market: Global, 2013–2021
26. Small/ROBO VM Market: Revenue Forecast and Unit Shipments, Global, 2013?2021
27. Average Selling Price, Small/ROBO VM Market: Global, 2013–2021



Keyword1

Keyword2

Keyword3

Why Frost & Sullivan

Working with the CEO’s growth team to create a vision based on a transformation growth strategy

Creating content-based digital marketing strategies that leverage our research perspective to differentiate and “tell your story”

Tracking over 1000 emerging technologies and analyzing the impact by industry and application to reveal the companies to watch in each sector

The Frost & Sullivan team is based in our 45 global offices and have developed a powerful global understandings of how industries operate on a global level.