1 / 37

IT Application in Security Service Industry - Secure Content Management

2005. 08. 16. Team Echo. 20053428 이상훈 20053509 임우재 20053908 좌경윤. IT Application in Security Service Industry - Secure Content Management. SEP 583 Industrial Applications of Information Technology and Software Industry . Index. I. Introduction II. Why Secure Content Management

minowa
Download Presentation

IT Application in Security Service Industry - Secure Content Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2005. 08. 16 Team Echo 20053428 이상훈 20053509 임우재 20053908 좌경윤 IT Application in Security Service Industry - Secure Content Management SEP 583 Industrial Applications of Information Technology and Software Industry

  2. Index I. Introduction II. Why Secure Content Management III. Market Now & Future IV. Strategic Direction SEP 583 Industrial Applications of Information Technology and Software Industry

  3. Index I. Introduction SEP 583 Industrial Applications of Information Technology and Software Industry

  4. Our Position Who are we? `s Strategic Consultant. SEP 583 Industrial Applications of Information Technology and Software Industry

  5. Index II. Why Secure Content Management (SCM) • What is SCM • Emerging Threats in SCM Market • Key Technologies SEP 583 Industrial Applications of Information Technology and Software Industry

  6. What is SCM policy-basedInternet management tools that manage Web content, messaging security, virus protection, and malicious code . - IDC Web Filter Anti Virus Messaging Security SEP 583 Industrial Applications of Information Technology and Software Industry

  7. Emerging Threats in SCM Market Regulatory Compliance • Intellectual property right • HIPAA* • GLBA**,SEC***, SOA**** Organization make sure employee do NOT break law *HIPPA – Health Insurance Portability and Accountability Act **GLBA - Gramm-Leach-Bliley Act ***SEC - Securities and Exchange Commission ****SOA - Sarbanes-Oxley Act SEP 583 Industrial Applications of Information Technology and Software Industry

  8. Emerging Threats in SCM Market The Convergence of Spam, Virus, Phishing ,and Spyware Various Regulatory Area Common management Framework SEP 583 Industrial Applications of Information Technology and Software Industry

  9. The Common Management Framework SEP 583 Industrial Applications of Information Technology and Software Industry

  10. Boolean Model • Vector space • Latent Semantic Indexing • Connexionist approach Filtering Categorization Email, web page, image, etc. • machine learning methods trained • multivariate regression models • nearest neighbor classification • Bayes probabilistic approaches • decision trees • neural network • inductive learning algorithms • support vector machines Key Technologies –Filtering SEP 583 Industrial Applications of Information Technology and Software Industry

  11. Key Technologies –Filtering Boolean Model • Simplicity but Limitation • Keyword and Dictionary Vector space Model • term weighting, term frequency • the dependence between the terms does not exist • this model doesn’t represent the semantic aspect SEP 583 Industrial Applications of Information Technology and Software Industry

  12. Key Technologies –Filtering Latent Semantic Indexing • concepts, the relations between words • use A powerful and fully automatic statistical method for Singular-value decomposition (SVD) • more stable user’s interest • a long time to execute the SVD method • need a corpus to build the matrix( terms-profiles) Connexionist approach • based on neural networks SEP 583 Industrial Applications of Information Technology and Software Industry

  13. Key Technologies – Challenge/ Response The Challenge-Response rationale. Effectively blocked 100% of spam message SEP 583 Industrial Applications of Information Technology and Software Industry

  14. Key Technologies – Filtering vs. Challenge/Response SEP 583 Industrial Applications of Information Technology and Software Industry

  15. Index III. Market Now & Future • Worldwide Market • Local Market SEP 583 Industrial Applications of Information Technology and Software Industry

  16. Index Worldwide Market SEP 583 Industrial Applications of Information Technology and Software Industry

  17. Worldwide Security Revenue by Market Source : IDC 2004 SEP 583 Industrial Applications of Information Technology and Software Industry

  18. Worldwide SCM Revenue by Vendors Source : IDC 2004 SEP 583 Industrial Applications of Information Technology and Software Industry

