SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Demand on Information Security (InfoSec) Skilled Expertise in India
Han Digital Talent Consulting
This report is solely for the use of Han Digital personnel. No part of it may be circulated, quoted, or reproduced for distribution outside the client organization without prior written approval from Han Digital Solution.
Han Digital Solution Confidential
Growing Demand on Information Security (InfoSec, IAM)
Talent Across IT Outsourcing Destinations
Among top 25 HOT Skills in 2017 in India
Infrastructure Regime
Data Eruption
24/7*365 Online World
Tomorrow’s Finance
Complicated Regulations & Standards
Infinite Internet Potential
Multiple Identities & Trust Models
IT Security Trends
Network Security
Cloud Security
Mobile Security
Threat Intelligence
Information Security Areas
145 million Potential User Login Data Stolen on the year 2014, Hacker still
Unknown
3 million Encrypted Credit Card Numbers Stolen; About 150 million Adobe
Accounts Compromised, Source code of Adobe Photoshop & Other
Products also was stole, Hacker Still Unknown
Year 2013
The personal information of 150,000 consumers who went into bankruptcy
between 2007 and 2011 – including their social security numbers – were
exposed after Citi failed to properly redact court records before they were put
on the Public Access to Court Electronic Records (PACER) system. Year 2011
On January 29, 2015, Anthem, Inc. (Anthem) learned of a cyberattack to their IT
system. The cyber attackers tried to get private information about individuals
with data on Anthem systems. It is believed that it happened over the course
of several weeks beginning in early December 2014.
Organizations today are highly vulnerable to data and identity theft, especially with
the popularity of social media, cloud computing, and mobile devices.
Members of Mozilla’s developer community have been alerted about an
accidental leak of email addresses and encrypted passwords, after the failure of
a “data sanitisation” process the organisation was carrying out. Year 2014
The market is segmented into solutions such as;
 Identity and Access Management
 Risk and Compliance Management
 Encryption
 Data Loss Prevention
 Unified Threat Management
 Firewall, Antivirus and Antimalware
 Intrusion Detection System (IDS)/Intrusion
Prevention System (IPS)
 Security Information and Event Management
(SIEM)
 Disaster Recovery
 Distributed Denial of Service (DDoS) Mitigation,
and Whitelisting.
The Global Information Security market is currently in a state of growth with the high adoption of IAM solutions by SMEs, large enterprises, and government organizations wanting to improve efficiency and productivity.
Reactive Proactive
Consumers
Information Security
Recovery
Backup
Restore
IT Hacks, Leaks
& Threats
1 in every 10 consumers has already been victimized by #IdentityTheft
Identity and access management - IAM means management
of individual users, their authentication, authorization, and
privileges within or across system and enterprise boundaries.
2Source: Han Digital Solution
Identity & Access Management
Market & Talent
Tier1Productvendors
•OpenIAM
•OpenDS Directory Server
•OpenSSO
•Shibboleth (SSO)
•Gluu
Open Source Identity Management Solutions
IAMRoleplay2020Benefits
 By 2020, 80% of digital access will be influenced by new mobile and non-PC architectures, an
increase from 5% today
13,200+ Talent pool Available in India
Estimated 46,000+ Globally Available Pool
Estimated Total Market Size 2015 : $400
million (Only Licences Cost)
Identity and Access Management Market to
Grow at a CAGR of 15.1% to 2018
Supply
Worldwide
spending on
information
security is $78.5
billion in 2015,
an increase of 8.2
percent over 2013
 Reduced help desk costs and improved service through the self-service of password
changes and access requests. Eliminated security threat from active accounts that
have no valid owner or unapproved configurations.
Oracle Identity & Access Management
IBM Tivoli Access/Identity Manager
CA Identity Manager/Access Control
Sailpoint Identity IQ
NetIQ Identity Manager
EMC – RSA Secure ID
Forgerock OpenIDM
 Use of monitoring tools and big data analytics will rise and spending
on IAM will fall. (It evokes the rise of Identity Intelligence)
 By 2020, 70% of all businesses will use attribute-based access control (ABAC) to
protect critical assets, up from <5% today. Avoiding the existing Role-based
access control (RBAC).
 Enterprise Mobility Management (EMM)
will play a significant role in future of IAM
 By 2020, the Internet of Things will redefine the
concept of "identity management" to include what
people own, share, and use.
 Improved security and scaling of administrative staff
through the division of workload among administrators
that have an accurate knowledge of user access needs.
