Sie sind auf Seite 1von 22

Risk & Compliance

Outlook
2 | Risk & Compliance Outlook 2011

Contents

EXeCUTIVe SUMMARY P| 03
CHALLeNGe:
Risk Management P| 05
CHALLeNGe:
Effective Patching P| 08
CHALLeNGe:
Compliance P| 10
CHALLeNGe:
Audit P| 14
RespONse:
The Risk and Compliance Market P| 16
CONCLUsION:
Emerging Trends P| 19
ReseARCH AppROACH P| 20

© 2011 Evalueserve, Inc. All Rights Reserved.


1
McAfee retained Evalueserve to conduct an independent
Executive Summary

leverage information for corporate risk assessment and satisfy


assessment of the factors that consumers of Risk and regulatory requirements. Solution subsets customized to specific
Compliance products face in 2011. This global study highlights sectors such as financial services, health, government, and
how IT decision-makers view the challenges of risk and manufacturing, will be introduced, and emerging mobile, social
compliance management in a highly regulated and increasingly and cloud technologies will find more applications in the market.
complex global business environment. The research investigates
The focus on risk and compliance management comes at a
how organizations address both risk and compliance, which are
critical juncture as companies are under considerable pressure to
so inextricably interrelated.
protect customer information and privacy, and sensitive business
The research is forward looking, revealing companies’ plans for information (business plans, intellectual property, etc.) against
refining and automating their programs in 2011 and beyond. threats from cyber criminals, competitors, and even hostile
They spent significant portions of their IT budgets on risk and governments. These pressures have intensified as national and
compliance management and are increasing spending in 2011. regional governments, industries, in some cases, business partners
require increasingly tight compliance in implementing and
This report also provides an overview of the state of the risk and
enforcing IT policies, processes, and controls around key assets and
compliance market, and prospects for consolidation and growth.
sensitive information. Most companies have to deal with multiple
Although the market is still fragmented, the scenario is likely to
regulations and no business sector is exempt
change in the short term because of immediate customer needs
from this.
in the wake of changing regulatory requirements. In 2011, we
expect to see strong competition among numerous vendors. Forward-thinking companies have implemented or are in
the process of developing risk management and compliance
Technologies that support comprehensive risk and compliance
initiatives. They are avoiding check-box compliance and fire drill
programs as integral components of successful operational
responses to security incidents in favor of sustained, continuous,
processes and strategic business goals will mature soon. Vendors
and auditable risk management programs that address IT security
will begin integrating risk assessment with business intelligence
as a business risk.
and data governance technology, bringing compliance in sync
with the business. This will enable organizations to effectively

© 2011 Evalueserve, Inc. All Rights Reserved.


4 | Risk & Compliance Outlook 2011

Key research findings • Keeping IT systems compliant is a • Audit tracking is reasonably strong
serious challenge for companies, around what changes occurred and
• Although companies are aware of as is automating compliance, and when. However, the companies fall
the factors, such as the correlation understanding and meeting the needs short in recording who made the
of threats, vulnerabilities and asset of multiple regulations. change, where and how.
value to the business, that comprise IT
• Investment in compliance products • Companies want a more solution-
business risk assessment, they still find
is strong – and will continue to grow based approach when it comes
it challenging to execute measures to
– particularly in the areas of change to selecting Risk and Compliance
address them.
assessment, file integrity monitoring products, rather than selecting vendors
• Generally, IT decision-makers are and database activity monitoring. that provide only one-off point
confident in their ability to patch products.
• When buying products in
security flaws. However, they invest
2011, companies are expected
heavy man-hours in the patching
to accord highest priority to
process, and their operations are
organizational compliance
significantly disrupted when they have
mandates on databases and
to deal with out-of-cycle patches.
networks.

© 2011 Evalueserve, Inc. All Rights Reserved.


2
Visibility Means Security and Efficiency
Challenge:
Risk Management

With full visibility into their corporate networks, companies will,


for example, focus vulnerability and threat detection efforts on
Effective risk management hinges on accurate and high-value assets. Further, remediation action, such as patching,
comprehensive visibility into a company’s affairs, including: configuration correction and re-imaging will be prioritized, rather
• Detailed asset information: network devices, servers, than taking the costly “patch everything now” approach. As we
OS, services, applications will see later in this report, patching is a
• Asset value: Importance to the time-consuming and expensive process.
business based on the potential “Half the companies feel that From a security perspective, companies
impact of interruption of service, loss that lack visibility suffer serious and
of proprietary corporate data such they can save 6–10 hours per
persistent data compromises. The 2010
as intellectual property and business week if they have 100 percent Verizon Data Breach Investigation
plans, or exposure of personally visibility into the risk posture of Report, for example, cites “unknowns”
identifiable information (customer their businesses.” in nearly half the cases that were
information, credit card numbers, investigated. These include the
patient records, etc.) following:
• Vulnerabilities and • Assets that were unknown or unclaimed by the organization
configuration errors: OS or application exploitable flaws (or business group affected)
or mis-configurations that leave critical assets open to attack
• Data that the organization did not know existed on a
• Change control processes: Determining whether strong particular asset
change and remediation procedures are in place and are
• Assets that had unknown network connections or
being adhered to; also, confirming that all critical assets are
accessibility
included in these processes
• Assets that had unknown user accounts or privileges
• Network dependencies: Visibility includes not only the
potential target assets, but also the devices along the network
paths that might be compromised and open up the more
valuable corporate data and business functions to attack

© 2011 Evalueserve, Inc. All Rights Reserved.


