logo
Quantum Cryptography Market Growth Size, Opportunities, Future Scope, Business Scenario, Share, Key Segments And Forecast To 2030

Quantum Cryptography Market Growth Size, Opportunities, Future Scope, Business Scenario, Share, Key Segments And Forecast To 2030

Globe and Mail24-03-2025

"Toshiba (Japan), NXP Semiconductor (Netherlands), Thales (France), IDEMIA (France), Palo Alto Networks (US), DigiCert (US), Quintessence Labs (Australia), QuantumCtek (China), ISARA (Canada), IBM (US), ID Quantique (Switzerland), MagiQ Technologies (US), Crypta Labs (UK)."
Quantum Cryptography Market by Solution (Quantum Key Distribution (QKD), Quantum Random Number Generators (QRNG), Quantum-safe Cryptography)), Service (Professional, Managed), Security Type (Network, Application, Cloud) - Global Forecast to 2030.
The quantum cryptography market is expected to be valued at USD 1,157.0 million in 2024 and is anticipated to grow to USD 7,594.0 million by 2030, with a CAGR of 36.8% during the forecast period. This growth is primarily driven by rising cybersecurity threats and rapid advancements in quantum computing, which are rendering traditional encryption methods obsolete. The increasing demand for robust authentication and encryption solutions resistant to quantum hacking has fueled adoption across sectors such as finance and healthcare. Additionally, government funding and initiatives supporting quantum technology development further contribute to market expansion. However, organizations face challenges due to accelerating digitalization, stricter data privacy regulations, and potential disruptions from corporate decisions.
Download PDF Brochure@ https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=45857130
The growth in the quantum cryptography market is being fueled by increased cyberattacks, advancement in quantum computing, and major initiatives by governments around the world across various sectors as healthcare, defense, telecom, IT, finance, and education. The increase in demand for advanced security measures to protect sensitive information from malicious attacks has brought a shift from traditional cryptographic methods to more robust solutions. More especially, the digital banking and electronic transaction are increasing, and therefore, the communication system should be assuredly secured. Quantum cryptography solutions such as Quantum Key Distribution (QKD), Quantum Random Number Generators (QRNG), or hardware security modules may provide theoretically unbreakable encryption to safeguard the data and communications against increasingly sophisticated cyber threats.
Based on the Organization Size, the Large Enterprises segment accounts for the highest market size during the forecast period.
Quantum cryptography is mostly driven by the large enterprises segment, since managing big amounts of sensitive data requires a high level of security and there are more strict regulations in end-users like finance and healthcare. The quantum threats are very likely to stimulate significant investments into solutions resilient to such threats. Consequently, it is the large enterprises which have the potential for holistic R&D, such as that of IBM or Google, who have already been developing post-quantum cryptographic algorithms. Additional strategic partnerships with organizations, such as NIST, contribute to increased adoption. Innovators, like Cloudflare, which has already integrated post-quantum protocols, are a show of proactive action.
By Vertical, Healthcare segment will grow at the highest CAGR during the forecast period.
Emerging security threats, the increased need for regulatory compliances, and an ongoing process of digital transformation is driving the healthcare industry in the quantum cryptography market. Healthcare organizations hold highly sensitive data related to personal health information that has become a high-priority target for cyberattacks. Quantum cryptography provides for advanced encryption techniques that will ensure the safety of that data and will help keep these regulations, such as HIPAA, in check. The growing demand for electronic health records, telemedicine, and cloud solutions further increases the requirement for future-proof security. In addition to this, real-time data access is critical in emergency medical care. Growing healthcare cybersecurity investment in the public as well as private sectors is driving the adoption of quantum cryptography solutions due to the driving urgency for implementing security measures and government regulations supporting the adoption of cryptographic technologies. For example, companies like ID Quantique have developed custom healthcare applications for specific security needs in healthcare sector with a motive of securing sensitive data related to the patients.
By region, Europe will grow at the highest CAGR during the forecast period.
Europe in quantum cryptography market is driven by several factors that include strong governmental support coupled with funding through initiatives such as the EuroQCI enhancing the security of European communications. The ever-growing challenge of cyber-related risks force financial, health, and governments to modernize their safety measures. Stricter regulation like the GDPR makes organizations more and more in need of safe defense mechanisms for personal data. Moreover, the presence of leading research institutions and early adoption of quantum technologies by countries such as Germany and UK further contribute to the growth of this market.
Request Sample Pages@ https://www.marketsandmarkets.com/requestsampleNew.asp?id=45857130
Unique Features in the Quantum Cryptography Market
Quantum cryptography leverages Quantum Key Distribution (QKD), which ensures secure communication by using quantum principles such as superposition and entanglement. Unlike traditional encryption methods, QKD offers theoretically unbreakable security, as any attempt to intercept the key alters its quantum state, immediately alerting the sender and receiver.