 Reduced security risk and auditing costs
through the establishment of a system-
of-record for access changes and
approvals.
 Improved accuracy and reduced costs associated with the creation and
revocation of user access rights to internal resources and to resources
that are external to your organization.
 By 2020, overall IAM product and pricing will drop by 40% relative to today in real terms.
I. Financial Services, Healthcare &
Public Sector
II. Manufacturing &
Telecommunications
III. Utilities & Retail
According to Ponemon Institute, the average cost of a data breach
for an organization in 2013 was $3.5 million U.S. dollars — a 15
increase since 2012
OtherProductvendors
Demand
n Number of small & medium
sized IAM solution providers went
through a series of acquisitions in
the year 2005
With an increased use of
IAM solutions and the entry
of new vendors, the market
is expected to experience
strong growth
85% in tier 1 Indian Cities
3
More than 40% of the installed
IAM pool contributed by Tier I
IT service providers
Non - Exhaustive
IM & AM
Source: Han Digital Solution
IAM Acquisitions - TimeLine
Distributed
Computing
Birth Grid / Cloud Computing Era
1990’s
Internet of Things /
BYOD
2014
Internet Based
Computing / Web
services
Late 1990’s
1990 2005 2007 2008 2009 2010 2011 2013 2014 2015 2020
Today
Oracle
Acquires
Oblix
CA Acquires
eTrust Cleanup
March,2005
Bull Evidian
Acquires Enatel
Microsoft
Acquires Alacris
Sept,2005
Oracle Acquires
Thortech
Oracle Acquires Octetstring
Nov,2005
Novell
Acquires
Fortefi
Oracle Acquires
Bharosa
Oracle Acquires Bridgestream
Sept,2007
Feb,2007
July,2007
Oracle Acquires BEA
Systems
Jan,2008
CA Acquires
ID Focus
Oct,2008
Jan2009
CA Acquires
Orchestria
Microsoft Acquires Sentillon
Dec2009
Oracle
Acquires
Stellent
2006
Nov2006
Oracle Acquires
Sun Microsystems
Jan2010
Aug2010
Vmware Acquires
TriCipher
Oracle Acquires
Passlogix
Dell Acquires
Enstratius
May2010
Kaseya
Acquires
Scorpian
Vmware Acquires Airwatch
IBM
Acquires
CrossideasEMC
Acquires
Aveksa
LogMeIn
Acquires
Meldium
IBM Acquires
Lighthouse Security
Microsoft Acquires Aorato
Jan2014
July2014
Aug2014
Sept2014
Nov2014
Sailpoint Acquires Whitebox
June2015
July2015
CA Acquires
IDMLogic
20021999
IBM
Acquires
MetaMerge
IBM Acquires Access360
Microsoft
Acquired
Zoomit
SAP Acquired Maxware
Oracle Acquires
Phaos
Technology
July,1999
June,2002
Sept,2002
May,2004
May,2007
2004
Size of Digital Data has
increased in the last decade
at a exponential rate.
Proportionally the Data
Hacks & IT Security Threats
has been increased
Enterprises are spending
46% on security technologies
in 2015
IAMDemandacrossITEvolutionIAMProductAcquisitionsovertheyears
bring your
own identity
(BYOI)
Projected
The Identity of Things (IDoT) is a new
extension to identity management
meant to encompass all identities,
regardless of whether it is a person or
device
4Source: Han Digital Solution
Han Digital experience in IAM and other InfoSec Areas’s
Identity & Access
Management
Functionality
Based IDMS
Class
Deployment
Based IDMS
Class
Cloud - IAM
Isolated Cloud IDMS
Centralized Cloud IDMS
Federated Cloud IDMS
User-Centric Cloud IDMS Anonymous Cloud IDMS
• IDM365
• NetIQ/Novell
• Atos
• Oracle
• Sailpoint
• Gigya
• Intel McAfee
• Avatier
• Courion
• Evidian
• AWS Webservices
• IBM
• Covisint
• Hitachi
• OSIAM
• Gemalto
• OneLogin
• Dell
• SecurAct
• Microsoft
• Vmware
• SAP
• Octa
• security
• Good IDM
• Omada
•OpenIAM
•OpenDS Directory Server
•OpenSSO
•Shibboleth (SSO)
•Gluu
On Premise - IAM
Most IAM are moving into
Cloud based Solutions
6Source: Han Digital Solution
What do we help on InfoSec?Why do your peer’s adopt InfoSec?