6 | Risk & Compliance Outlook 2011

Other data in the report reflected the America, France, and APAC, where just • Asset discovery: Asset
security impact of lack of visibility. Three over 50 percent report spending six to ten management programs are only as
of five attacks were discovered by third man-hours per month assessing threats. good as the information supplied
parties; 96 percent of the breaches were In contrast, one-third of the companies in to them. Discovery tools provide a
avoidable through simple or intermediate the UK and Germany spend just two to six complete picture of the devices on
controls; a quarter of the breaches were hours per month on threat assessments, corporate networks, and the operating
not discovered for weeks; and more than possibly because of the impact of systems, services, and applications
a third went undiscovered for months. automation. As an aside, only 26 percent running on them, as well as rogue
of McAfee users spend ten to twenty devices (Do you have wireless access
It is no surprise, then, that companies
man-hours per month compared with 31 points on your network? – No? – How
participating in this survey said that they
percent of non-users of McAfee products, do you know that?)
take risk management very seriously.
which again indicates the benefits of • Vulnerability detection: Using
Overall, 74 percent of the participating
automation. scanning tools to discover not only
companies agreed that visibility into the
risk posture of their IT environment is network-based flaws, but application
important. More than 80 percent of the vulnerabilities, database issues and
companies in the UK and North America “Four of ten respondents configuration errors.
agreed that it is important to have admitted that either they are • Risk assessment: This is a critical
visibility into their IT environment’s risk unaware of all information step that many organizations are not
posture; however, companies in Germany yet prepared to take, but it pays off
and France were less likely to consider security risks or they are not fully in reduced investment in resources.
such visibility important. protected against information Business risk can be established
A higher proportion of McAfee users (77
security risks” by weighing: the severity of the
vulnerability; the likelihood of it being
percent) agreed that this is important, as
exploited (Are there known exploits?
compared to the non-users of McAfee
Is the asset well-protected by network
products (70 percent), reflecting their
Companies also identified the key factors firewall, IPS, web application firewall,
commitment to investing in automated
that go into their IT risk assessment etc.?); the criticality of the asset and
technology to support their risk
process and the challenges they face in the business impact if the vulnerability
management and compliance efforts.
carrying through an effective and efficient is exploited; and the resources required
This visibility translates directly into more risk management. To put those responses for mitigation and remediation.
efficient operations. Half the companies in context, let us first examine the • Remediation: This is not simply a
estimate that they save from six to ten essentials of such a practice. scan-and-patch process. Remediation
hours per week if they have 100 percent should be applied within the company’s
visibility into the risk posture of their The Risk Management change control process, leveraging
businesses. Meanwhile, at least a quarter Lifecycle ticketing systems or whatever change
of the companies in the UK and North mechanisms are in place.
America estimated that they will save ten Companies operate in a dangerous
world, fraught with threats from external • Verification: Rescan or other
to twenty hours per week if they have
attackers and malicious insiders. Leading technical validation that the
100 percent visibility.
organizations have well-defined risk remediation was successful.
Consider that slightly less than half the management lifecycle programs that • Audit/Report: Documented evidence
companies surveyed spend six to ten address IT vulnerability in a business risk that the vulnerability was discovered,
man-hours per month on assessment of context, and therefore, address these assessed and remediated, and who
threats to their business. The figure is a issues more efficiently. This lifecycle is accountable.
bit higher among companies in North commonly comprises the following:

