Idc Market Analysis Endpointsecurity2010-2014

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

MARKET ANALYSIS Worldwide Endpoint Security 20102014 Forecast and 2009 Vendor Shares

Charles J. Kolodgy

IDC OPINION
Endpoint security is the final line of defense in the battle with malware. Survey after survey confirms that some form of desktop security (e.g., antivirus, threat management, encryption, or a suite with multiple solutions) resides on the vast majority of machines. The market for these products continues to grow, even during a weak economy. With more endpoints being mobile, and thus out of the direct control of the enterprise, endpoint security requirements increase as the endpoint cannot solely rely on the network security infrastructure because many times the endpoint will be connecting to the Internet using an untrusted network connection. The information that can be acquired from a desktop machine has kept consumers and corporations buying endpoint security at a record pace. In 2009, this market was $6.6 billion, which represents 3.3% growth when compared with 2008's revenue of $6.4 billion. IDC expects the market to grow at a compound annual growth rate (CAGR) of 8.3% between 2009 and 2014, reaching a total revenue of nearly $10 billion ($9.9 billion) by the end of the forecast period. Key trends in the endpoint security software market include: The purchasing of multiple security tools (antivirus, antispyware, firewall, intrusion detection) continues to be popular with consumers and is increasing with enterprise customers. IDC believes that through the use of security suites, new security technologies can be implemented without degrading existing security capabilities. This trend will only continue as people search for more complete security that is also manageable. As the network perimeter becomes more difficult to control, endpoint security designed to protect mobile and remote workers by enforcing security policy prior to a network connection, will increase. This will require improved enterprise management capabilities associated with the endpoints. In addition to endpoint security used to enhance Internet security, there will be a growing need for the use of endpoint security to protect corporate information from unauthorized disclosure. This is performed by full-disk and file encryption and desktop data loss prevention. Consumers continue to be a huge part of the endpoint security market. The majority of endpoint security revenue is associated with consumers, and that will continue throughout the forecast period.
www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

Filing Information: November 2010, IDC #225759, Volume: 1 Security Products: Market Analysis

TABLE OF CONTENTS
P In This Study 1

Methodology ............................................................................................................................................. 1 Endpoint Security Market Definitions ........................................................................................................ 1 S i t u a t i o n O ve r vi ew 2

The Endpoint Security Market in 2009...................................................................................................... 2 Future Outlook 10

Forecast and Assumptions ....................................................................................................................... 10 Market Context ......................................................................................................................................... 16 Market Trends .......................................................................................................................................... 18 Essential Guidance Learn More 19 20

Related Research ..................................................................................................................................... 20 Methodology ............................................................................................................................................. 20

#225759

2010 IDC

LIST OF TABLES
P 1 2 3 4 5 6 7 8 9 Worldwide Endpoint Security Revenue by Vendor, 2008 and 2009 ............................................. 3 Worldwide Corporate Endpoint Security Revenue by Vendor, 2008 and 2009 ............................ 5 Worldwide Consumer Endpoint Security Revenue by Vendor, 2008 and 2009 ........................... 9 Worldwide Corporate and Consumer Endpoint Security Revenue, 20062014 ........................... 10 Worldwide Corporate Endpoint Security Revenue by Submarket, 20062014 ............................ 11 Worldwide Endpoint Security Revenue by Platform, 20082014 ................................................. 13 Key Forecast Assumptions for the Worldwide Endpoint Security Market, 20102014 ................. 13 Worldwide Endpoint Security Revenue, 20062014: Comparison of October 2009 and November 2010 Forecasts........................................................................................................... 17 Exchange Rates, 20032009 ....................................................................................................... 22

2010 IDC

#225759

LIST OF FIGURES
P 1 2 3 4 5 6 7 Worldwide Corporate Antimalware Revenue Share by Vendor, 2009.......................................... 6 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2009 ...................... 7 Worldwide Corporate Endpoint Security Suite Revenue Share by Vendor, 2009 ........................ 7 Worldwide Corporate Endpoint Access and Information Protection Revenue Share by Vendor, 2009 ............................................................................................................................... 8 Worldwide Corporate Endpoint Security Revenue Growth by Submarket, 20092014................ 12 Worldwide Endpoint Security Revenue by Region, 2009 and 2014 ............................................. 12 Worldwide Endpoint Security Revenue, 20062014: Comparison of October 2009 and November 2010 Forecasts........................................................................................................... 17

#225759

2010 IDC

IN THIS STUDY
This study examines the endpoint security market for the period from 2009 to 2014, with vendor revenue trends and market growth forecasts. Worldwide market sizing is provided for 2009. A five-year growth forecast for this market is shown for 2010 2014. Revenue and market share of the leading vendors are provided for 2009. This study concludes with market trends and IDC guidance for future success.

