Who's got the power in the IT security world?

| | Comments

Share

Power — it’s about industry influence or setting security standards or breaking into networks or defending them. These are some of the most powerful and influential groups operating in the security realm today.  

Next Prev
Next Prev yah

Who's got the power?

Power — it’s about industry influence or setting security standards or breaking into networks or defending them. These are some of the most powerful and influential groups operating in the security realm today.

Next Prev yah

Symantec

According to Infonetics Research, Symantec gets to sit in the most powerful seat for a number of anti-malware software licenses sold globally, mainly for Windows-based desktop computers. But whether its past success can be replicated in a world of the future of smartphones and tablets is an open question.

Next Prev yah

Apple

Its iPads and iPhones are in demand, and Apple exerts huge control over its smartphones and tablets by requiring digitally-signed apps, plus the Apple security check, which means less chance of malware but also stifles innovation from the outside industry. What Apple can’t seem to control: users "jailbreaking" their iOS devices, which breaks this security model completely.

Next Prev yah

VMware

Well over half of enterprises are using VMware’s virtualization software, so when VMware tells security vendors what to do to suit VMware’s plans, they don’t have much choice but to listen.

Next Prev yah

Anonymous

The shadowy hackivist group Anonymous brazenly goes after its targets, mainly corporations and governments, for any imagined offense, exposing stolen data or launching denial-of-service attacks - and its ability to bring protesters out into the street, as it did across the world this year, makes it a social movement force.

Next Prev yah

Cisco

According to Infonetics research, Cisco leads in the market for intrusion-detection and prevention systems, firewalls, and network-access control. If you don’t count router-based firewalls, Check Point leads in non-router-based firewalls.

Next Prev yah

Gartner

The Gartner consulting firm and its information-technology analysts carry outsized influence with their reports on security products, service and practices. Enterprise customers use Gartner “Magic Quadrants” to make buying decisions; vendors fear not being in them.

Next Prev yah

Russian and Chinese cybercriminals

Hacker groups, particularly those regarded as Russian-speaking that hack with botnets for financial gain, and Chinese groups whose focus is believed to be stealing sensitive business and military data, are the unseen face of the unstopped "Public Enemy" of cybercrime today.

Next Prev yah

Microsoft

Through its Digital Crimes Unit, Microsoft is using its legal clout and technology acumen to go after criminally-operated botnets across the globe, resulting in the takedown of about half a dozen botnets through a coordination with courts, ISPs and others around the world. Microsoft is also naming botnet creators in legal filings, such as the Kelihos botnet master Andrey Sabelnikov of St. Petersburg, Russia.

Next Prev yah

The PCI Security Standards Council

The PCI Security Standards Council puts out network security guidelines related to payment cards which have become one of the top influencers in security implementation for any organisation accepting or processing credit- and debit cards.

1
/12

Share

Comments

Latest UK Updated 3:26pm

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message