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 7

Factors Used to critical factors for determining business risk. on the business falls right in the middle
This is very closely followed by potential among their challenges, indicating
Determine Risk loss of customer faith and the impact on recognition that this is a key element
Vulnerabilities (79 percent) and threats the company’s brand. Of those surveyed in focusing their efforts (vulnerability
(78 percent) are the topmost factors in North America, 71 percent cited loss of detection and remediation) on their most
that companies take into account while man-hours as the least important factor. valuable assets. Since the respondents
determining IT risk. These are closely Loss of revenue is considered the least rated focusing their effort on their most
followed by the value of the asset (71 important by companies in APAC, the UK valuable assets and applications as the
percent) and countermeasures that and Germany. least critical of their challenges, it is clear
companies take to thwart threats they are aware of the importance of
(60 percent). Seen in line with a risk Risk Management prioritizing their efforts and therefore, use
management lifecycle, we see that IT Challenges limited resources to best effect.
leaders take the correlation of critical Notwithstanding the positive findings, a
risk factors seriously. The responses are Respondents said the biggest challenge
that their companies face is identifying large number of respondents said they still
similar across countries, and among both had work to do: four of ten respondents
users and non-users of McAfee products. threats, followed by discovering
vulnerabilities in their systems (see Figure admitted that either they are unaware of
However, ideally, organizations prefer to all information security risks or they are
reduce their efforts while reducing risk, 1). Being able to know which systems are
adequately protected from threats is the not fully protected against information
indicating a stronger need for automation security risks. While the observations are
of the IT risk management process. third biggest challenge. These challenges
are greater for those companies that have similar across most countries, half the
Multiple factors are considered while low awareness of or partial protection companies in Germany say they are not
determining business impact: 70 percent against information security risks. Note aware of all their security risks or are not
of the companies cite loss of revenue and that quantifying the impact of threats fully protected.
two-thirds consider loss of man-hours as

Figure 1: With 1 being the biggest challenge and so on, please rank your 5 biggest challenges in risk
management

Discovering threats Rank 1 2.77

Discovering vulnerabilities Rank 2 2.74

Knowing which systems are adequately protected


Rank 3 2.15
from threats
Quantifying the impact of threats on our
Rank 4 2.02
environment

Matching vulnerabilities to threats Rank 5 1.89

Remediation Rank 6 1.72

Focusing efforts on the most valuable


Rank 7 1.71
assets/applications

Source: Evalueserve Primary Research

© 2011 Evalueserve, Inc. All Rights Reserved.


3
Companies are Confident, but
Challenge:
Effective Patching

by strictly adhering to a well-defined risk management and


compliance lifecycle. Asset discovery, vulnerability detection,
Heavily Burdened and risk assessment will help them determine which systems
Security patching remains the core remediation function in actually need to be remediated; prioritize patching, and avoid
the risk management lifecycle (others or at least delay non-critical patches. Risk
include activities such as correcting management and compliance products
configuration errors and fixing coding “An average of 12 man-hours help organizations streamline their patch
flaws in applications). Almost two-thirds management programs by automating
can be saved per week if the the discovery of vulnerable systems;
of the surveyed companies say that
they are fully confident of being able to frequency of patching is reduced remediation and verification of patch
precisely patch assets. Interestingly, about from weekly to monthly.” operations, and auditing/reporting.
three-quarters of the companies in the UK
and North America claim to be confident Reducing Patching
about precisely being able to patch assets, accurately translate IT Frequency
risks into business risks, or deploy products as countermeasures
against threats. Companies in Germany are the least confident An overwhelming majority of companies patch their systems
of being able to precisely perform any of these tasks, followed at regular cycles. Of the companies surveyed, 45 percent patch
by France. Only about 40 percent companies in Germany and 55 their systems weekly, and the same number patch their systems
percent of the companies in France are confident of performing monthly. Half the companies surveyed in the UK patch their
these tasks accurately. systems monthly. The patching frequency is higher in France,
where six in ten companies patch weekly. That’s the good news.
Whatever the confidence level, patching remains a major The bad news is that as the economy recovers from the global
challenge. As we will see in this section, patching is time- recession, companies are still struggling to find their feet and
consuming and labor-intensive process. Organizations will spending time patching takes IT pros from other, high
mitigate the negative impact of their patching programs priority projects.

