Whitepaper: Mobile Network And Data Center Spending Driving DDos Appliance Growth
Distributed denial-of-service (DDoS) prevention appliances are the first line of defense for most service providers and large enterprises looking to protect themselves from brute-force attacks on network or resource availability.
With the unprecedented number, size, and coverage of DDoS attacks over the last 24 months (punctuated by a very deliberate set of attacks aimed at US financial institutions in September), vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. 2011 revenue was US$210.6 million, up 43% over 2010, and 2012 worldwide revenue finished at close to US$275 million, which is nearly 30% above 2011.
Until 2011, the traditional carrier transport market—which Arbor Networks has dominated for nearly a decade—was the largest DDoS deployment location, but it was surpassed by the data center (enterprise and carrier, including hosted DDoS service environments) in 2012.
Going forward, we expect serious activity in the data center segment, which will see a healthy 22% 2011 to 2016 compound annual growth rate (CAGR), versus 9% for the mature carrier transport market
The mobile segment shows the most explosive growth (32.7% CAGR from 2011 to 2016) as it rides the compound wave of a transition to IP and data, massive increases in capacity, and a new role as a juicy and highly visible target for attacks. Mobile carriers are interested in protecting their networks and understanding what’s flowing across them, driving many to look at a combination of DDoS and standalone DPI solutions. Arbor alone announced mobile deployments at SK Telecom, Hunan Mobile, and Star Hub in the last 6 months.
- 3 Considerations To Help Businesses Navigate Cloud Implementation - February 12, 2016
- How Cloud Data Is Driving Transparency In The Channel - February 11, 2016
- Internet of Things: I Spy With My Little Eye… - February 11, 2016
- 4 Cloud Technology Trends To Look Out For - February 10, 2016
- Cloud Providers Should Welcome End Users’ Scrutiny on Security Practices - February 9, 2016