Methodology
See the Learn More section for a description of the forecasting and analysis methodology employed in this study. In addition, please note the following: The information contained in this study was derived from the IDC Software Market Forecaster database as of May 14, 2010. All numbers in this document may not be exact due to rounding. For more information on IDC's software definitions and methodology, see IDC's Software Taxonomy, 2010 (IDC #222023, February 2010).

Endpoint Security Market Definitions


The endpoint security market encompasses products that are designed to protect endpoints from attack or to directly protect information residing on endpoints. At the macrolevel, the market is segmented into those products that are purchased by consumers and those that are acquired by corporations and other organizations. For this research, the corporate endpoint security market is additionally segmented into the following four subcategories: Antimalware software consists of products that provide antivirus and antispyware protection. It includes both products that are signature based and those that use other technologies, such as white listing, to prevent the installation or execution of malicious software. Server security solutions include antimalware, desktop firewall, and host intrusion detection and prevention software that is designed to maintain the integrity of servers. These products primarily protect the operating system of servers to ensure that the systems do not run malicious software that can compromise the business applications and data on the servers. These products are generally more robust than desktop endpoint security and are available for a much wider set of operating systems (Windows, Unix, and Linux). This category also includes products that are designed to protect hypervisors and virtual servers. Security suites include multiple endpoint security tools in a single, centrally managed package. Endpoint security suites normally contain antivirus, antispyware, desktop firewall, and host intrusion prevention. As endpoint security

2010 IDC

#225759

solutions evolve, additional features, such as antiphishing, encryption, device control, patching, and network access, are being incorporated. Access and information protection products perform one or more of the following: encryption (full disk, file, and folder), device control, data leak prevention, or network access control.

SITUATION OVERVIEW
Endpoint security has long been a component in the IT security arsenal. It has been used to detect and remove computer viruses, prevent the implanting of spyware, protect the computer from hacking attacks while connected to the Internet, and provide data protection with encryption. With each defense, attackers would expand their abilities, which required more security. The proliferation of security products placed on a single device has become daunting to acquire and manage and equally expensive. In response, many organizations now purchase a single product that can handle multiple security requirements. Security suites have the advantage of being easier to install than multiple applications, and easier to manage, provided they can be managed with a single console. Consumers have been more apt to adopt security suites, but many corporate customers have been moving in this direction as vendors have improved the ability of enterprises to centrally manage the products. Endpoint security remains a prominent security solution. The growth in the market can be attributed to a number of factors. First is the increasing usage by consumers. As consumers expand their day-to-day interaction on the Internet, they are realizing they need to protect the critical data that now resides on their home systems. Another key factor in the growth of endpoint security is the number of attacks that are now directed toward the endpoint. Most of these attacks come via Web interactions and are difficult to defeat at a network level and must be halted at the endpoint. Last is the ever-expanding perimeter. As mobile computing devices become an island onto themselves, they must have robust security capabilities because they can't rely on network security features when they aren't connected to the corporate network.

The Endpoint Security Market in 2009


Performance of Leading Vendors in 2009
Table 1 displays 2009 worldwide revenue and market share for endpoint security vendors. Worldwide revenue for endpoint security vendors reached $6.6 billion in 2009. Seven endpoint security vendors have revenue that exceeded $150 million in 2009. These vendors, mentioned below, captured 77% of the market's total revenue: Symantec led the endpoint security market with 35.8% of the market on revenue of $2.4 billion. This represented a 2.2% growth when compared with 2008. McAfee generated $1.2 billion in endpoint security revenue and was the only other vendor with a double-digit market share (18.1%). Trend Micro generated $596 million in endpoint security revenue with a growth rate of 3.8%. It accounted for 9% of the total worldwide market.

#225759

2010 IDC

Kaspersky Lab held the fourth position with revenue of 380.1 million. It grew at a rate of 44.5% and captured a 5.8% share of the market. Sophos generated $203.1 million in endpoint security revenue and accounted for a 3.1% share of the worldwide market. AVG Technologies, another fast-growing endpoint security vendor, generated revenue of $190.1 million. It had a growth rate of 23.4% and had a 2.9% market share. ESET, the fastest-growing vendor among those companies with over $50 million in revenue, reached $159.2 million in revenue, good enough for a 2.4% share.