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 9

Cost continues to remain one of the Impact of Out-of-Cycle patching when an out-of-cycle patch
biggest challenges. Valuable man-hours is released, with McAfee product users
that could be redirected to activities that Patches and Patch Tuesday spending fewer hours than non-users,
are closer to core business needs are spent Out-of-cycle patches throw corporate demonstrating a positive impact of
on routine vulnerability patching. IT processes and resources off track, automation technology.
CIOs and their senior management disrupting operations, escalating
representatives say that they will save unanticipated (and unbudgeted cost).
valuable man-hours by reducing patching The survey shows that 82 percent of “Companies spent an average
frequency. They estimate an average of respondents feel that there is an impact of 15 hours in a week when
12 man-hours will be saved per week if due to out-of-cycle patches. In France, an out-of-cycle patch was
the frequency of patching is reduced from a quarter of the companies surveyed
reporting that out-of-cycle patches have a
released.”
weekly to monthly. North America stands
out with the highest estimated savings of major impact on operations.
18 man-hours per week. Disruptive out-of-cycle patches result in:
The reaction to “Patch Tuesdays” is similar
Accurate detection is critical. However, • Data loss
to dealing with out-of-cycle patches.
not all companies are able to pinpoint • System crashes Nearly two-thirds of the companies
threats or vulnerabilities, with just a little
• Service interruptions surveyed said that they are somewhat
above half of respondents saying they
concerned about vulnerabilities and
are able to do so. As a result, 44 percent
remediation during Patch Tuesdays.
said that they over-protect and patch
Companies in APAC (73 percent) and
everything they can. “When in doubt, “82 percent respondents feel
North America (69 percent) in particular
patch” is clearly not the way to reduce that out-of-cycle patches expressed concerns around this
patching man-hours. On the positive side, have an impact on their IT monthly burden.
61 percent of the surveyed companies in
APAC try to focus on the most important processes.” Even with fully automating risk and
assets during threat/vulnerability compliance management, 73 percent
detection. On the other hand, only one- companies said that they would review
third of the companies in France take this vulnerabilities whenever possible,
approach, while more than half try to • Productivity loss whereas, just 15 percent would forget
patch everything they can. • Remote endpoints affected about dealing with Patch Tuesday as a
• Disruption of planned activities special case. France stood out among
Organizations clearly need to make
all the countries, with 28 percent of the
effective use of automated risk • Increase in IT management and
companies saying that they plan around
management tools for accurate and security costs
Patch Tuesday on the same day.
comprehensive vulnerability detection
Respondents report that they spend
coupled with detailed asset profiling and
an average of 15 hours in a week
risk assessment based on business impact.

© 2011 Evalueserve, Inc. All Rights Reserved.


4
The Complex Compliance Environment
Challenge:
Compliance

IT Compliance obligations are expected to continue to grow. In


addition to well-established regulations, such as Sarbanes-Oxley
Today, corporations need to work with large volumes of and PCI DSS, we’ve seen, for example:
sensitive information, which is typically a target of malicious
• After years of non-enforcement, the Health Insurance
attacks. These companies also need to comply with a number
Portability Account Act (HIPAA) got some teeth when the
of regulatory mandates. Apart from
HITECH Act was passed as part of the
stipulating the minimum levels of security
Obama administration’s economic
to protect databases from theft or illegal
“25 percent of the time, recovery legislation. It provides incentives
manipulation, these regulations also
govern the disclosure of the company’s compliance is the main driver for to health care providers that convert their
health records to the electronic form and
financial and operational data to improve initiating an information security
secure them; forces disclosure of patient
organizational transparency. project.” information breaches; extends HIPAA
Compliance remains a critical driver security requirements to health care
of information security projects in providers’ partner organizations; and gives
companies. Respondents estimate that 25 percent of the time, individual states the right to cite violations and
compliance is the main reason behind initiating an information impose penalties.
security project—in North America, the figure is 31 percent. • NERC-CIP mandates tight, standards-based information
The recent growth in the risk and compliance market was security controls for the utilities industry (Stuxnet will only
spurred primarily by stricter compliance requirements put in serve to spur that along).
place by industry and governments. After the recent economic • Basel II (and now Basel III) implementations mean financial
downturn, which resulted from financial mismanagement, institutions have to demonstrate to the auditors’ satisfaction
companies now face an aggressive regulatory environment and that they have strong controls in place to monitor areas of
skyrocketing penalties in case of violation of mandates. operational risk, such as access to and exposure of
financial information.

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 11

• The US Congress continues to wrangle have to comply with up to greatest of these challenges, for CIOs
over federal cyber security legislations, 20 regulations. and their teams, is to keep their systems
which will have a profound impact • Integrating various parts of the compliant. The second biggest challenge
on both the federal government and organization: Risk and compliance is to completely automate IT controls, and
business IT security. platforms need to establish a seamless understanding complex regulations is the
and transparent flow of data across third biggest hurdle. The answer to these
In addition, auditors are honing their
the organization. This is a difficult challenges is automation and integration.
interpretations of requirements as they
task, especially when the various While it does not eliminate the need for
gain experience and are more likely to
factions of a large company may human participation, it allows skilled
hold corporate feet to the fire.
have their own vulnerabilities and professionals to focus on informed
Apart from regulatory reasons, companies regulatory requirements. This requires decision making rather than on slow and
are also turning to risk and compliance management support for a uniform error-prone manual information gathering
products because of the following factors: risk and compliance policy and process for tasks such as risk assessment and
• Multiple compliance across the organization, and tools that audit response. Automated change
regulations: The global reach scale risk management and compliance control monitoring, enforcement, and
of modern companies is making it on a large company level. reporting are key elements in achieving
difficult for them to address multiple compliance and security. Moreover, in
• Increasing complexity of
compliance regulations, which vary large organizations, it is almost impossible
malicious attacks: Corporations
from country to country, as well as to keep systems compliant, which was
around the world are facing threats
multiple regulations within each the respondents’ number one challenge,
that are growing increasingly
national jurisdiction. A company needs without automation.
sophisticated and targeted. In addition
to cater to each regulation, which to theft by cyber criminals, attacks are
may set very different compliance increasingly motivated by corporate
requirements, without disrupting the competition and nations seeking “The greatest challenge for
normal flow of information across cutting-edge intellectual property and/ CIOs and their teams is to keep
the organization. or state secrets. In order to keep up
their systems compliant.”
• Risk and compliance products with these ever-changing attacks,
help organizations apply security systems need to be constantly
controls using recognized upgraded. Apart from external threats,
standards (ISO, COBIT, NIST, etc.) corporations today also face the Risk and compliance tools enable
and map them to applicable prospect of insider sabotage, identity understanding regulations and managing
regulations: This enables fraud, and unauthorized access to each regulation off a common set of
organizations to apply a uniform set of systems and networks. processes and data (assuming they do an
sound security controls and issue audit inadequate job of mapping controls to
reports on an as-needed basis. While Challenges in Achieving each regulation and producing regulation-
half the companies participating in Compliance specific audit reports that can be tailored
the survey usually have to comply with to the companies’ specific policies
fewer than 10 regulations worldwide Companies face many challenges to and requirements).
(no small number!), around 20 percent achieve compliance (see Figure 2). The

