Open-Source Security Is Opening Eyes
- by Brittany Day
This once unimaginable segment continues to gain credibility, venture-capital backing, and sales.
Business Week 2002-11-19,
Back in 1999, Dave Wreski was working as an Internet security architect at United Parcel Service (UPS ). A aficionado of Linux -- one variety of the free and nonproprietary type of software known as open source -- Wreski thought he saw a future in computer security. In May of that year he ponied up $100,000, hired two programmer friends, and launched a company called Guardian Digital in Allendale, N.J. Originally a security consulting firm, Guardian Digital quickly morphed into a seller of security hardware and open-source software for e-commerce, e-mail, and so-called perimeter servers that run firewalls, intrusion-detection systems, and virtual private networks.
At the time, Wreski was bucking conventional wisdom: After all, who builds a security system from free software, when proprietary systems are seemingly safer? Today, however, Wreski's dream doesn't seem so ridiculous. Guardian Digital now employs more than 20 people and boasts more than 5,000 customers for its hardware, software updates, and support. They're mostly small and midsize companies, but they also include Sony Electronics (SNE ) and AT&T New Zealand.
Wreski says Guardian Digital turned profitable eight months ago and is growing by 10% each quarter, much faster than the low single-digit growth for the overall security sector, according to tech consultancy Gartner. "I think there was some apprehension about [the software] being free. But that has changed," says Wreski, who adds that he's entertaining funding offers from venture capitalists.
In fact, more and more businesses and government entities are deploying open-source security software, says Gartner analyst John Pescatore. "Even the big [security] players install Snort [a well known open-source intrusion-detection system]," adds Pescatore. Open-source software, hardware that runs open-source programs, and services to support such programs still account for only 0.5% to 1% of commercial spending in the computer-security market. But that's up from zero only two years ago.
A number of factors have combined to give open-source products more prominence. The most important is more ready acceptance by corporate tech departments of Linux and other such applications, including Apache Web server. In fact, the standard open-source Apache package runs about 60% of all Web servers, according to tech consultancy Netcraft. "I found [open-source security software] to be a viable alternative," says Scott DeKramer, information-technology manager for orthopedics company Implex in Allendale, N.J., and a Guardian Digital customer. "I was fairly familiar with Linux, and I liked the flexibility it could give me" to customize software.
Adds Gartner's Pescatore: "People are getting more comfortable using Linux in their business. It's bleeding over into a lot more open-source security tools."
The tough economy has also pushed customers in this direction. Though the software is almost never really free -- once the cost of programming and consulting needed to make it work are thrown in -- many IT managers believe it remains far cheaper than proprietary software -- and cheaper to manage day-to-day. Moreover, open-source products tend to be strong in some of the fastest-growing areas of tech security. For example, millions of Web surfers have downloaded Snort as freeware. It's considered one of the better programs in what will be about a $400 million intrusion-detection market this year, according to networking tracker Infonetics. That's good news for SourceFire and Silicon Defense, two open-source security companies that have built product offerings around Snort.
Open-source security software is also getting a boost from the federal government. Top programmers at the super-secretive National Security Agency made public a security-enhanced version of the core Linux operating system, called SELinux, in April, 2001. And the Defense Dept. is funding a number of projects aimed at making open-source computing secure. Since that research rapidly enters the public domain, it amounts to free R&D for small open-source security companies.
The bottom line is that security products based on open-source software are becoming a viable business. While no huge players are in that business yet, several companies have significant name recognition. Managed-security company Guardent, which created a hardware-based open-source security product last year, says 25% of its business now comes from open-source applications. Sources close to Guardent say its revenues will be about $25 million in 2002, and that its open-source business is quintupling every year.
Certainly, most open-source security companies are still small enough to stay below the radar. That may not be the case for long, though. Roesch says his first customer was a Big Five accounting firm, and he's starting to sell six-figure installations to big companies -- a sign that, ultimately, open source could become a significant factor in what promises to be one of the healthiest tech markets of the future.
Read the full story in Bloomberg Business
Must Read Blog Posts
- Complete Guide to Email Viruses & Best Practices to Avoid Infections
- Microsoft 365 Email Security Limitations You Should Know
- Shortcomings of Endpoint Security in Securing Business Email
- What You Need to Know to Shield Your Business from Ransomware
- Demystifying Phishing Attacks: How to Protect Yourself Now
Latest Blog Articles
- How a Recession Will Change the Cybersecurity Landscape
- The Impact of Artificial and Human Intelligence on Email Security
- Ransomware Attacks on Schools Average 3 Weeks Downtime, 9 Months to Recover
- PCI DSS Compliance for Cloud Services - Everything You Should Know
- Email Security Best Practices to Safeguard Your Business in 2023
- Shadow IT and the Future of Cybersecurity
- Guardian Digital Perspective on Gartner’s Top Cyber Predictions for 2023
- Ransomware Gangs: Lapsus$
- What Is Deepfake Phishing?
- Is Your Organization Vulnerable to Account Takeover?