TABLE 1
Worldwide Endpoint Security Revenue by Vendor, 2008 and 2009
Revenue ($M) 20082009 Growth (%) 2.2 5.4 3.8 44.5 -2.8 23.4 59.4 5.2 3.0 0.8 3.9 -4.8 9.5 12.6 -4.9

2008 Symantec McAfee Trend Micro Kaspersky Lab Sophos AVG Technologies ESET F-Secure Corp. BitDefender Panda Software Webroot Check Point CA IBM Cisco 2,309.2 1,130.0 574.2 263.0 209.0 154.0 99.9 141.3 135.0 131.1 119.9 129.0 91.2 88.0 100.0

2009 2,359.8 1,191.1 596.0 380.1 203.1 190.1 159.2 148.7 139.1 132.1 124.5 122.8 99.8 99.1 95.1

2009 Share (%) 35.8 18.1 9.0 5.8 3.1 2.9 2.4 2.3 2.1 2.0 1.9 1.9 1.5 1.5 1.4

2010 IDC

#225759

TABLE 1
Worldwide Endpoint Security Revenue by Vendor, 2008 and 2009
Revenue ($M) PGP (bought by Symantec) SafeNet Inc. Avast Norman ASA PKWARE CREDANT Technologies Workshare GuardianEdge (bought by Symantec) Agnitum Becrypt InfoExpress WinMagic Adobe SoftCamp eEye AhnLhab Inc. Subtotal Other Total
Source: IDC, 2010

51.5 41.0 10.0 25.9 25.0 23.0 23.0 19.0 12.0 9.0 12.0 9.0 12.0 13.8 7.0 4.5 5,972.6 412.6 6,385.2

45.0 42.2 29.0 28.5 25.0 23.0 20.9 16.0 14.0 14.0 13.4 10.1 9.8 9.3 7.0 4.3 6,352.2 245.7 6,597.9

0.7 0.6 0.4 0.4 0.4 0.3 0.3 0.2 0.2 0.2 0.2 0.2 0.1 0.1 0.1 0.1 96.3 3.7 100.0

-12.6 2.8 190.0 10.2 -9.1 -15.8 16.7 55.6 11.7 12.2 -18.3 -32.3 -4.8 6.4 -40.5 3.3

Table 2 displays 2009 worldwide revenue and market shares for corporate endpoint security vendors.

#225759

2010 IDC

TABLE 2
Worldwide Corporate Endpoint Security Revenue by Vendor, 2008 and 2009
Revenue ($M) 20082009 Growth (%) -4.9 -1.4 -2.0 -1.4 24.6 14.9 -4.9 0.6 5.3 -1.2 59.2 1.2 21.9 -9.0 2.8 1.3 -9.1 -19.9 -15.8 55.6 11.7 -35.6 11.9 -18.3 -32.3

2008 Symantec McAfee Trend Micro Sophos Kaspersky Lab IBM Cisco Check Point CA Panda Software ESET F-Secure AVG PGP (bought by Symantec) SafeNet Webroot PKWARE CREDANT Technologies Workshare BitDefender GuardianEdge (bought by Symantec) Becrypt InfoExpress Norman ASA WinMagic Adobe SoftCamp 642.0 508.5 279.9 205.9 97.3 86.2 100.0 78.7 71.1 68.2 40.0 55.8 41.6 49.4 41.0 34.4 25.0 23.0 23.0 24.3 19.0 9.0 12.0 16.8 9.0 12.0 13.8

2009 610.8 501.5 274.4 203.1 121.2 99.1 95.1 79.1 74.9 67.4 63.7 56.5 50.7 45.0 42.2 34.9 25.0 23.0 20.9 19.5 16.0 14.0 13.4 10.8 10.1 9.8 9.3

2009 Share (%) 22.1 18.2 9.9 7.4 4.4 3.6 3.4 2.9 2.7 2.4 2.3 2.0 1.8 1.6 1.5 1.3 0.9 0.8 0.8 0.7 0.6 0.5 0.5 0.4 0.4 0.4 0.3

2010 IDC

#225759

TABLE 2
Worldwide Corporate Endpoint Security Revenue by Vendor, 2008 and 2009
Revenue ($M) eEye Avast Agnitum AhnLab Subtotal Other Total
Source: IDC, 2010

5.3 6.0 6.7 4.5 2,609.5 264.7 2,874.2

7.0 6.1 6.0 4.3 2,614.6 145.0 2,759.6

0.3 0.2 0.2 0.2 94.7 5.3 100.0

33.3 1.7 -10.7 -4.8 0.2 -45.2 -4.0

The corporate endpoint security is broken into four subcategories. Figures 14 display 2009 market shares for leading antimalware, server security, security suite, and access and information protection vendors, respectively. Table 3 displays 2009 worldwide revenue and market shares for consumer endpoint security vendors.

FIGURE 1
Worldwide Corporate Antimalware Revenue Share by Vendor, 2009

Source: IDC, 2010

#225759

2010 IDC

FIGURE 2
Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2009

Source: IDC, 2010

FIGURE 3
Worldwide Corporate Endpoint Security Suite Revenue Share by Vendor, 2009

Source: IDC, 2010

2010 IDC

#225759

FIGURE 4
Worldwide Corporate Endpoint Access and Information Protection Revenue Share by Vendor, 2009

Source: IDC, 2010

#225759

2010 IDC

TABLE 3
Worldwide Consumer Endpoint Security Revenue by Vendor, 2008 and 2009
Revenue ($M) 2008 Symantec McAfee Trend Micro Kaspersky Lab AVG BitDefender ESET F-Secure Webroot Panda Software Check Point CA Avast Norman ASA Agnitum Subtotal Other Total
Source: IDC, 2010