© 2011 Evalueserve, Inc. All Rights Reserved.


12 | Risk & Compliance Outlook 2011

Figure 2: Please prioritize your biggest challenges in demonstrating


“Companies find it most compliance and remaining compliant.
challenging to comply with
regulatory mandates around
databases, which ranked number
one in the survey.”
Rank 1 Keeping systems complaint

The survey revealed that companies Rank 2 Automating IT controls


find it most challenging to comply with
regulatory mandates around databases Rank 3 Understanding regulations
(see Figure 3). This observation explains
the high current deployment and Rank 4 Managing regulations one by one
expected deployment of database
activity monitoring tools that will bring Rank 5 Compliance drift
the technology into 93 percent of the
organizations surveyed. Database security Rank 6 Reporting
has come under increased regulatory
scrutiny, focused largely on privileged Rank 7 Audit fire drills
insider usage, with heavy emphasis
on privileged user account and access
control, activity monitoring against
established “normal” usage baselines, Source: Evalueserve Primary Research

Figure 3: Which of the following is the most challenging in terms of and separation of duties. Database
complying with regulatory mandates? scanning capabilities are now included in
a number of vulnerability
management tools.
Network mandates are ranked number
two followed by applications. After
long neglect – despite the proliferation
of application-layer vulnerabilities
Rank 1 Databases
and attacks – application vulnerability
detection and remediation is merging as
Rank 2 Network
a security priority. This is especially true
as web-based applications represent
Rank 3 Applications
the tip of the spear for attacks. It is also
becoming an implicit and in some cases,
Rank 4 Storage Systems
such as PCI DSS, explicit compliance
Rank 5 Operating System (OS)
requirement for both existing production
applications and software development.
Storage systems are ranked fourth and
operating systems comes last, most
likely because this is a well understood
and addressed area of risk, taking into
account the higher inherent security in
Unix and Linux installations; the long and
Source: Evalueserve Primary Research
deep experience with Windows flaws and
patches; and Microsoft’s security initiatives
in recent years (“secure by design, secure
by default…”).

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 13

Current and Planned operations. Consider that companies tools (see Figure 4). This is followed
surveyed estimate that 14 percent of closely by file integrity monitoring (68
Deployment to Achieve downtime in a year is to the result of percent) and database activity monitoring
Compliance unauthorized changes. (68 percent) products.
As we’ve indicated previously, primarily in The UK has a significantly higher
regard to vulnerability and configuration (63 percent vs. overall 54 percent)
remediation, strong change control
“Companies that were surveyed adoption of audit reporting technology,
policies, processes and the use of estimated that 14 percent of the and Germany is lowest, with just a third
automated tools are essential to downtime in a year is the result using it currently.
effectively implement and maintain a risk of unauthorized changes.” Deployment will continue to grow sharply,
management and compliance program on
so it is expected that the overwhelming
an enterprise scale.
majority of companies will implement all
There’s good cause, not only from a of these compliance technologies by the
Small wonder that 75 percent companies
security and compliance perspective, end of 2011.
currently deploy configuration assessment
but in terms of the business impact on

Figure 4: Which of the following IT controls do you currently use/deploy to achieve compliance, and which
ones do you plan to implement in 2011?

Configuration Assessment 75% 19% 6%

File Integrity Monitoring 68% 27% 5%

Database Activity Monitoring 68% 25% 7%

Monitoring Configuration Changes 62% 31% 7%

Preventing Configuration Changes 56% 32% 12%

Audit Reporting 54% 35% 12%

Integrate with IT Change Management Processes 53% 32% 14%

Currently deployed Not currently deployed but planned for future


Neither planned nor currently deployed

Source: Evalueserve Primary Research

© 2011 Evalueserve, Inc. All Rights Reserved.


