Hardware Edges Out Software For Network SecurityHardware Edges Out Software For Network Security

Britestream Networks, which commissioned the report, contends that's a reversal from the past.

Thomas Claburn, Editor at Large, Enterprise Mobility

February 1, 2005

2 Min Read
information logo in a gray background | information

Slightly more IT managers prefer using hardware to secure their networks than software, according to a new research report commissioned by security hardware vendor Britestream Networks Inc. The survey, based on online interviews with more than 300 IT professionals working with companies with $30 million or more in annual revenue, was conducted by independent market-research firm Q&A Research.

Among the significant findings: 54% of respondents prefer a hardware-based product--a hardware appliance or an embedded feature in network hardware equipment--over software when asked how they would prefer to deploy network security in their organization. While this may seem like an insignificant majority, Britestream contends that it's a reversal from the past, when companies preferred software because it was easier and faster to develop. Companies now want the ease of management and high performance associated with hardware, Britestream says.

"Security in software is very slow, and people underestimate the impact that has on their network," says Mike Salas, VP of marketing for Britestream. Hardware is more easily managed and maintained than software, he says, and hardware is more secure. "People find ways to hack into software."

He points to recent hardware product introductions by Symantec Corp. and Check Point Software Technologies Ltd.--traditionally software vendors--as an indication that the industry is aware of the growing preference for boxes among customers.

Andrew Singer, manager of market intelligence at Check Point, says customers want proven security systems but their needs vary. While he acknowledges that his company has seen strong sales from the Nokia Firewall/VPN appliance, which includes Check Point's VPN-1 Pro software, he's also seeing a trend in the proliferation of open, low-cost Intel servers in the enterprise. That's an environment, he says, that offers increasing opportunities to software vendors.

It's hardly unusual for vendors to commission reports and for those reports to end up validating their business models. But some industry analysts note similar findings in related markets. The January 2005 Messaging Technology Report, issued by The Radicati Group, a technology market-research firm, predicts, "E-mail security appliances will be on the top of many organizations' shopping list for 2005. Products that can address [security and policy] needs with a 'plug it in and forget about it' approach will lead the market."

Read more about:

20052005

About the Author

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, information, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights