The specialised threat analysis and protection (STAP) market continues to gain traction with widespread adoption of both SaaS subscription and on-premise sandboxes and a renewed focus on emerging advanced endpoint and network security technologies. These solutions examine network traffic as well as user, system, file, and application behaviours in an attempt to identify threat indicators associated with targeted attacks, custom malware, and sophisticated tactics.
IDC estimates that the market in 2014 had revenue of $930 million. It is forecast to grow to over $3 billion by 2019, with a total market compound annual growth rate (CAGR) of 27.6%. The number of security vendors with STAP products is growing significantly. Established security vendors are taking steps to modernise their portfolio to meet customer demand for new approaches to protect sensitive corporate data and identify threats that evade detection from traditional signature-based network and endpoint products.
This paper is the direct result of a simple question that a customer asked us recently: “What if a malicious file were to escape Comodo’s containment technology, wouldn’t it be ‘game over’?” In point of fact, while Comodo’s patent-pending Automatic Containment™ is an integral part of Comodo’s Default Deny Platform,™ the short answer is no, Automatic Containment is only one – albeit very important – piece of the Comodo protection puzzle.
The cybersecurity industry is in crisis. It seems like every week another new player appears, claiming they’ve come up with the elusive magic bullet to stop malware and breaches, finally making us immune to ransomware, phishing and APT attacks. “We’re different,” they claim, “because we use whitelisting, or sandboxing, or machine learning, or virtualisation.” Quite often, it’s a combination of these approaches and strategies. Unfortunately, the stark and unforgiving truth is that despite a landscape saturated with promises and crowded with cybersecurity solution providers, there are roughly five times more breaches occurring today than there were ten years ago.
A World of Constant Threat
We live in a world of constant threat. Hackers around the globe work every hour of every day to attack companies, both large and small, across every industry. They write malicious code and exploit company networks and websites. In 2014, the data breach at JPMorgan Chase compromised personal information of more than 83 million households and businesses. The highly-publicised Sony Pictures breach in late 2014 released over 100 terabytes of internal files (e.g., executive emails, usernames and passwords, personal information about employees, and films).