The unified threat management market has grown by 11.0%, from $1.5 billion in 2013, to $1.6 billion in 2014, with the strongest growth seen in Western Europe, emerging Asia/Pacific and Greater China. 1 Market Size by Segment, Worldwide, 2011-2014 2 Market Shares by Vendor, Worldwide, 2013-2014 3 Definitions 1-1 Market Size: Unified Threat Management (SMB Multifunction Firewalls), by Segment, Worldwide, 2011-2014 (Millions of Dollars) 1-2 Total Annual Growth: Unified Threat Management
Gartner clients can access this research by clicking here.
http://uk.reuters.com/article/2015/02/25/uk-cybersecurity-europe-idUKKBN0LT0U020150225 BY ANTHONY DEUTSCH AND JIM FINKLE AMSTERDAM/BOSTON Reuters.com Feb 25, 2015 (Reuters) – A cybercrime operation that stole banking information by hacking more than 3 million computers in Indonesia, India and other countries has been disrupted by European police with assistance from three technology companies, officials said on Wednesday. The European Cybercrime Centre at Europol, the European police agency, coordinated the operation out of its headquarters in The Hague, targeting the so-called Ramnit botnet, a network of computers infected with malware. Working with investigators from Germany, Italy, the Netherlands and Britain, it was assisted by AnubisNetworks, a unit of BitSight Technologies; Microsoft Corp and Symantec Corp in dismantling the server infrastructure used by the criminals, Europol said. “The criminals have lost control of the infrastructure they were using,” Paul Gillen, head of operations at Europol’s cybercrime centre, told Reuters. […]
http://www.birminghammail.co.uk/news/midlands-news/hackers-made-24000-attempts-attack-8705246 By Neil Elkes Birmingham Mail 24 February 2015 Hackers launched a major attack on Birmingham City Council’s computer system . The authority’s website was hit by a ‘significant attack’ receiving 24,000 hits per minute on Friday in an attempt to breach its security leading to major action to protect the data. Service Birmingham Chief Executive Tony Lubman revealed the attack while appearing before the council’s contracts and partnership committee. He told the panel how fending off attacks takes considerable resources. “Birmingham is by far the largest local authority in Europe. You represent the Government and you are therefore a target,” he said. […]
http://www.computerweekly.com/news/2240236318/Cloud-security-remains-a-barrier-for-CIOs-across-Europe By Cliff Saran ComputerWeekly.com 09 December 2014 Security issues are the main factor limiting the further use of cloud computing services, research from Eurostat has found. In a survey conducted by the European Commission’s Eurostat statistics service, public cloud computing was reportedly used by 24% of large enterprises and 12% of small and medium-sized enterprises (SMEs) in the EU. However, the survey noted that the risk of a security breach scored highest both for large enterprises and SMEs, at 57% and 38% respectively. “Firms attach importance to the protection of their IT systems, but the issue can be seen in the wider context of resilience to possible security breaches when using the cloud,” the Eurostat report stated. […]
http://www.theregister.co.uk/2014/11/19/sms_pwnage_on_meellions_of_flawed_sim_cards_popular_4g_modems By Darren Pauli The Register 19 Nov 2014 A Russian research team has found vulnerabilities in millions of the world’s SIM cards, and separate flaws in common 4G modem platforms. Together, the bugs could allow attackers to send crafted SMS text messages to gain access to critical systems and install malware on connected computers. In one dramatic and hypothetical example, the research team of six from outfit SCADA StrangeLove showed how track switching mechanisms in the European Rail Traffic Management System could be altered by remote attackers targeting computers and devices on trains and tracks. They found what fellow SRlabs researcher Karsten Nohl estimated was ‘millions’ of the world’s SIM cards that could be impersonated by attackers who captured the users’ Temporary International Mobile Subscriber Identity and decryption key (Kc), numbers that were designed to stop eavesdropping between devices and phone towers. It built on Nohl’s research last year that revealed SIM flaws could allow attackers to intercept calls and target wireless NFC applications like contactless payments through crafted text messages. […]