Cybersecurity
Why the cybersecurity market is poised for an MSSP explosion in 2022 and how the channel can capitalise on this
Daniel Hurel, Vice President of Westcon Cyber Security & Next Gen Solutions, EMEA explains why the ground is set for MSSPs to experience meteoric growth in 2022 and how businesses can capitalise on this trend.
C
ybersecurity has become a major priority for businesses of all shapes
and sizes in recent years. Whereas enterprises and central government used to be the primary targets for bad actors, the threat landscape has expanded to the point where SME’s are now firmly in the crosshairs of cybercriminals. Tis has resulted in a dramatic increase in demand for cybersecurity capabilities, and has changed the way that the cybersecurity market operates, with supply chain and talent shortages further exacerbating the resource crunch. Tese conditions set the stage for an MSSP explosion in 2022. Even though the industry has been going from strength to strength in recent years but 2022 should see exponential growth in the sector.
The market conditions, which are laying the groundwork for MSSP’s cybersecurity is now among the top priorities for executives, according to Gartner’s latest Emerging Risks Monitor Report.
32 | April 2022
Ransomware, in particular, is an even greater concern for executives than pandemic related issues, including supply chain disruptions. To counteract this and limit the potential damage of an attack, businesses need to treat cybersecurity as a business- critical function with subsequent investment in new solutions. How business resources are allocated though, to meet these challenges, is changing to adapt to these new market conditions. Traditionally, cybersecurity
functions were handled in-house.
Hardware was king in this environment and needed specialist skills within the organisation to operate these tools and adapt them to the needs of that particular business. While this worked for larger organisations who could make use of the functionality of “one size fits all” hardware, many smaller businesses who wanted to bolster their cybersecurity posture were priced out. Tey also didn’t need all of the capabilities that were packed into those products. Finding the right individuals to operate and maintain the hardware was also a
www.pcr-online.biz
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52