Data Center Operators Looking to Security Infrastructure for New Revenue

CAMPBELL, Calif. (December 23, 2015) - IHS (NYSE: IHS) today released excerpts from its 2015 IHS Infonetics Cloud and Data Center Security Strategies and Vendor Leadership: Global Service Provider Survey , for which data center and cloud operators were interviewed about their strategies for deploying security in the data center and their ratings of security vendors.

“Many of the data center operators participating in our study are looking to turn their security infrastructure into a revenue-generation tool, providing off-premises security services to customers,” said Jeff Wilson, senior research director for cybersecurity technology at IHS.

“As virtualization and SDN (software-defined networking) deployment increases, it becomes easier and easier for service providers to provide protection for their virtualized infrastructure and deliver customized for-revenue security services to customers,” Wilson said.


  • When asked about basic strategies for deploying security in the data center, survey respondents clearly favor a multi-layered approach, with most already deploying a mix of hardware appliances, virtual appliances and per-VM software
  • Respondents’ highest-rated drivers for deploying virtual appliances for security are diverse: adding cloud-based services for security, deploying SDN and improving agility when deploying new security services
  • Operators surveyed have deployed or are evaluating security products from a massive list of vendors, and there is no clear leader


For the 30-page 2015 cloud and data center security survey, IHS interviewed 26 incumbent, competitive, mobile and data center/cloud specialist carriers in North America, EMEA, and Asia about their strategies for deploying security in the data center. The study provides insights into data center and cloud security drivers, requirements, spending plans, deployments, suppliers and more, and features operator ratings of 11 vendors ( Arbor Networks, Check Point, Cisco, F5, Fortinet, HP, Intel Security, Juniper, Palo Alto Networks, Trend Micro, VMware ) on 11 criteria. This report is part of the IHS Cybersecurity Technology Intelligence Service. To inquire about research subscriptions, please visit


IHS: +1 844-301-7334

This content extract was originally sourced from an external website (IHS Technology Press Releases) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Sign up to receive TelecomTV's top news and videos, plus exclusive subscriber-only content direct to your inbox.