Malaysia: Look Ahead to 2013 - Part 2

AvantiKumar

Sumit Bansal, Director of Sales, ASEAN, Soph


Photo - Sumit Bansal, Director of Sales, ASEAN, Sophos

Against a backdrop of cautious spending, price pressures and budget limitations in key vertical markets in Malaysia, we are really excited about the revenue growth we achieved at Sophos this year. During the year, Sophos made considerable advances in the Malaysian market with our mobile device management, mobile data protection, cloud encryption and unified threat management (UTM) solutions while strengthening our market-leading endpoint and data protection solutions - all components of our Complete Security Suite offerings.

In 2011 going into 2012, we achieved record results worldwide, with overall double digit growth year-on-year, and we were positioned as a Leader in Gartner's 2011 Magic Quadrants for Mobile Data Protection, Endpoint Protection and Unified Threat Management (UTM) market segments

For 2012 to date, Malaysia's contribution has seen a significant revenue growth compared to the same period in 2011. Currently our customers include Government agencies, leading telcos & FSI organisations, some of the largest retail chain stores, and  many SMB & Mid Sized Enterprises. 

We attribute our rising success in the Malaysian market, and in SEA [Southeast Asia] in general, to increased demand for integrated, easy-to-manage all-in-one security solutions. This demand is coming from SMBs and small-to-mid size enterprises across the board and particularly from organisations in the financial sector, telecommunications and government.

Personal data protection legislation

Increased awareness of, and action on, compliance requirements has been a significant driver of demand for Sophos' solutions in the financial sector and with telcos in Malaysia, following the gazetting of the Personal Data Protection Act, and with the implementation of PCI-DSS compliance for credit merchandisers and receivers.
With the enterprise & government market segments, we have seen a strong focus on bringing costs down and improving staff productivity, while cloud and virtualisation have been, and continue to be, the key means by which these and other organisations expect to consolidate costs and improve customer and internal processes.

With 5.1 percent  GDP growth forecast for Malaysia in 2013 (World Bank), we expect to see increased demand to meet ICT requirements in areas that involve projects directly or indirectly related to the New Economy Model (NEM), although the new Cabinet may need some time to settle down after the upcoming Election, which may slow down decision making for government ICT spending.

In the general market, security demand continues to increase year-on-year, and we will see security requirements driven by BYOD, cloud and virtualisation continue to gain momentum in 2013. Organisations are looking for ways to optimise their security infrastructure, and require integrated solutions that will give active protection through the cloud and protect against a variety of threats with endpoint, network and data protection, messaging security and web security, while lowering the total cost of ownership and offering more streamlined management for increased productivity.

Today's connect-from-anywhere road warriors regularly test the traditional boundaries of network security, with increasingly porous firewalls as employees access services from their mobile devices, all of which require security that mirrors but also improves upon PC solutions. With the fast-rising popularity and massive growth of smartphones for business use, malicious mobile software and malware viruses, worms, trojan horses, spyware and other  rogue applications will increase exponentially.

In this environment, advanced persistent threats (APTs)) represent the next generation of Internet crimeware, while the threat of attacks on Web applications to extract data or to distribute malicious code persists.

Enterprise security strategy therefore needs to focus on network security for devices where an endpoint agent may not have been deployed, or may not be functioning properly. And it needs to address the new security challenges of IPv6 moving into network backbones and the internet at large.

This is also forcing enterprises to sit up and rethink their security and defence mechanisms for mobile device and application management, and look at implementing robust security tools to remotely secure, monitor, encrypt and manage data, and to secure and control corporate data and applications on an application-by-application basis .

Previous Page  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  Next Page