2009 1,749.0 689.6 321.6 258.9 139.4 119.6 95.5 92.2 89.7 64.7 43.7 25.0 22.9 17.7 8.0 3,737.5 100.7 3,838.2

2009 Share (%) 45.6 18.0 8.4 6.7 3.6 3.1 2.5 2.4 2.3 1.7 1.1 0.7 0.6 0.5 0.2 97.4 2.6 100.0

20082009 Growth (%) 4.9 11.0 9.3 56.3 24.0 8.0 59.5 7.8 4.9 2.9 -13.2 24.4 472.5 95.2 51.5 11.4 -35.7 9.3

1,667.2 621.5 294.3 165.7 112.4 110.7 59.9 85.5 85.5 62.9 50.3 20.1 4.0 9.1 5.3 3,354.4 156.6 3,511.0

2010 IDC

#225759

FUTURE OUTLOOK
Forecast and Assumptions
Worldwide revenue for the endpoint security software market reached $6.6 billion in 2009. IDC currently forecasts that the endpoint security market will increase at an 8.3% CAGR and reach $9.9 billion in 2014. The forecast is initially segmented by consumer and corporate endpoint security software products, as shown in Table 4. The consumer market is larger than the corporate market, and IDC forecasts that the consumer market will continue to outpace the corporate market throughout the forecast period. This is the result of efforts by vendors to greatly increase the rate at which people convert free trials to paid subscriptions and additional services offered with consumer security products, and it is also due to the fact that there are still a large number of consumers who do not yet purchase security software. The corporate market will continue to grow by expanding features, such as browser security, encryption, and centralized management. The customer base for corporate endpoint security will increase slightly as a result of more devices, but revenue growth will also be impacted by lower per-seat prices, which result in lower prices for suites as opposed to selling multiple individual applications. Between the corporate and consumer submarkets, the most dynamic is the corporate market, with its shift from standalone security to suites and the growing need for other endpoint security, which primarily covers data protection (endpoint encryption and data leak prevention). Table 5 provides the forecast for those submarkets.

TABLE 4
Worldwide Corporate and Consumer Endpoint Security Revenue, 20062014 ($M)
20092014 CAGR (%) 8.1 8.5 8.3

2006 Corporate Consumer Total 2,399.0 2,551.0 4,950.0

2007 2,647.8 2,991.5 5,639.3

2008 2,874.2 3,511.0 6,385.2

2009 2,759.6 3,838.2 6,597.8

2010 2,867.4 4,247.7 7,115.1

2011 3,030.9 4,603.6 7,634.5

2012 3,327.7 4,991.6 8,319.3

2013 3,691.7 5,401.2 9,093.0

2014 4,078.9 5,773.5 9,852.4

Note: See Table 7 for key forecast assumptions.


Source: IDC, 2010

10

#225759

2010 IDC

TABLE 5
Worldwide Corporate Endpoint Security Revenue by Submarket, 20062014 ($M)
20092014 CAGR (%) -6.9 6.6 18.4 9.5

2006 Antimalware Server security Security suites Access and information protection Total 1,271.8 444.7 363.5 319.0

2007 1,146.8 387.5 637.8 475.8

2008 1,017.3 395.3 847.4 614.2

2009 914.8 394.9 820.1 629.7

2010 804.9 400.1 952.7 709.8

2011 709.4 410.3 1,124.8 786.3

2012 665.8 440.3 1,348.6 873.0

2013 661.0 482.1 1,605.6 943.0

2014 638.5 544.0 1,907.1 989.3

2,399.0

2,647.8

2,874.2

2,759.6

2,867.4

3,030.9

3,327.7

3,691.7

4,078.9

8.1

Note: See Table 7 for key forecast assumptions.


Source: IDC, 2010

Figure 5 provides an illustration of the growth rates associated with the corporate endpoint security submarkets. Figure 6 illustrates the revenue attributed to three regions: the Americas; Europe, the Middle East, and Africa (EMEA); and Asia. IDC's security research team is now providing forecasts of how products will be delivered to the customer. The delivery platforms are software, hardware, virtualized, and software as a service (SaaS). Hardware for endpoint solutions generally represents security products that will be included on a USB token (encryption tokens and virtual environments) so it can be used on different devices. For virtualization, this is a delivery mechanism so the product itself resides on a hypervisor to protect the hypervisor or to centrally protect the virtual machines on the hypervisor. For SaaS, the management of the endpoint resides in the cloud and there are some features that are also performed in the cloud, but given this is endpoint security, there will be a client component that resides on an endpoint. However, all of the activities associated with deploying and managing the endpoint will be performed in a cloud architecture. Table 6 presents this forecast. Table 7 provides the key forecast assumptions for the worldwide endpoint security market.