Greater agility, Reliability & Threat Detection
Can be secure with the acts of Human Error or Failure
Secure the company’s intellectual property such as
Patents, Trademarks, Trade Secrets & Copyrights
Safeguards the technology assets in use at the
organization
Enables the safe operation of applications
implemented on the organization‘s IT systems
 Talent availability study for your InfoSec skills
 Location feasibility for hiring
 Compensation insights
 InfoSec skill mix analysis
 Alternative talent pool for cross skilling
 Peer companies hiring best practices
 Hiring competition and trends
 Talent fulfilment in less time
Write us for further InfoSec Domain/Skills Market View – SIEM, Vulnerability
Tools, Cloud Security, Application Security, Disaster Recover etc.
6
India – Hiring Demand
India - Talent Pool
Industry Adoption of IAM
Global Market Penetration Contact info@handigital.com
Need detailed insights or
Talent Fulfilment support?
Contact info@handigital.com
080-61341500
 Talent Pool Analysis
 Hiring Outlook And Forecasting
 Talent Acquisition Channel Tracking
 Top Trading Skills And Trends Tracking
 Attrition Data Validation And Analysis
 C&B Benchmarking And Analysis
 Candidate Discovery And Engagement
 University Hiring And Trends
 Location Strategy
 Company Profiling
 Emerging Cities
 Integrated Talent Solutions
 Market Tracker
 Emerging Skills Trends
 Vendor Benchmarking
 Employer Perception Study
Han Digital is a talent consulting partner to several Domestic and International
companies. More than a decade experience in niche offerings with consulting
capabilities
Talent Consulting Practice Management Consulting & Advisory
Who we are Top trading skills in India
Storage & Datacenter
IBM SAN
EMC SAN
File System
Netbackup
Open Source
Python
HTML5
User Design & UI
Java/J2EE
Package Suite
Workday
Salesforce CRM
Callidus
Microsoft Dynamics
Oracle Apps
SAP
Hybris
Information Security
Identity Management
Archer
Arcsight
Qradar
Splunk
Qualysguard
Cloud security
Data Analytics
Hadoop
Data Science
Tableau
Oracle BI
Database Management
MySQL & PostgreSQL
Mango DB
Cassandra
DB2 UDB
Cloud & Virtualization
Vmware
Amazon (AWS)
IBM Softlayer
Rackspace
Engineering/R&D
Protocol development
System programming
CAD/CAM engineering
Firmware development
Emerging IT Practices
DevOps
IoT/IoE
RPA
Enterprise Mobility
Mobile commerce
5G
AR/VR/MR
Talent Intelligence Store Emergingcitiez Talent Market Tracker Sourcing Lab
Product & Solutions
7

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.Sharon Liu
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyRaymond Okyere-Forson
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 

Kürzlich hochgeladen (20)

Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human Beauty
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 

Information Security (InfoSec) Skills - Talent and Market Insights

  • 1. Demand on Information Security (InfoSec) Skilled Expertise in India Han Digital Talent Consulting This report is solely for the use of Han Digital personnel. No part of it may be circulated, quoted, or reproduced for distribution outside the client organization without prior written approval from Han Digital Solution. Han Digital Solution Confidential Growing Demand on Information Security (InfoSec, IAM) Talent Across IT Outsourcing Destinations Among top 25 HOT Skills in 2017 in India
  • 2. Infrastructure Regime Data Eruption 24/7*365 Online World Tomorrow’s Finance Complicated Regulations & Standards Infinite Internet Potential Multiple Identities & Trust Models IT Security Trends Network Security Cloud Security Mobile Security Threat Intelligence Information Security Areas 145 million Potential User Login Data Stolen on the year 2014, Hacker still Unknown 3 million Encrypted Credit Card Numbers Stolen; About 150 million Adobe Accounts Compromised, Source code of Adobe Photoshop & Other Products also was stole, Hacker Still Unknown Year 2013 The personal information of 150,000 consumers who went into bankruptcy between 2007 and 2011 – including their social security numbers – were exposed after Citi failed to properly redact court records before they were put on the Public Access to Court Electronic Records (PACER) system. Year 2011 On January 29, 2015, Anthem, Inc. (Anthem) learned of a cyberattack to their IT system. The cyber attackers tried to get private information about individuals with data on Anthem systems. It is believed that it happened over the course of several weeks beginning in early December 2014. Organizations today are highly vulnerable to data and identity