Managed Security Services
By Counse Broders, Current Analysis
Published November 2004, Posted November 2004




Security plays a factor in protecting corporate information. With companies increasingly reliant on interconnected machines that span communication networks across geographies, risks increase for data to be vulnerable to espionage, corporate spies, and hackers. This market assessment on managed security examines managed outsourced services and technologies, such as intrusion detection services, authentication services, hosted application security, and other managed security offerings. These can be offered by a variety of companies, ranging from small niche players to national and global providers. Focus is on managed security offerings as a service, not as custom-managed products that cannot be replicated for other firms.


Managed security services reduce the cost and labor of security for enterprises and networks and improve the efficacy of network security.

While network security has been a primary concern of the telecom market since the first circuit-switched networks began to take shape, with the IP evolution, managed security has developed significant traction. In particular, online strategies have expanded beyond the capabilities and capacities of the in-house IT staffs. In addition, the growing number of small and medium-sized enterprises (SMEs) tackling online strategies is providing a rapidly growing market for managed security providers.



Download paper

Approx. 44 kB


Click here for help with .pdf downloads. 


Return to Current Analysis Reports menu


Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at