2010 IDC

#225759

11

FIGURE 5
Worldwide Corporate Endpoint Security Revenue Growth by Submarket, 20092014

Source: IDC, 2010

FIGURE 6
Worldwide Endpoint Security Revenue by Region, 2009 and 2014

Source: IDC, 2010

12

#225759

2010 IDC

TABLE 6
Worldwide Endpoint Security Revenue by Platform, 20082014 ($M)
20092014 CAGR (%) 6.8 28.7 100.2 26.7 8.3

2008 Software Hardware Virtualized SaaS Total 6,196.8 6.4 3.2 178.8 6,385.2

2009 6,383.1 7.3 9.5 197.9 6,597.8

2010 6,842.6 9.2 21.3 241.9 7,115.1

2011 7,284.1 12.1 36.6 301.6 7,634.5

2012 7,800.6 15.4 91.5 411.8 8,319.3

2013 8,330.1 20.0 172.8 570.1 9,093.0

2014 8,874.0 25.6 305.4 647.3 9,852.4

Note: See Table 7 for key forecast assumptions.


Source: IDC, 2010

TABLE 7
Key Forecast Assumptions for the Worldwide Endpoint Security Market, 2010 2014
Accelerator/ Inhibitor/ Neutral

Market Force Macroeconomics Economy

IDC Assumption

Impact

Certainty of Assumption

IDC assumes that worldwide economic growth will rebound to 3.2% in both 2010 and 2011. During the first half of 2010, the forecast trended slightly up.

High. The economy has been an inhibitor on IT spending. However, the impact on endpoint security is less than on other sectors as companies still see the value of these products, and consumers are willing to pay to mitigate their worries about cybercrime. Moderate. Compliance and governance will have a positive impact on security spending. Compliance spending seems to be funding itself through betterrun business operations.

Policy, IT governance, and regulatory compliance

Increased attention to sound IT governance policies and compliance with regulatory requirements drive an increased focus on content, storage, and data protection.

2010 IDC

#225759

13

TABLE 7
Key Forecast Assumptions for the Worldwide Endpoint Security Market, 2010 2014
Accelerator/ Inhibitor/ Neutral

Market Force Technology/ service developments Enterprise 2.0

IDC Assumption

Impact

Certainty of Assumption

Enterprise 2.0 tools, aka Web 2.0 tools used for business, will be selected because information workers find them helpful. These tools also will continue to be either free as a shadow IT self-initiative or lower priced than traditional tools as an IT-supported initiative. Reductions in IT budgets to many areas will mean that information workers will need to be self-sufficient to find the tools they need. Vendors will continue security software, hardware, and services innovation at the same rate as in the past. Many firms remain cautious with regard to major IT investment/project implementation and have shifted to a more modular approach with longer periods of testing and slower rates of decision making and implementation. Hackers and organized crime continue to find ways to misuse other people's software. Attack vectors will move to focus on the application layer including Web applications. Endpoints and browsers are a key target.

Moderate. The combination of a global recession, the need to do even more with even less, and the growing availability of Enterprise 2.0 tools means that adoption of enterprise social networking, blogs, wikis, and other tools will skyrocket. Security for these efforts will fuel innovation and product growth.

Innovation

Low. The security market will not face bottlenecks from lack of new product development.

Modular IT/ risk aversion

Moderate. Overall demand will still fluctuate in the face of macroeconomic drivers/inhibitors, but the market should be less volatile. Large firms are taking a more long-term approach to IT than in previous years.

Security threat environment

High. The ability to bury malware within other software remains a dangerous trend that will lead to improved spyware software and increase the need for software and application security tools. It will increase the need for security to enforce application execution.

14

#225759

2010 IDC

TABLE 7
Key Forecast Assumptions for the Worldwide Endpoint Security Market, 2010 2014
Accelerator/ Inhibitor/ Neutral

Market Force Market ecosystem Buyer sentiment

IDC Assumption

Impact

Certainty of Assumption

Buyers will remain pessimistic until they see solid changes in the economic environment.

Moderate. Buyer sentiment has long-term consequences for the approval of IT projects.

Labor supply Distribution of talent IT security personnel are in short supply. Moderate. The limited supply of trained security personnel requires solutions that are easy to use, reduces the need for trained security personnel, and adds value to other IT solutions.

Capitalization Venture capital and M&A Venture funding of security start-ups has been reduced as investors have looked toward taking public companies private or encouraged mergers and acquisitions. However, promising security technologies are still being funded. Moderate. There doesn't seem to be a funding limitation to IT innovation that would alter IT forecasts.

Market characteristics Vertical specialization by large vendors Many large applications vendors that play in the "horizontal" markets have begun to add industry-specific offerings, through organic development and/or acquisition, to their product lines. Moderate. Security-specific best-of-breed vendors will move to differentiate themselves. In addition, larger vendors can put pricing pressure on small vendors by offering deals involving horizontal applications, industry-specific applications, and infrastructure. This should shift revenue to larger vendors, albeit at lower prices, and augment overall large vendor market share but slow overall market growth.