As quantum computers advance, they pose a significant threat to conventional encryption algorithms such as RSA and ECC. Quantum cryptography provides a future-proof solution by enabling encryption methods that cannot be cracked, even by powerful quantum computers. This ensures long-term data security in industries handling sensitive information, such as finance, healthcare, and defense.
One of the distinguishing features of quantum cryptography is its ability to detect eavesdropping in real-time. Any unauthorized attempt to intercept or measure quantum-encoded information disrupts the system, alerting the users immediately. This proactive security measure strengthens data protection against cyber threats.
Governments and major industries are increasingly investing in quantum cryptography to safeguard national security and critical infrastructure. Many countries are funding research initiatives, forming strategic partnerships, and setting up quantum communication networks to ensure secure data transmission.
Major Highlights of the Quantum Cryptography Market
With the rise in cyberattacks and data breaches, traditional encryption methods are becoming vulnerable. Quantum cryptography offers a next-generation security solution, ensuring impenetrable encryption, particularly for sectors handling sensitive data, such as finance, healthcare, and defense.
Governments worldwide are heavily investing in quantum research, launching initiatives to develop quantum-secure communication networks. Countries such as the U.S., China, and those in the EU are funding quantum technology projects to safeguard critical infrastructure and national security.
A key highlight of the market is the seamless integration of quantum cryptography with classical encryption systems. Hybrid models allow organizations to gradually implement quantum-secure encryption without overhauling their entire IT infrastructure, making adoption more feasible.
QKD, a core technology in quantum cryptography, is being deployed in various sectors to enable ultra-secure data transmission. Several telecom providers and research institutions are testing QKD-based communication networks to enhance security for financial transactions, military operations, and government communications.
Inquire Before Buying@ https://www.marketsandmarkets.com/Enquiry_Before_BuyingNew.asp?id=45857130
Top Companies in the Quantum Cryptography Market
The report profiles key players such as Toshiba (Japan), NXP Semiconductor (Netherlands), Thales (France), IDEMIA (France), Palo Alto Networks (US), DigiCert (US), Quintessence Labs (Australia), QuantumCtek (China), ISARA (Canada), IBM (US), ID Quantique (Switzerland), MagiQ Technologies (US), Crypta Labs (UK), Qasky (China), Qubitekk (US), Nucrypt (US), Quantum Xchange (US).
Toshiba (Japan)
Toshiba (Japan) is making great strides in the quantum cryptography market through significant investments in projects such as Quantum Technology Centre at Cambridge, UK, focusing on solutions in the area of quantum-secure networking. Toshiba applies the technology of QKD from research to commercial applications in sectors such as finance and telecommunication. Toshiba has strong basis of R&D and solutions offerings in quantum cryptography making Toshiba the leader in secure communications. Recent wins include quantum-encrypted data transmission over 600 kilometres and launch of quantum-secure metro network trial with BT in London. Toshiba also has a digital transformation strategy towards sustainability and innovation and strategic partnerships and acquisitions with energy solutions and secure communication technologies.
NXP Semiconductor (Netherlands)
NXP (Netherlands) is one of the leading semiconductor companies in the Netherlands and is rapidly advancing in the quantum cryptography market, especially focusing on post-quantum cryptography or PQC, which is increasingly being adopted to counter new threats from quantum computing. The company has also been deeply investing in the R&D regarding the development of quantum-safe hardware and algorithms in the field of automotive, industrial IoT, mobile, and communications infrastructure. In close collaboration with the likes of NIST, NXP is shaping and aligning its security solution to "future-proof" PQC standards. Using strong intellectual property portfolios and vertically integrated manufacturing capabilities backed up by expertise in secure connectivity, NXP delivers leading-edge secure products. NXP also works on cryptographic algorithms such as Crystals-Kyber and Crystals-Dilithium and reiterates its position as one of the pioneers in development work for secure, innovative solutions to address the challenges of the quantum computing era.
Thales (France)
Thales (France) is a key player in the Quantum Cryptography Market, developing advanced quantum-safe encryption solutions to protect sensitive communications and data from emerging quantum threats. Its innovations focus on post-quantum cryptography and quantum key distribution (QKD) to enhance cybersecurity for governments and enterprises.
IDEMIA (France)
IDEMIA (France) is advancing quantum cryptography by developing secure communication solutions that protect against quantum-era cyber threats. The company integrates quantum-safe encryption into its identity and security solutions, ensuring robust data protection for governments and enterprises.
Palo Alto Networks (US)
Palo Alto Networks (US) is exploring quantum cryptography to enhance cybersecurity by developing quantum-resistant encryption methods. The company focuses on securing networks against future quantum threats through advanced cryptographic algorithms and next-generation security solutions.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

HashiCorp Expands Unified Lifecycle Management for Hybrid Cloud Operations
HashiCorp Expands Unified Lifecycle Management for Hybrid Cloud Operations

Globe and Mail

time5 days ago

  • Globe and Mail

HashiCorp Expands Unified Lifecycle Management for Hybrid Cloud Operations

LONDON, June 03, 2025 (GLOBE NEWSWIRE) -- Today at HashiDays London, its first international user conference as an IBM company, HashiCorp unveiled the vision for partnering with IBM to shape the future of hybrid cloud automation. Despite widespread adoption, most enterprises have not reached cloud maturity — out of the 94% using cloud services, only 20% are receiving full ROI. IBM estimates that one billion new AI applications will emerge by 2028, driving greater cloud complexity and forcing enterprises to make critical decisions about their hybrid cloud strategies. Together with IBM's software automation portfolio, HashiCorp is delivering the automated hybrid cloud platform that unifies infrastructure and security workflows, reduces complexity, and enhances visibility and control. At HashiDays London, HashiCorp announced new products and integrations that expand the capabilities of its Infrastructure Cloud across Infrastructure and Security Lifecycle Management (ILM and SLM) to help organizations automate hybrid infrastructure delivery, reduce operational risk, and improve security posture throughout the entire application lifecycle. "I'm excited to welcome our global community to HashiDays 2025, where we are sharing our vision for how HashiCorp and IBM will work together to build an automated hybrid cloud platform,' said Armon Dadgar, CTO and Co-Founder, HashiCorp. 'With this vision, we'll deliver a unified control plane that powers hybrid applications, embedding policy, automation, and observability into every layer of the stack, so enterprises can modernize securely, streamline operations, and unlock AI-driven automation at scale.' For more than 10 years, HashiCorp has helped thousands of customers across every geography and industry do cloud right. At HashiDays, customers from EMEA and APAC, including BT Group, Helvetia Insurance, HTX, InfoCert, shiftavenue, Trust Bank, SPH Media, and more, are sharing stories of how they manage cloud infrastructure and security with HashiCorp. Infrastructure Lifecycle Management As customers scale their hybrid strategies with IBM and HashiCorp, Infrastructure Lifecycle Management (ILM) continues to be a foundational priority. From building landing zones to enabling secure Day 2+ automation, organizations are using ILM to drive faster delivery and infrastructure resilience across teams and environments. Helvetia Insurance | How Terraform supported an ambitious cloud migration Founded in 1858 and headquartered in St. Gallen, Switzerland, Helvetia Insurance Group is a major player in the European insurance market. A few years ago, the cloud enablement team started a complete migration from on-premises datacenters to the public cloud. The ambitious goal: move 200 applications to AWS and Azure within one year. Using HashiCorp Terraform, Helvetia's cloud enablement team created landing zones — fully configured cloud accounts with connectivity and policies — for its internal product teams. They then collaborated with a partner to build modules for hardened virtual machines and other critical resources allowing them to follow a lift-and-shift approach, expediting the migration without sacrificing security or governance. "Terraform was instrumental in achieving our migration goals. Without it, moving 200 applications in about a year would have been impossible. Our teams now have the tools to work faster and with greater confidence," said Matthias Mertens, Cloud Solution Architect, Helvetia Insurance. HashiCorp's ILM capabilities help platform and operations teams accelerate delivery, enforce policy, and optimize infrastructure from Day 0 to Day N. Today's announcements expand support for secure, policy-enforced infrastructure delivery with new features across Terraform, Packer, Nomad, and Waypoint. These updates automate critical workflows that improve team productivity and infrastructure resilience throughout the full lifecycle. Build: Define and provision infrastructure in a standardized, scalable way to avoid configuration drift and manual rework. Terraform ephemeral resources (GA): Protect sensitive values from persisting in state files Sentinel policy library for AWS (GA): Enforce secure-by-default configurations with pre-written policies Terraform + Red Hat Ansible Automation Platform: Enable orchestration of complex infrastructure workflows with end-to-end infrastructure as code Deploy: Enable repeatable, secure, and policy-aligned delivery of applications and environments. HCP Waypoint actions (GA): Offer Day 2+ lifecycle workflows like rollback and restart, exposed through UI or CLI, to provide an internal developer platform that shields