180 likes | 397 Views
GreyLogic. Cyber Intelligence Market and Competitor Research. 13 November 2009. Requirements.
E N D
GreyLogic Cyber Intelligence Market and Competitor Research 13 November 2009
Requirements Who are the potential markets for a weekly newsletter summarizing and analyzing trends in various cyber threats and for tailored intelligence briefings in the United States (US) and in the European Union (EU) Who are GreyLogic's competitors and how deep is the market place penetrated by them?
Requirements Continued • What are the "best practices" among companies providing timely intelligence to private and government clients in the US and the EU? Specific "best practices" include (but are not limited to): • Competitors' services' pricing structure from a starting company to a mature business. • What types of products and services do these companies provide? • What is the companies' marketing strategy?
Agenda • Key Findings • Customers • Government • Private Sector • Academia • Competitors • Market Penetration • Best Practices • Service Pricing • Products and Services • Marketing Strategies
Key Findings • GreyLogic’s market for IntelFusion: FLASH Traffic weekly brief is likely: • Large US government agencies with cyber or national security missions • Large US companies whose services are only provided through IT
Key Findings • Top 12 Customers 1. Cyber Security Management Center (CSMC) (US) 2. Defense Information Systems Agency (DISA) (US) 3. Department of Energy (DOE) (US) 4. Department of State (US) 5. United States Postal Service (USPS) (US) 6. National Aeronautics and Space Administration (NASA) (US) 7. Ebay (US) 8. Western Union (US) 9. Arsys (EU) 10. Facebook (US) 11. LiveJournal (US) 12. Twitter (US)
Key Findings • 51 Total Organizations • Government : 17 • Private Sector: 23 • Academia: 11 • United States: 35 • European Union: 16
Key Findings Only few direct competitors due to GreyLogic’s specialization in cyber intelligence and not cyber security Cyber intelligence is likely hard to sell to private businesses as an independent product as our research indicates that the sector has higher demand of cyber security – services that directly address companies’ needs
Customers - Government • Top Five Government Customers • Cyber Security Management Center (CSMC) • Defense Information Systems Agency (DISA) • Department of Energy (DOE) • Department of State (DOS) • United States Postal Service (USPS)
Customers - Government • Between the US and EU, US government agencies are likely to have a higher need for cyber intelligence. • US government agencies likely to be the most high-value targets for cyber attacks • Government agencies with cyber or national security missions are likely to have a high need for cyber intelligence • US and EU government entities that have significant budgets and currently rely on private companies, ISACs, or similar organizations, to help provide cyber security are more likely to purchase additional services.
Customers - Business • Top six private sector customers • Western Union • Arsys • Ebay • Facebook • LiveJournal • Twitter
Customers - Business • Private sector customers include approximately 40% (23 of 57) of all the identified customers found through the team’s research. • Large international and national companies that recognize the importance of Information Technology (IT) to their mission are more likely to invest in cyber threat prevention • Among businesses it is highly likely that the best contact person is a Chief Information Officer (CIO) or Chief Information Security Officer (CISO)
Customers - Academia • Top five customers in academia • CyLab • Tallinn University of Technology • Georgia Tech Information Security Center • Center for Applied Cybersecurity Research • Center for Computer Security and Research
Customers - Academia • Academic institutions verified by the National Security Agency (NSA) Center of Academic Excellence are the most likely to purchase cyber security intelligence briefings • Academic institutions that receive grants to conduct cyber security research are the most likely to purchase cyber security intelligence briefings • It is likely the NSA will acknowledge more academic institutions who will be in need of cyber threat intelligence briefings.
Competitors • Identified Competitors • Cyber Defense Agency (CDA) (US) • Cyber Security Research and Development Center (US) • Cyveillance (US) • DanchoDanchev (EU) • Department of Homeland Security US-CERT(US) • Ernst & Young (EU) • EWA Information and Infrastructure Technologies, Inc. (US) • Fortify (US) • Global Security Mag (EU) • iDefense Labs (US) • iJET Intelligent Risk Systems (US) • Informatica (US) • IT – Information Sharing and Analysis Center (US) • iSIGHT Partners (US) • Lookingglass (US) • Multi-State Information Sharing Analysis Center (US) • nCircle (US) • SecureWorks (US) • Trend Micro (US) • United States Cyber Consequence Unit (US)
Market Penetration • United States • Government market highly penetrated • Private sector emerging market with fast growth • European Union • Primary untapped and fragmented market
Industry Best Practices • Service Pricing • Unavailable – gradual pricing • Products and Services • Training • Security Policy Engineering • Marketing Strategies • Strategic Alliances • Online Community Building • Industry Visibility
Contact Information Henry Peltokangas(814) 823-3400hpeltokangas@gmail.comhpelto28@mercyhurst.eduJustin Smithjsmith16@mercyhurst.edujmsmith16@gmail.comJennifer Jarema(216) 316-1016jenniferjarema@gmail.comjjarem63@mercyhurst.edu Chris Dyakon(814) 392-9307chrisdyakon@gmail.comcdyako57@mercyhurst.eduAustin Ewing(814) 598-0035aewing56@gmail.comaewing56@mercyhurst.eduPerry Avery(330) 348-6916perry.avery@gmail.comCarolyn Venditti(717) 448-4693carolyn.venditti@gmail.com