2010 IDC

#225759

15

TABLE 7
Key Forecast Assumptions for the Worldwide Endpoint Security Market, 2010 2014
Accelerator/ Inhibitor/ Neutral

Market Force The Internet

IDC Assumption Internet adoption is still going strong, especially in emerging economies. In the next four years, 700 million new users will come online and commerce will double. As people spend more time online, actively participating in Web 2.0 technologies, information workers will start expecting Enterprise 2.0 applications in the workplace.

Impact Moderate. As more people get online, threats will increase and security solutions will be in greater demand.

Certainty of Assumption

Legend: very low, low, moderate, high, very high


Source: IDC, 2010

Market Context
Table 8 and Figure 7 show a comparison of IDC's current forecast with the forecast published in Worldwide Endpoint Security 20092013 Forecast and 2008 Vendor Shares (IDC #220273, October 2009). IDC has slightly increased the growth of the endpoint security market in 2010 due to continued strong consumer sales. In the following years though IDC has reduced the forecast growth rate, primarily because that growth was anticipated as a bump from poor sales in 2009 and 2010, but the dip isn't as great, so the rebound won't be as high either. The overall CAGR of 8.3% is similar to the previous forecast CAGR of 8.5%. The Market Trends section provides some insight on how IDC believes this market will develop.

16

#225759

2010 IDC

TABLE 8
Worldwide Endpoint Security Revenue, 20062014: Comparison of October 2009 and November 2010 Forecasts ($M)
2006 November 2010 forecast Growth (%) October 2009 forecast Growth (%) Notes: See Worldwide Endpoint Security 20092013 Forecast and 2008 Vendor Shares (IDC #220273, October 2009) for prior forecast. Historical market values presented here are as published in prior IDC documents based on the market taxonomies and current U.S. dollar exchange rates existing at the time the data was originally published. For more details, see the Methodology in the Learn More section.
Source: IDC, 2010

2007 5,639.3 13.9 5,639.3 13.9

2008 6,385.2 13.2 6,385.2 13.2

2009 6,597.8 3.3 6,650.0 4.1

2010 7,115.1 7.8 7,085.9 6.6

2011 7,634.5 7.3 7,713.3 8.9

2012 8,319.3 9.0 8,582.3 11.3

2013 9,093.0 9.3 9,583.9 11.7

2014 9,852.4 8.4 NA NA

4,950.0 NA 4,950.0 NA

FIGURE 7
Worldwide Endpoint Security Revenue, 20062014: Comparison of October 2009 and November 2010 Forecasts

Source: IDC, 2010

2010 IDC

#225759

17

Market Trends
The developments that will shape this market in the future include the following: Global market. The endpoint security software market is global. This doesn't represent that these security features are used globally, which they are, but that the leading vendors in this space span the globe. Of the 12 leading vendors, twothirds of them are headquartered around the world. The vendors have headquarters in Japan (Trend Micro), Russian Federation (Kaspersky Lab), the United Kingdom (Sophos), the Czech Republic (AVG Technologies), Finland (FSecure), Romania (BitDefender), Spain (Panda Software), Israel (Check Point), and the Slovak Republic (ESET). This globalization illustrates how important endpoint security is, how it is important to catch threats as early as possible, and the value of regionalization. Because endpoints are used by end users, the products need to be in the language of the end user and have other cultural and social familiarization. IDC believes there will continue to be leading vendors located around the globe. Growing threats changing protection landscape. Threats targeting endpoints continue to grow. The speed with which threats are increasing (millions of malware variations) is making it increasingly difficult for signature-based antimalware to keep up. Signature databases are growing, thus impacting performance, and making antimalware less accurate. To ensure that endpoints can remain secure (clean of malware), antimalware products are changing to deal with these threats. Security products are moving to rely less on signatures and instead adopt other forms of detection. Many products have incorporated heuristics to uncover malicious activities. Other products are incorporating "white listing" that will only allow authorized applications to run. Other technologies such as browser security and virtualization are also being used to improve endpoint security. Additionally, to reduce the growth in signature files, many vendors are using reputation services that can identify threatening and malicious content available on the Internet and blocking access to that content before it ever gets to the endpoint. Reputation services are part of larger software-as-a-service offerings, which can provide standard scanning in the cloud. These services are especially important for consumers and small and medium-sized businesses. Virtualization. Endpoints, especially laptops and netbooks, are increasingly difficult to protect given the growing malware threat. One method that can strengthen trust in endpoints is through the use of endpoint virtualization. By using virtualization, the user's environment can be locked down to remove unnecessary functions and features. Virtualization can remove threats in that when the virtual machine is closed, any malware that was picked up will be eliminated. Endpoint virtualization can be delivered using standard virtual desktop technology but virtual endpoints can also be delivered on a USB thumb drive. In addition to desktop virtualization, server security will see resurgence with virtualization. As more enterprises utilized virtual servers, they will be searching for security solutions that will protect the server hosting the virtualized environment; the hypervisor; and protect the virtual servers from malware and hacker attacks. IDC expects enterprises to be very interested in virtualization security both as a means of protection and as a method of protection.