  19. Worldwide SCM Revenue by Subsegment Source : IDC 2004 SEP 583 Industrial Applications of Information Technology and Software Industry

  20. CAGR : 12.5% Worldwide Antivirus Revenue Largest Segment of SCM 몇 개의 대형 Vendor 독점 2003 : $2.7 billion 2008 : $4.8 billion Source : IDC 2004 SEP 583 Industrial Applications of Information Technology and Software Industry

  21. CAGR : 22.6% Worldwide Web Filtering Revenue 2003 : $337.8 million 2008 : $935 million Source : IDC 2004 SEP 583 Industrial Applications of Information Technology and Software Industry

  22. CAGR : 33.6% Worldwide Messaging Security Revenue Highest CAGR value 절대 강자가 없는 분야 2003 : $397.5 million 2008 : $1.69 billion Source : IDC 2004 SEP 583 Industrial Applications of Information Technology and Software Industry

  23. Worldwide SCM Revenue by Subsegment Antivirus Share : 78.5% 64.9% Web Filtering Share : 9.9% 12.5% Messaging Security Share : 11.6% 22.6% SEP 583 Industrial Applications of Information Technology and Software Industry

  24. Index Local (KOREA) Market SEP 583 Industrial Applications of Information Technology and Software Industry

  25. Local Security Revenue by Subsegment SCM 1. 2004년 전반적인 경제침체로 인해 시장 축소 2. Firewall & VPN 시장의 성장세 둔화 3. Antivirus & 보안 컨텐츠 관리 부분 시장 성장세 Source : ETRI 2002 .10 SEP 583 Industrial Applications of Information Technology and Software Industry

  26. 사업환경(PETS) Policy-related Economic • Intellectual Property Right 중요성 확대 • 개인 의료 기록 관련 법규 (HIPPA) • 금융 계정 정보 관련 법규 (GLBA, SEC) • 전체적인 Security 시장에서 Secure Content Management 분야 급격한 성장 • SCM 내부에선 Web Filtering, Messaging Security의 성장세 강화 • 국내 보안시장에선 Content 보안 시장의 활성화 예상 • Messaging Security 부분에선 절대 강자가 없이 치열한 각축전 Technological Social • 단순 형태의 Virus, Spam에서 여러 형태로 복합, 변형되어 한가지 Software로 막을 수 없는 정도로 발전 • P2P Technology의 급격한 발전 • 불필요한 정보의 급증으로 인해 Network, Human Resource의 낭비 감소를 위한 투자의 증가 • IT839정책으로 새로운 Media & Network 영역 등장 • 유해 정보에 대한 차단의 필요성 급증 SEP 583 Industrial Applications of Information Technology and Software Industry

  27. Index IV. Case Study (Surf Control) SEP 583 Industrial Applications of Information Technology and Software Industry

  28. Overview • SurfControl 소개 • SurfControl의 Product SEP 583 Industrial Applications of Information Technology and Software Industry

  29. SurfControl 소개 “The number one Contents SecurityCompany In the Global Security Market” - Web Filter - E-mail Filter - Enterprise Threat Shield Secure Content Management Secure Content Management without Anti-Virus Antivirus 에서 강한 회사들의 SCM 시장 주도 SEP 583 Industrial Applications of Information Technology and Software Industry

  30. Product By-Pass URL Category List • URL over 300 million • Daily List provided • dynamic aging and culling of URL List • Network Traffic doesn’t impact • Stand-Alone or Add-on E-mail Filtering • Inbound/outbound provided • Content filtering (Rule-based) • Reporting function provided SEP 583 Industrial Applications of Information Technology and Software Industry

  31. Product Stops spyware, adware, keyloggers, instant messaging (IM),peer-to-peer (P2P),games and any other potentially malicious applications from damaging your network and business. SEP 583 Industrial Applications of Information Technology and Software Industry