5
Audits are where the rubber meets the How Organizations Handle
Challenge:
Audit

road. Auditors’ requests for additional “Four out of ten companies


evidence result in an enormous Regulatory Audits
reported they jump into a
expenditure of time and effort producing When there is a regulatory audit coming
logs and reports in a repeating cycle of firefighting mode with an ‘all
up, four of ten companies reported
redundant effort for each audit. Worse, they jump into a firefighting mode with hands on deck’ approach when
companies often can’t prove their all ‘hands on deck.’ Such an approach approaching an audit.”
case because they cannot produce the prevents CIOs and their teams from
evidence. They may even find that they taking up strategic tasks that otherwise
are non-compliant after all, because they audit trails, less than half of them also
would help them meet their companies’
can’t effectively monitor their controls track the individual who made the change
business goals.
and processes. as well as the location of the change (see
In fact, only a quarter of the companies Figure 5). The failure to track individuals
Risk and compliance tools help companies surveyed claimed that they do not worry leaves a significant gap in accountability,
execute successful audits because they about the audit, indicating they feel they either for failure to perform their duties
support IT security controls through are not only compliant, but well-prepared properly or, in the worst case, making it
automated analysis, monitoring, when it comes time to prove it. The trend more difficult to track down a malicious
enforcement and verification, centralized was consistent across countries, except in insider. Automated tools provide complete
management and on-demand reporting. Germany, where 41 percent of IT teams audit trail information that is nearly
The ability to quickly produce forensic feel they have things under control during impossible to obtain with
evidence from common data sets to an audit. manual processes.
meet various regulatory requirements
and internal policies greatly reduces the Significantly, while around six of ten
resources committed to companies track the type of change that
compliance efforts. took place and the time of change in their

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 15

Figure 5: If you maintain audit trails of changes to your servers, which of the following control informa-
tion is included in your current audit trails?

What change occurred 69%

When the change occurred 63%

Who (user) made the change 48%

Where (what file system, directory, database)


47%
the change occurred

How the change occurred


31%
(set of events or commands)

I don’t track changes on my servers


5%
(no audit trails)

Source: Evalueserve Primary Research

Impact of Regulatory Audits Even without fines, external audits are


“43 percent of the companies expensive. Around one-third of the
Sixty-four percent companies are companies spend between $50,000 and
confident of having their internal audit
said that they cleared a follow-up
$250,000 on external audits, reflecting,
reports accepted as proof of compliance audit after they failed the initial perhaps, the burden of complying with
by external auditors. audit.” multiple regulations. A higher proportion
External audits don’t always go so well the of companies in North America and the
first time, but 43 percent of companies UK spend in this range, while, on the
another nine percent ended up paying
said that they cleared a follow-up audit other hand, just over half the companies
a fine because they did not meet a
after they failed the initial audit. However, in APAC and France spend less than
government or industry regulation.
$50,000 on external audits.

© 2011 Evalueserve, Inc. All Rights Reserved.


6
Response:
The Risk and
Compliance Market

Diversity and Fragmentation the lowest Symantec usage. These figures also indicate that
companies are using multiple vendors for single or
Managing different processes within the organization while multiple locations.
simultaneously maintaining strict levels of compliance and
security is a time-consuming and error-prone task for most Market Size and Growth
companies. Using integrated risk and compliance products,
organizations can coordinate and automate the entire security According to IDC, in 2009, the worldwide risk and compliance
and compliance process, freeing them to focus on their market grew by a modest 6 percent y-o-y, from $2.6 billion to
core business. $2.8 billion, primarily because of a sluggish world economy and
a decline in overall IT spending. However, stricter compliance
The risk and compliance market (encompassing all policy, mandates and a growing body of data disclosure laws toward
compliance, risk and vulnerability assessment products), is highly the end of 2009 increased the market growth expectations. IDC
fragmented and saturated with a large number of small players. now estimates the market to grow at a CAGR of 12.1 percent
Many of them offer products clearly defined across niche lines over 2009–2013, to reach around $4.4 billion in 2013
such as compliance offerings, risk management, and vulnerability (see Figure 6).
assessment. Several large players, with backgrounds as diverse
as ERP, business intelligence, and security software, put further Of the companies surveyed, nine of ten plan to deploying risk
pressure on an already crowded market. The market has seen a and compliance products through software; appliances were the
few mergers and acquisitions in recent times, but the frequent second most popular deployment model, with two-thirds of the
entry of new players makes market consolidation difficult. respondents. While these are conventional methods, new modes
of deployment are expected to gain preference. One-third of the
According to the survey, McAfee has the highest deployment companies surveyed plan to deploy risk and compliance through
among risk and compliance vendors—60 percent of the hosted SaaS or virtual machines. The UK emerges as an early
respondent companies using its products and services. The UK adopter, with 50 percent currently deploying risk and compliance
(70 percent) and North America (67 percent) have the highest solutions through SaaS and 61 percent deploying the technology
deployment of McAfee’s risk and compliance portfolio. as virtual machines.
McAfee is followed by Symantec (54 percent) and IBM (48 The IDC findings show that risk and compliance technology
percent). Symantec has the highest deployment (61 percent) delivered on the SaaS platform is expected to witness strong
in APAC. Germany (44 percent) and France (38 percent) report growth of 30.5 percent CAGR from 2009 to 2013.