18

#225759

2010 IDC

Web attack protection. A new technology impacting endpoint security is Web attack protection. Many browsers have included pop-up protection and antiphishing features, but consumers and organizations are beginning asking for more. Reputation services, which are used to improve the performance of endpoint security (see "Growing threats" above), has the added benefit of improving Web attack protection by identifying Web sites that are suspected of providing malicious content, are phishing sites, or provide infected downloads. The tools, which in many cases provide basic capabilities using a free browser plug-in, can notify users about sites before they go to the site or while they are doing Web searches. Free endpoint security. Some of the fastest-growing products in the endpoint security market are free. Providing free security to consumers is nothing new. However, more and more people are turning to free antimalware products. Although free security is better than no security, in most cases the free products only provide a basic level of protection. In most cases, the free products are only providing basic antivirus but customers are looking for a complete suite of security capability. In many cases, free security software allows customers to "kick the tires" before purchasing a full service product. IDC believes that free endpoint security software is not a detriment to the market but is a viable channel for many vendors to reach customers. Paid products continue to incorporate advanced features that are worth the investment. IDC sees free consumer software would in the future be part of managed security services that can offer consumers professional remote IT expertise in such areas as software installation, printer setup, PC tune ups, backups, and virus removal.

ESSENTIAL GUIDANCE
As computers and networking continue to be critical to business success, endpoints become an engine for business success. People use computers and other devices to communicate, share information, and run applications. As endpoints proliferate, they gain in importance and become more valuable to attackers. With ever-increasing mobility, endpoint security becomes even more important. IDC believes that endpoint security will remain a critical component of a security in-depth strategy. IDC would expect that the separate desktop antivirus, desktop antispyware, desktop firewall, host intrusion prevention, and desktop data protection products will all be incorporated into an integrated endpoint security product. Many vendors have already introduced such products. This single agent is easier to install and manage while being able to match the capabilities of individual standalone products. Like all security technologies, endpoint security has to respond to an ever-changing and increasingly aggressive threat environment. Due to the need to respond to these threats, IDC believes that endpoint security solutions will not become a commodity that can be swapped in and out. Instead, customers will need to continuously assess which product(s) meet their existing and future security needs. For consumers, endpoint security is generally the only line of defense. IDC believes that the consumer security market will continue its evolution from product to service. We believe the consumer security market will ultimately shift from a set of point products to a more comprehensive solution that encompasses security, backup and

2010 IDC

#225759

19

storage, system management tools, and other consumer PC technologies. IDC believes the key to success in the consumer security market will be product differentiation through improved performance and features. With the proliferation of products, customer confusion can occur. For vendors to win in such a competitive environment, they need to stand out in the marketplace. This can be done in a number of ways: price, performance, the mix of security functions incorporated in the product, and a mix of nonsecurity features such as backup, storage, and system management tools.

LEARN MORE
Related Research
Worldwide Network Security 20102014 Forecast and 2009 Vendor Shares (IDC #225381, November 2010) Worldwide Messaging Security 20102014 Forecast and 2009 Vendor Shares: SaaS Is Here to Stay (IDC #225194, October 2010) Enterprise Security Survey: A Historical Review (IDC #225151, October 2010) Worldwide Web Security 20102014 Forecast and 2009 Vendor Shares: Web Security Takes to the Cloud (IDC #224801, September 2010) Worldwide Identity and Access Management 20102014 Forecast Update: Identity Moves to the Cloud (IDC #224845, September 2010) Intel's $7.7B McAfee Acquisition: Baking Security Versus Smearing It On (IDC #lcUS22462910, August 2010) Worldwide Endpoint Security 20092013 Forecast and 2008 Vendor Shares (IDC #220273, October 2009)

Methodology
The IDC software market sizing and forecasts are presented in terms of packaged software revenue. IDC uses the term packaged software to distinguish commercially available software from custom software, not to imply that the software must be shrink-wrapped or otherwise provided via physical media. Packaged software is programs or codesets of any type commercially available through sale, lease, or rental, or as a service. Packaged software revenue typically includes fees for initial and continued right-to-use packaged software licenses. These fees may include, as part of the license contract, access to product support and/or other services that are inseparable from the right-to-use license fee structure, or this support may be priced separately. Upgrades may be included in the continuing right of use or may be priced separately. All of these items are counted by IDC as packaged software revenue. Packaged software revenue excludes service revenue derived from training, consulting, and system integration that is separate (or unbundled) from the right-to-