  32. Index V. Strategy SEP 583 Industrial Applications of Information Technology and Software Industry

  33. AhnLab’s SWOT Strength 국내 Antivirus 시장에 현재 No.1을 차지하고 있음 Antivirus Technology 부분은 세계적인 수준 현재 Worldwide SCM Market의 가장 큰 부분은 Antivirus 가 차지 Weakness Antivirus 부분 이외의 Web Filtering, Messaging Security 기술력이 취약 수출 실적이 크지 않아 Worldwide로의 진입 경로의 어려움 Opportunity 국내 경제의 활성화와 IT839, BcN, Home Network, Ubiquitous등의 다양한 영역이 등장하여 보안의 필요 분야의 확대 세계적으로 Messaging Security 부분은 Antivirus와 같이 절대 강자가 없는 시장이므로 시장 진입이 비교적 쉽고 앞으로의 SCM시장에서 Messaging Security가 큰 부분을 차지할 것이라고 예상됨 Threat Antivirus 시장을 점유하고 있는 큰 기업들의 Web Filtering, Messaging Security 시장으로의 진출 기존 Antivirus 시장의 세계적인 Vendor들 때문에 Worldwide Market 진입의 어려움 SEP 583 Industrial Applications of Information Technology and Software Industry

  34. AhnLab’s Strategy 1. Anti-Virus 시장에서의 국내 1위라는 강점을 기반으로 Web Filter / Messaging Security 기술의 확보를 통하여 국내 및 Global SCM 시장 진출 - Messaging Security 시장은 현재 절대 강자가 없는 춘추 전국 시대의 상황으로 확고한 기술을 통한 시장의 선점이 무엇보다 중요함. 2. Service / Appliance 시장 진출에 대한 모색 - 현재의 보안 SW 위주의 시장에서 추후 보안 시장은 Service / Appliance 의 비중이 커지는 시장 구조로 변모 3. 보안 기술의 Convergence 화에 따른 전략으로서 Total Service를 제공 할 수 있는 통합 솔루션 제품군 확보를 고려할 수 있음. - SCM 시장에서의 기술적 우위를 바탕으로 관련 업체와의 전략적 Partnership 고려 SEP 583 Industrial Applications of Information Technology and Software Industry

  35. AhnLab’s Strategy 4. 기술적 전략 방향 Anti-Virus Total SCM Solution Latent Semantic Indexing Boolean Model Vector space Latent Semantic Indexing Connexionist approach Challenge/Response Web Filter E-mail Filter SEP 583 Industrial Applications of Information Technology and Software Industry

  36. Referrences [1] Jim Murphy with Dave Zwieback, Protecting the Enterprise from Instant Messaging and Peer-to-Peer Threats [2] Brian E. Burke, Content Security: The Business Value of Blocking Unwanted Content, July 2003 [3] Brian E. Burke, Worldwide Secure Content Management 2004.200 8 Forecast Update and 2003 Vendor Share s : A Holistic View of Antivirus, Web Filtering, and Messaging Security [4] Arabella Hallawell, Gartner RAS Core Research Note G00129519, , 30 June 2005, R1476 12302005. [5] 보안시장의 변화와 관리기술의 진화 , 정유석/넷시큐어테크놀러지 2005 [6] Jack McCullough, Beyond the firewall: Using a Layered Security Strategy to Address Internal Security Threats,2002 [7] Jim Murphy with Dave Zwieback, Protecting the Enterprise from Instant Messaging and Peer-to-Peer Threats [8] Brian E. Burke , The Evolution of Content Filtering: Multiple Layers of Threat Protectio n, May 2005 [9] SurfControl, Surfing the Web at Work: Corporate Networks Are Paying the Price [10] Digital Impact, Challenge-Response :What it means to legitimate email marketers, July 2003 [11] O. Nouali, P. Blache, A semantic vector space and features-based approach for automatic information filtering [12] S.Sakurai, A.Suyama,An-email analysis method based on text mining techniques, October 2004 [13] Ari Visa, Technology of Text Mining, 2001 SEP 583 Industrial Applications of Information Technology and Software Industry

  37. Q & A Q & A SEP 583 Industrial Applications of Information Technology and Software Industry

More Related