* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 投影片 1 - Network Forensics | Lawful Interception
Survey
Document related concepts
Transcript
Market Analysis Decision Group Agenda Market DPI/DPC Market Size Market Segments Forensic Solution Market Competitors Decision Market Position Wrap-up Company Logo Market There are 2 kind of similar technologies for different purpose in the market DPI (Deep Packet Inspection): a sniffer function of network equipment for firewall, VPN control, IDS, Anti-virus…etc. DPC (Deep Packet Capture): for further parsing, reconstructing information, text mining, and network analysis…etc. The major difference is high packet capture (close to 100%) requirement for DPC Decision has good capability on DPC technology with more applications above. Company Logo DPI/DPC Market Size Total Market Estimation of DPI/DPC by Market survey Companies In 2015, the overall forecast of DPI market will be USD1.6B with 10.5% growth of CAGR from 2011(Infonetics Research) The report projects the U.S. Government DPI/DPC market to grow at a CAGR of 36% from 2010 to about US$ 1.8 Billion by 2015. (Deep Packet Inspection (DPI): U.S. Government Market Forecast 2010-2015) The overall policy management market will grow from USD876 million in 2008 to USD2.62 billion in 2013 at a CAGR of 27% (Patrick Kelly, Research Director; Glen Ragoonanan, Senior Analyst) Company Logo DPI/DPC Market Trend Most DPI/DPC demand are in 3 major market segments: Lawful Enforcement Agencies Data protection in Private Enterprises Telecom service operators Company Logo Lawful Enforcement Agencies Lawful Interception/Network Forensic Target Customers - Major demand from legal enforcement agencies, such as police, intelligence agencies, national security…etc. Legal Ground - Binding with the Communications Assistance for Law Enforcement Act (CALEA) and ETSI madates in countries other than the U.S. Applications for Forensic and IP Protection • Require operators to ensure that security services can use equipment for surveillance. • DPC is the only technology to do this in a VoIP environment. • Digital Right Management for filtering of content to analyze whether it has been copied Company Logo Data Protection in Private Enterprises IT Security and Data Protection Target Customers - Large Private Enterprises and Home Users Applications for IP and Data Protection • Intelligent Property Protection • DPI is used increasingly to underpin security applications and to fight spam, phishing, distributed denial of service (DDoS) attacks, botnets, viruses, and other threats. • Parental & Network-Based Control against Pornography and Gambling, Drug Dealing • Customer data leakage protection Company Logo Telecom Service Operators Large growth in Telecom service operators Target Customers – Telecom Service Operators, Internet Service Providers, Application Service Providers, Content Service Providers Applications for Network Analysis and Customer Behavior Survey • Mobile operators account for much of the DPC market's growth over the next five years Bandwidth Management • Imperatives to manage unwanted traffic in their networks, as well as spiraling volumes of wanted traffic – a new issue for mobile operators Value-added Service • Vendor product positioning change to promote DPC as an engine for service differentiation and revenue growth Company Logo Forensic Solution Market Under Scope of IT Security Fast Growing Niche Market Digital Forensic Market Computer Forensics Network Forensics Mobile Device Forensics Focus on Data Volatile (network forensics) Persistent (both computer and mobile) DPC technology is the core of Network Forensic Solution Value Preposition of Decision Keep on focusing on development of DPC engine in wired, wireless and mobile networks Be a global major OEM/ODM supplier with DPC engine, EDDC, HTTPS/SSL and VoIP products Maintain and enhance global sales and service distribution networks Company Logo Wrap up Focusing on lawful interception, network forensic, and data protection Developing function module in Mobile network Strengthen partnership with global OEM/ODM customers Develop more applications for different protocols Develop solutions for telecom service providers Keep global sales/marketing/service channels infrastructure Company Logo Thank You for Your Attention Company Logo