20

#225759

2010 IDC

use license but does include the implicit value of software included in a service that offers software functionality by a different pricing scheme. It is the total packaged software revenue that is further allocated to markets, geographic areas, and operating environments. The market forecast and analysis methodology incorporates information from five different but interrelated sources, as follows: Reported and observed trends and financial activity. This study incorporates reported and observed trends and financial activity in 2009 as of the end of March 2009, including reported revenue data for public companies trading on North American stock exchanges (CY 1Q094Q09 data in nearly all cases). IDC's Software Census interviews. IDC interviews all significant market participants to determine product revenue, revenue demographics, pricing, and other relevant information. Product briefings, press releases, and other publicly available information. IDC's software analysts around the world meet with hundreds of software vendors each year. These briefings provide an opportunity to review current and future business and product strategies, revenue, shipments, customer bases, target markets, and other key product and competitive information. Vendor financial statements and related filings. Although many software vendors are privately held and choose to limit financial disclosures, information from publicly held companies provides a significant benchmark for assessing informal market estimates from private companies. IDC also builds detailed information related to private companies through in-depth analyst relationships and maintains an extensive library of financial and corporate information focused on the IT industry. We further maintain detailed revenue by product area models on more than 1,000 worldwide vendors. IDC demand-side research. This includes thousands of interviews with business users of software solutions annually and provides a powerful fifth perspective for assessing competitive performance and market dynamics. IDC's user strategy databases offer a compelling and consistent time-series view of industry trends and developments. Direct conversations with technology buyers provide an invaluable complement to the broader survey-based results. Ultimately, the data presented in this study represents IDC's best estimates based on the previously mentioned data sources as well as reported and observed activity by vendors and further modeling of data that we believe to be true to fill in any information gaps. The data in this study is derived from all the sources mentioned previously and entered into the Software Market Forecaster (SMF) database, which is then updated on a continuous basis as new information regarding software vendor revenue becomes available. For this reason, the reader should note carefully the "as of" date in the Methodology discussion within the In This Study section, near the beginning of this study, whenever making comparisons between the data in this study and the data in any other software revenue study.

2010 IDC

#225759

21

Historical Market Values and Exchange Rates


Historical market values presented here are as published in prior IDC documents based on the market taxonomies and current U.S. dollar exchange rates existing at the time the data was originally published. For markets other than the United States, these as-published values are therefore based on a different exchange rate each year. Because many individual countries contribute to regional totals, it is difficult to give precise differences between current and constant currency values in this document. However, the scale of the difference can be understood from the movement of the U.S. dollar against major regional currencies. Customers should consider multiplying regional historical market values for each year by the change in value of the U.S. dollar against representative currencies in the region as shown in Table 9. This will provide a better approximation of local market growth. For example, to restate 2008 EMEA values into 2009 dollars, one would adjust the 2008 value downward by 5% (because the dollar appreciated against the euro in 2009). Please refer to IDC's regional research studies containing historical forecasts for multiple countries for more accurate regional growth in local currencies. Note that this discussion applies only to historical values prior to 2009. 2009 and all future years are forecast at a constant exchange rate.

TABLE 9
Exchange Rates, 20032009 (%)
2003 Euro Pound Yen Canadian dollar Mexican peso Brazilian real 123 96 124 123 80 155 2004 112 85 116 114 84 146 2005 112 86 118 106 81 121 2006 111 85 124 99 81 109 2007 102 78 126 94 81 97 2008 95 85 111 93 83 92 2009 100 100 100 100 100 100

Note: To restate prior-year U.S. dollars, multiply historical market values by the percentage indicated in the table.
Source: IDC, January 2010

22

#225759

2010 IDC

Synopsis
This IDC study examines the endpoint security market for the period from 2009 to 2014, with vendor revenue and market growth forecasts. Worldwide market sizing is provided for 2009, and a five-year growth forecast for this market is shown for 2010 2014. Revenue and market share of the leading vendors is provided for 2009. "Endpoint security has always been the final line of defense against malware and other threats," said Charles Kolodgy, research vice president of IDC's Security Products program. "These solutions are now a primary line of defense as employees become more mobile. Endpoint security allows these users to become an 'island onto themselves,' providing the key security and data protection needs of the end user."

Copyright Notice
This IDC research document was published as part of an IDC continuous intelligence service, providing written research, analyst interactions, telebriefings, and conferences. Visit www.idc.com to learn more about IDC subscription and consulting services. To view a list of IDC offices worldwide, visit www.idc.com/offices. Please contact the IDC Hotline at 800.343.4952, ext. 7988 (or +1.508.988.7988) or [email protected] for information on applying the price of this document toward the purchase of an IDC service or for information on additional copies or Web rights. Copyright 2010 IDC. Reproduction is forbidden unless authorized. All rights reserved.

2010 IDC

#225759

23

You might also like