theft, especially with the popularity of social media, cloud computing, and mobile devices. Members of Mozilla’s developer community have been alerted about an accidental leak of email addresses and encrypted passwords, after the failure of a “data sanitisation” process the organisation was carrying out. Year 2014 The market is segmented into solutions such as;  Identity and Access Management  Risk and Compliance Management  Encryption  Data Loss Prevention  Unified Threat Management  Firewall, Antivirus and Antimalware  Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)  Security Information and Event Management (SIEM)  Disaster Recovery  Distributed Denial of Service (DDoS) Mitigation, and Whitelisting. The Global Information Security market is currently in a state of growth with the high adoption of IAM solutions by SMEs, large enterprises, and government organizations wanting to improve efficiency and productivity. Reactive Proactive Consumers Information Security Recovery Backup Restore IT Hacks, Leaks & Threats 1 in every 10 consumers has already been victimized by #IdentityTheft Identity and access management - IAM means management of individual users, their authentication, authorization, and privileges within or across system and enterprise boundaries. 2Source: Han Digital Solution
  • 3. Identity & Access Management Market & Talent Tier1Productvendors •OpenIAM •OpenDS Directory Server •OpenSSO •Shibboleth (SSO) •Gluu Open Source Identity Management Solutions IAMRoleplay2020Benefits  By 2020, 80% of digital access will be influenced by new mobile and non-PC architectures, an increase from 5% today 13,200+ Talent pool Available in India Estimated 46,000+ Globally Available Pool Estimated Total Market Size 2015 : $400 million (Only Licences Cost) Identity and Access Management Market to Grow at a CAGR of 15.1% to 2018 Supply Worldwide spending on information security is $78.5 billion in 2015, an increase of 8.2 percent over 2013  Reduced help desk costs and improved service through the self-service of password changes and access requests. Eliminated security threat from active accounts that have no valid owner or unapproved configurations. Oracle Identity & Access Management IBM Tivoli Access/Identity Manager CA Identity Manager/Access Control Sailpoint Identity IQ NetIQ Identity Manager EMC – RSA Secure ID Forgerock OpenIDM  Use of monitoring tools and big data analytics will rise and spending on IAM will fall. (It evokes the rise of Identity Intelligence)  By 2020, 70% of all businesses will use attribute-based access control (ABAC) to protect critical assets, up from <5% today. Avoiding the existing Role-based access control (RBAC).  Enterprise Mobility Management (EMM) will play a significant role in future of IAM  By 2020, the Internet of Things will redefine the concept of "identity management" to include what people own, share, and use.  Improved security and scaling of administrative staff through the division of workload among administrators that have an accurate knowledge of user access needs.  Reduced security risk and auditing costs through the establishment of a system- of-record for access changes and approvals.  Improved accuracy and reduced costs associated with the creation and revocation of user access rights to internal resources and to resources that are external to your organization.  By 2020, overall IAM product and pricing will drop by 40% relative to today in real terms. I. Financial Services, Healthcare & Public Sector II. Manufacturing & Telecommunications III. Utilities & Retail According to Ponemon Institute, the average cost of a data breach for an organization in 2013 was $3.5 million U.S. dollars — a 15 increase since 2012 OtherProductvendors Demand n Number of small & medium sized IAM solution providers went through a series of acquisitions in the year 2005 With an increased use of IAM solutions and the entry of new vendors, the market is expected to experience strong growth 85% in tier 1 Indian Cities 3 More than 40% of the installed IAM pool contributed by Tier I IT service providers Non - Exhaustive IM & AM Source: Han Digital Solution