users from the underlying infrastructure complexity Manage: Monitor, update, and deprecate infrastructure components securely and efficiently across teams and environments. HCP module revocation: Prevent use of revoked modules in HCP Terraform as part of module lifecycle management HCP Terraform Premium SKU: Unlock advanced governance and private VCS support Dynamic host volumes (Nomad): Enable more flexible, scalable provisioning of persistent storage across Nomad clients, essential for stateful workloads that require resilient storage operations in dynamic environments Terraform provider for IBM Z: Empower organizations to integrate their mainframe platforms into modern workflows and hybrid cloud strategies Security Lifecycle Management As organizations modernize their infrastructure, their security surface area grows, along with the need to continuously inspect, protect, and govern sensitive data. Security Lifecycle Management (SLM) ensures that identity-based security, secrets management, and access governance are built directly into hybrid workflows, rather than bolted on after deployment. IG Group | Strengthened security while accelerating delivery with HCP Vault 'As a security leader, my job is to reduce risk for my company without slowing down our development teams,' said Andrew Blooman, Platform Security Team Lead, IG Group. 'Over the past few years, HashiCorp has helped us achieve these goals as we adopted multiple products for a number of use cases. We started with Community Edition versions of Vault, Nomad, and Consul, used HashiCorp Professional Services to accelerate this deployment, and added HCP Vault this year. We now have 63 teams onboarded to HCP Vault, with a centralized GitOps workflow allowing for version control, change approvals, and an audit log of newly onboarded teams.' HashiCorp's SLM capabilities help security and compliance teams safeguard sensitive data, enforce access policies, and maintain governance from Day 0 through Day N. These updates provide proactive tools for visibility, access control, and cryptographic assurance across hybrid environments, and reflect continued investment in helping teams move faster without compromising control. Inspect: Identify and address potential security gaps before infrastructure or applications reach production. HCP Vault Radar (GA): Detect and remediate unmanaged secrets and credential sprawl across environments Consul 1.21 (GA): Simplify external service monitoring architecture for enhanced observability and service registration in complex environments Protect: Enforce identity-based access and secure application communication across environments. Boundary transparent sessions (GA): Provide secure access to systems without altering user workflows Vault and Consul integrations for Red Hat OpenShift: Streamline secure access across containerized workloads Bring your own DNS to HCP Vault Dedicated: Improve connectivity and security posture in regulated environments, available now in AWS and coming soon to Azure Govern: Automate governance of credentials, policies, and encryption standards across systems and teams. Vault Enterprise 1.19: Includes post-quantum cryptography updates, constrained certificate authorities, and automated root password rotation Together with IBM, HashiCorp is delivering the unified lifecycle foundation that modern enterprises need to scale securely and confidently in a hybrid world. Recent announcements, including Terraform Enterprise support for IBM Z and Vault Enterprise support for IBM Z and LinuxONE, bring HashiCorp's ILM and SLM expertise to the mainframe, further enabling hybrid cloud automation that stretches from on-premises to private and public cloud. For more information and detailed coverage of all Infrastructure and Security Lifecycle Management announcements at HashiDays 2025, please visit the HashiCorp blog. About HashiDays HashiDays is taking place in London on June 3 and Singapore on July 22. During the multi-city event, attendees will hear from community members, partners, and customers about the latest advances in HashiCorp's cloud infrastructure products. The HashiDays London keynote and morning sessions will be available to watch via live stream. The live stream link will be shared on the HashiDays homepage 30 minutes before the keynote begins at 9:30 a.m. BST. About HashiCorp HashiCorp, an IBM company, helps organizations automate hybrid cloud environments with Infrastructure and Security Lifecycle Management. HashiCorp offers The Infrastructure Cloud on the HashiCorp Cloud Platform (HCP) for managed cloud services, as well as self-hosted enterprise offerings and community source-available products. For more information, visit All product and company names are trademarks or registered trademarks of their respective holders. Red Hat, the Red Hat logo, OpenShift and Ansible are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries.