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 17

Figure 6: Global Risk and Compliance Market

5,000

4,500 540

4,000 411
176
3,500 309
116 659
238 69 547
3,000 186
155 52 443
26 36 360
2,500 314
287
2,000

1,500 2,805 3,018


2,399 2,612
1,000 2,166 2,244

500

0
2008 2009 2010 2011 2012 2013
Software Hardware Virtualized SaaS

Source: IDC Worldwide Security and Vulnerability Management Forecast (2009–2013)

Current and Planned database activity monitoring was the


most implemented risk and compliance “Ability to provide a best-fit
Deployment technology in 2010 and is expected to be solution is the number one
The survey shows that database activity the most commonly deployed in 2011.
selection factor, indicating a
monitoring, network vulnerability, and
risk management products were the Selection Criteria strong need to offer a more
most widely implemented in 2010. Companies have observed a change
solutions-based approach and
While database activity monitoring will in the purchasing criteria for risk and reduced price point.”
continue to be a priority in 2011, security compliance products. Respondents ranked
information and event management the ability to provide a best-fit solution
(SIEM) is expected to be highest gainer for Customization moved up from the fifth
as the number one selection factor (see
2011 by moving to second spot from the position to fourth this year. Interestingly,
Figure 7), indicating a strong need to
eighth position. In 2011, the UK seems to lower capital costs fell five places from the
offer a more solutions-based approach
be more focused on higher-level product second position to seventh.
and reduced price point. This factor has
deployment such as SIEM (expected 49 moved from the fourth position last year
percent) and GRC (expected 46 percent). to the first position this year, pushing total
In 2010 and 2011, risk management cost of ownership to the second position.
stands out as the number one priority Lower operational cost ranked third.
for McAfee users; for non-users,

© 2011 Evalueserve, Inc. All Rights Reserved.


18 | Risk & Compliance Outlook 2011

Figure 7: Factors to be considered when purchasing risk and compliance products

Non-
Overall North McAfee
APAC UK Germany France McAfee
Rank America Users
Users

Ability to best address your


business problem/Best-fit solution 1 2 1 1 3 2 1 2

Total cost of ownership 2 1 2 1 1 2 1

Low operational costs 3 3 3


Customization to organizations
needs/specifications 3 2 3

Proof of concept 2

Impact on application performance 3

Low capital costs 3

Source: Evalueserve Primary Research

Market Outlook In 2011, the outlook risk and compliance on risk and compliance management in
spend is robust, with nine out of ten 2011. McAfee users are also spending
On an average, companies are spending companies estimating similar or higher heavily on information security and risk
15 percent of their IT budgets on risk IT spending levels. On an average, and compliance management when
and compliance management and 22 companies are expecting to spend 21 compared with non-users.
percent of their IT budgets on information percent more on risk and compliance
security. Companies in Germany are management in 2011. The UK is expected
the lowest spenders, with more than to be the highest spender, with an “In 2011, the outlook on risk
half spending less than 10 percent of estimated increase of 24 percent on risk and compliance spend is robust,
their IT budgets on risk and compliance and compliance management, and APAC
management. German companies with nine out of ten companies
is expected to be the lowest, with an
surveyed are also the lowest information average increase of 15 percent. estimating similar or higher IT
security spenders at 18 percent of their spending levels.”
IT budgets. More than half the users of McAfee
products are expected to spend more

© 2011 Evalueserve, Inc. All Rights Reserved.