  • 4. IAM Acquisitions - TimeLine Distributed Computing Birth Grid / Cloud Computing Era 1990’s Internet of Things / BYOD 2014 Internet Based Computing / Web services Late 1990’s 1990 2005 2007 2008 2009 2010 2011 2013 2014 2015 2020 Today Oracle Acquires Oblix CA Acquires eTrust Cleanup March,2005 Bull Evidian Acquires Enatel Microsoft Acquires Alacris Sept,2005 Oracle Acquires Thortech Oracle Acquires Octetstring Nov,2005 Novell Acquires Fortefi Oracle Acquires Bharosa Oracle Acquires Bridgestream Sept,2007 Feb,2007 July,2007 Oracle Acquires BEA Systems Jan,2008 CA Acquires ID Focus Oct,2008 Jan2009 CA Acquires Orchestria Microsoft Acquires Sentillon Dec2009 Oracle Acquires Stellent 2006 Nov2006 Oracle Acquires Sun Microsystems Jan2010 Aug2010 Vmware Acquires TriCipher Oracle Acquires Passlogix Dell Acquires Enstratius May2010 Kaseya Acquires Scorpian Vmware Acquires Airwatch IBM Acquires CrossideasEMC Acquires Aveksa LogMeIn Acquires Meldium IBM Acquires Lighthouse Security Microsoft Acquires Aorato Jan2014 July2014 Aug2014 Sept2014 Nov2014 Sailpoint Acquires Whitebox June2015 July2015 CA Acquires IDMLogic 20021999 IBM Acquires MetaMerge IBM Acquires Access360 Microsoft Acquired Zoomit SAP Acquired Maxware Oracle Acquires Phaos Technology July,1999 June,2002 Sept,2002 May,2004 May,2007 2004 Size of Digital Data has increased in the last decade at a exponential rate. Proportionally the Data Hacks & IT Security Threats has been increased Enterprises are spending 46% on security technologies in 2015 IAMDemandacrossITEvolutionIAMProductAcquisitionsovertheyears bring your own identity (BYOI) Projected The Identity of Things (IDoT) is a new extension to identity management meant to encompass all identities, regardless of whether it is a person or device 4Source: Han Digital Solution
  • 5. Han Digital experience in IAM and other InfoSec Areas’s Identity & Access Management Functionality Based IDMS Class Deployment Based IDMS Class Cloud - IAM Isolated Cloud IDMS Centralized Cloud IDMS Federated Cloud IDMS User-Centric Cloud IDMS Anonymous Cloud IDMS • IDM365 • NetIQ/Novell • Atos • Oracle • Sailpoint • Gigya • Intel McAfee • Avatier • Courion • Evidian • AWS Webservices • IBM • Covisint • Hitachi • OSIAM • Gemalto • OneLogin • Dell • SecurAct • Microsoft • Vmware • SAP • Octa • security • Good IDM • Omada •OpenIAM •OpenDS Directory Server •OpenSSO •Shibboleth (SSO) •Gluu On Premise - IAM Most IAM are moving into Cloud based Solutions 6Source: Han Digital Solution
  • 6. What do we help on InfoSec?Why do your peer’s adopt InfoSec? Greater agility, Reliability & Threat Detection Can be secure with the acts of Human Error or Failure Secure the company’s intellectual property such as Patents, Trademarks, Trade Secrets & Copyrights Safeguards the technology assets in use at the organization Enables the safe operation of applications implemented on the organization‘s IT systems  Talent availability study for your InfoSec skills  Location feasibility for hiring  Compensation insights  InfoSec skill mix analysis  Alternative talent pool for cross skilling  Peer companies hiring best practices  Hiring competition and trends  Talent fulfilment in less time Write us for further InfoSec Domain/Skills Market View – SIEM, Vulnerability Tools, Cloud Security, Application Security, Disaster Recover etc. 6 India – Hiring Demand India - Talent Pool Industry Adoption of IAM Global Market Penetration Contact info@handigital.com
  • 7. Need detailed insights or Talent Fulfilment support? Contact info@handigital.com 080-61341500  Talent Pool Analysis  Hiring Outlook And Forecasting  Talent Acquisition Channel Tracking  Top Trading Skills And Trends Tracking  Attrition Data Validation And Analysis  C&B Benchmarking And Analysis  Candidate Discovery And Engagement  University Hiring And Trends  Location Strategy  Company Profiling  Emerging Cities  Integrated Talent Solutions  Market Tracker  Emerging Skills Trends  Vendor Benchmarking  Employer Perception Study Han Digital is a talent consulting partner to several Domestic and International companies. More than a decade experience in niche offerings with consulting capabilities Talent Consulting Practice Management Consulting & Advisory Who we are Top trading skills in India Storage & Datacenter IBM SAN EMC SAN File System Netbackup Open Source Python HTML5 User Design & UI Java/J2EE Package Suite Workday Salesforce CRM Callidus Microsoft Dynamics Oracle Apps SAP Hybris Information Security Identity Management Archer Arcsight Qradar Splunk Qualysguard Cloud security Data Analytics Hadoop Data Science Tableau Oracle BI Database Management MySQL & PostgreSQL Mango DB Cassandra DB2 UDB Cloud & Virtualization Vmware Amazon (AWS) IBM Softlayer Rackspace Engineering/R&D Protocol development System programming CAD/CAM engineering Firmware development Emerging IT Practices DevOps IoT/IoE RPA Enterprise Mobility Mobile commerce 5G AR/VR/MR Talent Intelligence Store Emergingcitiez Talent Market Tracker Sourcing Lab Product & Solutions 7