Managed SIEM Services Market 2028: New Opportunities, Latest Trends, Applications, Advance Technology And Demand
Managed SIEM Services Market 2028: New Opportunities, Latest Trends, Applications, Advance Technology And Demand

Globe and Mail

time6 days ago

  • Globe and Mail

Managed SIEM Services Market 2028: New Opportunities, Latest Trends, Applications, Advance Technology And Demand

"AT&T (US), Advantio (Spain), BlueVoyant (US), BT (UK), CyberCX (Australia), Capgemini (France), GoSecure (US), Cyderes (US), IBM (US), Integrity360 (Ireland), Redscan (UK), NCC Group (UK), NTT (Japan), Optiv (US), Proficio (US), ReliaQuest (US), SharkStriker (US), Stratejm (Canada), Talion (UK), TCS (India), Trustwave (US), Unisys (US)." Managed SIEM Services Market by Application (Log Management and Reporting, Threat Intelligence, Security Analytics), Type (Fully Managed, Co-Managed), Deployment Mode, Organization Size, Vertical and Region - Global Forecast to 2028. The managed SIEM services market is expected to grow at a compound annual growth rate (CAGR) of 16.3% from its anticipated USD 7.5 billion in 2023 to USD 16.0 billion by 2028. The growing complexity of IT environments inside businesses and the increasing sophistication and diversity of cyberthreats are driving the market for managed SIEM services. Download PDF Brochure@ The accelerated growth of the managed SIEM services industry is propelled by an amalgamation of factors, including the relentless evolution of cyber threats, the imperative for organizations to fortify their digital defenses, and the increasing complexity of IT infrastructures. This surge in demand is further intensified by a global shortage of skilled cybersecurity professionals, prompting businesses to turn to managed services for expert assistance. Additionally, the advent of technologies like artificial intelligence and machine learning in SIEM solutions drives the market forward, enhancing the efficiency of threat detection and response. Furthermore, the rise in remote work and the expanding attack surface due to the proliferation of connected devices contribute to the heightened need for proactive security measures; positioning managed SIEM services as a strategic imperative for organizations aiming to safeguard their digital assets in an ever-evolving threat landscape. By Deployment Mode, the cloud segment to register the highest growth rate during the forecast period. The managed SIEM services market anticipates the cloud segment to exhibit the highest growth rate during the forecast period, underlining the increasing preference for cloud-based deployments. As organizations embrace digital transformation, the cloud's inherent advantages, such as scalability, agility, and accessibility, make it a compelling choice for deploying SIEM services. Cloud-based managed SIEM solutions offer businesses the flexibility to adapt to dynamic cybersecurity landscapes, enabling rapid deployment, updates, and efficient scaling to meet evolving security needs. The growing adoption of hybrid and multi-cloud environments further fuels this trend, with organizations seeking centralized and integrated security solutions that seamlessly span their diverse IT infrastructure. As the demand for robust, easily accessible, and scalable cybersecurity solutions continues to rise, the cloud segment is poised to be a key driver, experiencing notable growth in the managed SIEM services industry. Based on organization size, the small and medium-sized enterprises segment is to grow at the highest CAGR during the forecast period. In the forecast period, the small and medium-sized enterprises segment is poised to experience the highest Compound Annual Growth Rate within the managed SIEM services market, signaling a significant shift towards cybersecurity prioritization among smaller businesses. SMEs are increasingly recognizing the critical importance of robust security measures to protect their digital assets and sensitive data. Managed SIEM services offer these organizations a cost-effective and scalable solution to bolster their cybersecurity postures without the need for substantial in-house resources. As cyber threats evolve, SMEs are turning to managed services for expert security monitoring, threat detection, and incident response. The scalability and tailored offerings of managed SIEM services make them particularly