Skip to main content

Evolution of IT Security Demand Creates Opportunity

IT security is top-of-mind in most enterprise organizations. It's no surprise, given recent events. Worldwide spending on information security will reach $75.4 billion in 2015 -- that's an increase of 4.7 percent over 2014, according to the latest market study by Gartner, Inc.

The increase in spending is being driven by government initiatives, demand for new regulations or legislation and ongoing high-profile data breaches. As a result, affordable security testing or auditing, IT security support outsourcing, and identity or access management present the greatest growth opportunities for technology vendors and cloud service providers.

According to Gartner, spending in areas such as network endpoint protection platforms and consumer security software is starting to see commoditization, leading to a downgrade in the forecast for these established segments during 2015.

While the visibility and growing awareness of the impact of cyber threats keeps attention on security, the bulk of the security software market is composed of mature technology areas where the penetration rate is already high.

"Interest in security technologies is increasingly driven by elements of digital business, particularly cloud computing, mobile computing and now also the Internet of Things (IoT), as well as by the sophisticated and high-impact nature of advanced targeted attacks," said Elizabeth Kim, research analyst at Gartner.

This shifted focus is driving investment in emerging offerings, such as endpoint detection and remediation tools, threat intelligence and cloud security tools, such as encryption. However, strength in these emerging segments cannot compensate for the downgrade of the larger mature segments that are being commoditized.

Other information security market trends include:

Price increases of as much as 20 percent will drive some organizations to forgo security purchasing in 2015, especially in Europe. This trend will create market opportunities for vendors with alternative business models and lower costs, such as more open-source based solutions.

For the past three years, lean-forward organizations have been wary of an advanced-threat environment in which bad actors innovate faster than traditional blocking mechanisms, such as firewalls, intrusion prevention systems (IPSs) and secure Web gateways, can react.

In response, the most widely adopted advanced-threat detection technique deployed is network malware sandboxing, which has appealed to well-staffed incident response teams.

Recently, several high-profile breaches have broadened the perceived need for zero-day malware detection in a sandbox, but it can increase costs for the midsize or under-staffed security client.

Incumbent security platform vendors introduced less costly, often cloud-based, malware detonation sandboxes as platform extensions. That being said, there is growing demand for more automated lower-cost solutions in the global marketplace.

Popular posts from this blog

Hybrid Work: How to Enhance Employee Productivity

When you hire qualified talent for a key role and trust them to perform, you'll likely achieve the best outcome. Skilled and experienced people will deliver results, regardless of the challenges. That's a key lesson learned from the pandemic experience as most knowledge workers were asked to work from their homes. However, some resist returning to an open-plan office. It's unacceptable. Meanwhile, forward-thinking leaders decided a "return to normal" is undesirable, and in hindsight, everyone should aspire to be more accomodating than before. Therefore, location flexibility is okay. Hybrid Workforce Market Development How will people adapt to these changes? They'll apply the modern IT tools at their disposal. They'll learn new skills and thrive. Nearly 80 percent of employees are now successfully using online collaboration tools for work in 2021 -- that's up from just over half of workers in 2019, according to the latest market study by Gartner. This g

Mobility-as-a-Service Creates Disruptive Travel Options

Building on significant advances in big data, analytics, and the Internet of Things (IoT), more innovative transit service offerings aim to increase public transport ridership and reduce emissions or congestion within metropolitan areas. By providing these services through smartphone apps, the transit services also significantly increase user convenience, providing information on different human mobility offerings -- including public transport, ridesharing, and autonomous vehicles. Mobility-as-a-Service Market Development According to the latest market study by Juniper Research, Mobility-as-a-Service (MaaS) subscribers will generate $53 billion in revenue for MaaS platform providers by 2027 -- that's rising from $5.3 billion in 2021. Let's start with a basic definition. MaaS is the provision of multi-modal end-to-end travel services through single platforms, by which users can determine an optimal route and price. The study identified a monthly subscription model as key to incr

Upside for New 5G Network Transport Infrastructure

The global mobile communication sector is in the midst of a significant network infrastructure upgrade to support the introduction of new high-bandwidth and low-latency broadband service offerings.  Telecom service provider data centers have an important role in fifth-generation (5G) network deployments. Providers undergoing their transition to Stand-Alone (SA) 5G must understand the technical demands of telco data centers and the key enablers of those offerings. According to the latest worldwide market study by ABI Research, the major prerequisites of 5G and the emerging transport solutions would help operators position themselves to successfully capitalize on the new revenue opportunities from delivering differentiated 5G connectivity services. 5G Transport Network Market Development "The rise of the telco data center has a high degree of confluence with the requirements of SA 5G architectures. SA 5G and its increasing reliance on telco data centers can be attributed to the incr