7 Conclusion:
Emerging Trends

Moving forward, the dynamic nature of the risk and compliance trend toward integrating compliance and regulations within
market necessitates that products adapt rapidly to changing the core business structure is expected to pick up in the near
requirements and regulations placed on companies worldwide. future. Data aggregation and analytics will play increasingly
The likely trends to emerge in the market are: crucial roles in helping businesses understand the information
• Risk and compliance practices are not expected from the perspective of both compliance requirements as
to mature in the short term: Continuous changes in well as self-regulatory risk assessment. Technologies such as
the industry and new regulations will impede the maturation vulnerability management, presently used to assess network
of risk and compliance practices. For some time, innovation vulnerabilities, are expected to be gradually absorbed into risk
in risk and compliance products is expected to be driven management and remediation.
primarily by the corporations’ need to react to short-term • Emerging technologies are expected to add value
changes in compliance requirements. to risk and compliance industry: Risk and compliance
• Increasing vendor competition: Strong market growth, professionals are expected to start using emerging mobile,
coupled with a constant requirement for newer technologies social, and cloud technologies. This will not only have an
and products, is expected to bring several new vendors impact on the products at the functional level, but will also
into the risk and compliance playing field. This fragmented affect the way they are marketed and sold.
industry, however, is expected to undergo some consolidation The risk and compliance market, therefore, is expected to follow
in the following years. on its dynamic path of rapidly changing requirements and
• Vertical specialization among risk and compliance their solutions in the short term. However, risk and compliance
vendors: Vendors are expected to start differentiating solutions of the future will be based on a variety of platforms,
themselves by developing products that serve only particular and come integrated with other technologies such as business
verticals. In the long term, larger vendors will be able to intelligence. These products will allow companies to not only
capture larger and more profitable verticals, charging higher achieve basic regulatory requirements, but will also allow
prices in the process. This is expected to improve their them to use the vast store of risk and compliance information
profitability and cause a shift in revenues toward to streamline their organizations and strengthen any internal
these vendors. weaknesses. This will drive the overall maturation of this market
• Integrating risk assessment with business in the long term.
intelligence and data governance technology: The

© 2011 Evalueserve, Inc. All Rights Reserved.


8
In December 2010, a survey was conducted
Research Approach

by Evalueserve. The survey includes


responses from 353 IT decision makers,
consultants, and security analysts involved Figure 8: Distribution of Companies by Number of Employees
in the evaluation, selection, day-to-day
management, and maintenance of security
products. These respondents were from
companies that have more than 500
employees worldwide. 16%
24%
Around 41 percent of the respondents are
final decision makers for security software
for their organizations. The remaining
either influence decision making or
manage the security products.
17% 43%
The responses were gathered from a
wide spectrum of industries such as
professional services, manufacturing,
business and financial services, software
development, logistics, healthcare, retail,
and telecom.
The survey was conducted across five 500 – 900 1,000 – 4,999 5,000 – 9,999 10,000 or more
regions—North America (the USA and
Canada), the UK, Germany, France, and APAC
(Australia, Singapore, and New Zealand).

© 2011 Evalueserve, Inc. All Rights Reserved.


Risk & Compliance Outlook 2011 | 21

Figure 9: Regional break-up of interviews

North Germany
UK N = 70 (20%)
America
N = 70 (20%)
N = 72 (20%)

France
N = 71 (20%)

APAC
N = 70 (20%)

The margin of error on a sample size of 353 is ± 5.2 percent, The sample size for some questions is lower than 353. This is
with a confidence level of 95 percent—i.e., overall the findings because not all respondents qualified to answer these questions
have a 95 percent chance of lying between ± 5.2 percent. The based on their response to previous question(s).
percentages on questions where respondents could select only
one answer may not sum to 100 due to rounding.

© 2011 Evalueserve, Inc. All Rights Reserved.


About Evalueserve
Evalueserve provides knowledge services to a global client base of Fortune 5000 companies, including Investment, Commercial and
Retail Banks; Insurance Companies; Private Equity Firms; Corporates; Consulting and Research Firms; Law Firms; and Intellectual
Property Firms. Evalueserve’s expertise covers areas such as Financial and Investment Research, Business Research, Market Research,
Intellectual Property, Data Analytics, and Knowledge Technology Services. Besides, we provide access to over 25,000 experts through
our Circle of Experts.
We currently have more than 2,000 professionals in our research centers in India (Delhi-Gurgaon), China (Shanghai), Chile
(Santiago-Valparaiso), and Romania (Cluj-Napoca). In addition, we have 60 client engagement managers located in all major business
centers and regions around the world. We have sales offices in the Americas, Europe, Asia-Pacific, and the Middle East.
For more details, please visit: www.evalueserve.com or write to ITResearch@evalueserve.com

Copyright notice and disclaimers


Although the information contained in this article has been obtained from sources believed to be reliable, the author and Evalueserve disclaim all warranties as to the accuracy,
completeness or adequacy of such information. Evalueserve shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations
thereof. The contents and organization of the expression of ideas that form the documents found on this page are subject to national and international copyright protection.
You may download the documents found here for your internal use only and may not reproduce, create a derivative work from or use any portion of the white papers for any
commercial purpose without the prior written consent of Evalueserve. If you wish to request copyright permission, you must clearly indicate the contents you intend to use or
provide a complete explanation of your intended use and include your name and organizational details. Evalueserve will endeavor to provide its response within 48 hours of
receiving your request. Credit for any part of the material protected by copyright must state clearly in a prominent position sufficiently away from the text of the document that the
sole owner of copyright is Evalueserve and use of the protected material is by permission only.

Das könnte Ihnen auch gefallen