attractive to smaller enterprises looking to navigate the complex cybersecurity landscape efficiently and ensure the resilience of their digital operations. This anticipated growth in the SME segment underscores the increasing awareness and adoption of proactive cybersecurity measures among smaller organizations. Asia Pacific to grow at the highest CAGR during the forecast period. The managed SIEM services industry in the Asia Pacific region is poised for accelerated growth, fueled by a convergence of factors uniquely shaped by the region's burgeoning digital transformation. As countries across the Asia Pacific witness a rapid increase in online connectivity, cloud adoption, and digitization, the demand for robust cybersecurity solutions, particularly managed SIEM services, is on the rise. The diverse and evolving threat landscape in the region, combined with a growing awareness of cybersecurity best practices, is compelling businesses to invest in proactive security measures. Additionally, the region's regulatory landscape is evolving, with a heightened focus on data protection and privacy, further driving the need for comprehensive managed SIEM services. The flexibility and scalability of these services align well with the dynamic nature of the Asia Pacific market, making them a strategic choice for organizations aiming to fortify their cybersecurity defenses in the face of an ever-expanding digital ecosystem. Request Sample Pages@ Unique Features in the Managed SIEM Services Market One of the most significant features of managed SIEM services is real-time threat detection and incident response. Providers use advanced analytics and threat intelligence feeds to detect anomalies and suspicious behavior across client environments. This allows organizations to react to threats quickly, often before any damage occurs. Managed SIEM services typically come with access to a dedicated 24/7 Security Operations Center. These SOCs are staffed by cybersecurity experts who continuously monitor, analyze, and respond to security events, reducing the burden on internal IT teams and ensuring uninterrupted protection. Modern managed SIEM solutions are designed to integrate seamlessly with various on-premise, cloud, and hybrid environments. They support a wide array of log sources—servers, firewalls, endpoints, and cloud services—enabling a unified view of security across the entire IT infrastructure. A unique value proposition of managed SIEM services is built-in support for compliance requirements such as GDPR, HIPAA, PCI DSS, and ISO 27001. These services provide automated compliance reporting, audit trails, and documentation tools, making it easier for organizations to meet regulatory demands. Managed SIEMs leverage global threat intelligence to enrich log data and improve detection accuracy. By correlating internal events with known threat indicators (e.g., malicious IPs, file hashes), these services enhance situational awareness and proactive defense. Major Highlights of the Managed SIEM Services Market The managed SIEM services market is experiencing strong growth due to the increasing frequency and sophistication of cyberattacks. Organizations are recognizing the need for advanced, continuous monitoring and threat detection capabilities, driving demand for outsourced SIEM solutions. A significant trend is the growing adoption of cloud-based SIEM services. These solutions offer scalability, easier deployment, and reduced maintenance costs compared to traditional on-premise systems. Cloud-native SIEMs also support modern IT architectures like hybrid and multi-cloud environments. While large enterprises have traditionally been the primary users of SIEM solutions, small and mid-sized businesses (SMBs) are now entering the market in greater numbers. Managed services make SIEM accessible to these smaller organizations by removing the need for in-house security expertise and infrastructure. Regulatory pressures are a key driver in the adoption of managed SIEM services. Industries such as finance, healthcare, and retail require continuous compliance monitoring and audit readiness, which managed SIEMs deliver through automated reporting and documentation tools. Inquire Before Buying@ Top Companies in the Managed SIEM Services Market The major players in the managed SIEM services market are AT&T (US), Advantio (Spain), BlueVoyant (US), BT (UK), CyberCX (Australia), Capgemini (France), GoSecure (US), Cyderes (US), IBM (US), Integrity360 (Ireland), Redscan (UK), NCC Group (UK), NTT (Japan), Optiv (US), Proficio (US), ReliaQuest (US), SharkStriker (US), Stratejm (Canada), Talion (UK), TCS (India), Trustwave (US), Unisys (US), Verizon (US), Vodafone (UK), Wipro (India), Rapid7 (US), ManageEngine (US), Sumo Logic (US). The market participants have employed diverse tactics, including the creation of cutting-edge products, collaborations, agreements, growth, and procurements, to fortify their standing in the managed SIEM services industry. By offering application performance and security, the organic and inorganic methods have assisted the market players in their global expansion. UNISYS Unisys managed SIEM services are propelled by several market drivers that address contemporary cybersecurity challenges. The increasing frequency and sophistication of cyber threats are compelling organizations to seek robust solutions for monitoring and responding to security incidents. As a managed SIEM service provider, Unisys leverages its expertise to help businesses navigate this complex landscape by offering advanced threat detection, real-time analysis of security events, and streamlined incident response capabilities. The market demand is also fueled by the need for organizations to achieve regulatory compliance and the recognition that outsourcing SIEM services to seasoned professionals allows them to augment their security posture efficiently. Unisys' approach caters to businesses seeking a comprehensive and tailored solution, further contributing to the growth of the managed SIEM services market. VERIZON Verizon's managed SIEM services are driven by a combination of factors that address the evolving cybersecurity landscape and organizations' growing need for robust security solutions. The relentless surge in cyber threats necessitates advanced monitoring and threat detection capabilities and Verizon positions itself as a strategic partner in this context. Leveraging its expertise, Verizon offers comprehensive managed SIEM services that provide real-time analysis of security events, proactive threat identification, and efficient incident response. Organizations' requirements for regulatory compliance also influence the market, and Verizon's managed SIEM services cater to these needs by delivering robust security measures and expert-driven solutions. With a focus on tailoring services to meet specific client needs, Verizon plays a significant role in driving the growth of the managed SIEM services market by offering businesses a reliable and comprehensive approach to cybersecurity. MANAGEENGINE ManageEngine's managed SIEM services are fueled by a range of market drivers addressing the dynamic cybersecurity landscape and the evolving needs of organizations. As a provider, ManageEngine understands the imperative for advanced security solutions to counteract cyber threats' increasing complexity and frequency. Their managed SIEM services encompass expert monitoring, real-time analysis of security events, and proactive threat detection, aligning with the demand for comprehensive security measures. ManageEngine's approach resonates with organizations seeking to navigate regulatory compliance effectively, providing tailored solutions to meet industry standards. By offering a user-friendly and customizable platform, ManageEngine contributes to the growth of the managed SIEM services market by providing organizations with a flexible and efficient means to enhance their cybersecurity posture and respond effectively to emerging threats. CyberCX (Australia) CyberCX is a leading cybersecurity services provider based in Australia, offering a comprehensive range of cybersecurity solutions to enterprises, government agencies, and other organizations. Established with a focus on helping clients navigate the complex landscape of cybersecurity, CyberCX is known for its extensive expertise in various security domains and a customer-centric approach. NTT (Japan) NTT, or Nippon Telegraph and Telephone Corporation, is a major telecommunications company based in Japan. Founded in 1952, NTT is one of the largest telecom operators in the world, with a diverse portfolio that extends across telecommunications, IT infrastructure, data centers, and technology solutions.

The consortium had an ‘appetite' for SAAQ money, witness tells Gallant commission
The consortium had an ‘appetite' for SAAQ money, witness tells Gallant commission

CTV News

time30-05-2025

  • CTV News

The consortium had an ‘appetite' for SAAQ money, witness tells Gallant commission

A security agent strolls through the room where the Gallant hearing on the SAAQclic fiasco investigation is taking place. (Christinne Muschi/The Canadian Press) The consortium of firms behind the development of the SAAQclic platform 'was hungry and wanted to be well fed by funds' from the Quebec auto insurance board (SAAQ). That is the conclusion reached by Jérôme Verreault, a former financial controller at the Crown corporation, regarding the actions of the alliance formed by suppliers LGS, IBM and SAP. Verreault testified on Thursday before the Gallant Commission, which is investigating the SAAQ's failed digital transition. In notes dating from 2018 and 2019 and submitted to the commission, the controller detected certain shortcomings and laxity in the documentation relating to the alliance's invoicing. He made observations that, in his view, show the alliance's 'appetite for money.' In particular, he noted the failure to comply with a clause in the contract providing for a 10 per cent deduction on the fees claimed by external firms. In its invoices, the consortium did not include these deductions, which were nevertheless applied by the SAAQ's IT project office, Verreault pointed out. This clause was used to withhold a certain amount in the event of dissatisfaction with the project. 'This fact allowed me to see that the alliance was hungry and wanted to be very well fed by the funds of the Société de l'assurance automobile,' Verreault told commissioner Gallant. He also cited a clause regarding the availability of external resources to resolve anomalies during the testing and deployment phases. A remuneration of $100 per 'availability slot' was provided for. Verreault emphasized that the alliance was responsible for delivering a solution that worked. The clause, therefore, meant having to pay suppliers a second time in the event of problems, he said. 'My plumber came, he didn't do the job, I call him back and he charges me again by the hour,' Gallant illustrated. Verreault said he never found any document mentioning or approving this rate by the alliance or the Crown corporation. He also criticized the SAAQ for failing to verify compliance with the contract and the accuracy of the invoicing. Risk-sharing clause As revealed by a former internal auditor last week, the hourly rate for certain resources rose from $82 to $350 per hour. Verrreault concluded that this change affected 26 consultants and could result in additional costs of $14 million annually. To date, the reasons for this increase in the hourly rate remain 'unclear' to Verreault. The tasks or expertise of these resources were the same, he said. In Verreault's view, it was clear that the alliance would not work at no cost, contrary to what the SAAQ management might have suggested, brandishing the 'risk sharing' clause initially included in the contract. 'The risk-sharing clause was not Voldemort. It was common knowledge. It was practically written on the walls at the Société d'assurance automobile,' said Verreault. It should be noted that the SAAQ's technological modernization project, known as CASA, could cost at least $1.1 billion by 2027, which is $500 million more than expected, according to the Auditor General (AG). Verreault was in office when the first phase of the CASA project was launched. It targeted the SAAQ's financial and human resources. The controller described the start of this delivery as a 'disaster.' Several problems arose and ended up annoying him. 'Sometimes, I didn't have kind words, which exasperated my colleagues. Sometimes I told them it was a bloody mess,' he said. Verreault left the Crown corporation a few months after the first delivery began. He explained that his departure was due, in particular, to senior management's attitude towards his work. 'My notes were not taken seriously. (...) My role was precisely to help the company prevent (problems). But it was like a monkey: I don't want to hear anything, I don't want to see anything, I don't want to say anything,' lamented Verreault. 'Appearance of favouritism' On Thursday afternoon, an SAAQ executive came to talk about part of the tendering process. Nicolas Vincent explained the various steps leading up to the selection of the consortium in 2017. He acted as compliance coordinator for the 21 advisory committees, whose purpose was to advise the selection committee on specific aspects of the bids received. His testimony highlighted that there was 'an appearance of favouritism' among some members of the advisory committees and 'a perception of favouritism towards one alliance' at a stage when three consortia were still in the running, according to a report from an advisory committee presented to the commission. This seemed to 'lean toward' the SAP publisher, which belonged to two alliances at the time, Vincent said. 'There was a perception that some of those who had prepared the call for tenders were really favouring a SAP solution,' he added. Some of these external consultants had led a project with an SAP solution at Hydro-Québec with Karl Malenfant, the SAAQ's vice-president of information technology at the time, Vincent pointed out. While the selection committee remains independent, its thinking could be influenced by the notes from the advisory committees, Vincent said. Publication ban Earlier on Thursday, computer scientist Vincent Poirier, former auditor of the SAAQ, continued his testimony. He was called upon to comment on an information security audit report he produced in June 2023. However, the content of the report and Poirier's comments are subject to a publication ban for the next few days. It covers 'any technical information or data identifying the cybersecurity and data protection architecture.' According to the SAAQ, 'at this stage, the publication ban is necessary to ensure that information that could jeopardize the security and protection of Quebecers' data is not made public,' the order states. This report by The Canadian Press was first published in French on May 30, 2025.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store