Analysts to Discuss Security Trends at Gartner's 2014 Security and Risk Management Summits August 25-26 in Sydney, September 8-9 in London and September 15-16 in Dubai
Worldwide spending on information security will reach $71.1 billion in 2014, an increase of 7.9 percent over 2013, with the data loss prevention segment recording the fastest growth at 18.9 percent, according to the latest forecast from Gartner, Inc. Total information security spending will grow a further 8.2 percent in 2015 to reach $76.9 billion.
According to Gartner, the increasing adoption of mobile, cloud, social and information (often interacting together) will drive use of new security technology and services through 2016.
“This Nexus of Forces is impacting security in terms of new vulnerabilities,” said Gartner research director Lawrence Pingree. “It is also creating new opportunities to improve effectiveness, particularly as a result of better understanding security threats by using contextual information and other security intelligence.”
Mr. Pingree said that the bigger trend that emerged in 2013 was the democratization of security threats, driven by the easy availability of malicious software (malware) and infrastructure (via the underground economy) that can be used to launch advanced targeted attacks.
“This has led to increased awareness among organizations that would have traditionally treated security as an IT function and a cost center,” said Mr. Pingree.
Other trends in the information security market that form assumptions behind Gartner’s latest forecast include:
By 2015, roughly 10% of overall IT security enterprise product capabilities will be delivered in the cloud.
A significant number of security markets are being impacted by newly emerged delivery models. This is resulting in the growth of cloud-based security services, which are transforming, to different degrees, the way security is supplied and consumed by customers. While cloud-based services' competitive pricing puts pressure on the market, the cloud is also providing new growth opportunities, as some organizations switch from deploying on-premises products to cloud-based services or cloud-managed products. More than 30% of security controls deployed to the small or midsize business (SMB) segment will be cloud-based by 2015.
Regulatory pressure will increase in Western Europe and Asia/Pacific from 2014.
Regulatory compliance has been a major factor driving spending on security in the last three years, particularly in the U.S. Gartner expects this influence to accelerate from 2014. Broader data privacy legislation such as the Australian Privacy Act is expected to sustain spending on security this year. Other examples of intensifying regulatory pressure driving spending on compliance include the issue of guidelines regarding personal information protection in China in February 2013 (although they are not legally binding) and planned implementation of an addition to the EU Data Protection Directive. Other examples include personal data protection laws (introduced in 2013) in Singapore and Malaysia.
By year-end 2015, about 30% of infrastructure protection products will be purchased as part of a suite offering.
The presence of highly mature and commoditizing technologies, such as EPP and email security, will be contrasted by growth opportunities offered by segments such as SIEM, DLP and emerging technologies within the "other security" segment. Security providers in the more mature and consolidated segments are predicted to support sales through the addition of new security controls as part of broader suite offerings. This will be the case within the EPP segment, with the increasing availability of DLP, mobile device management, vulnerability assessment, hosted archiving and encryption for secure email gateway. This expansion of suite offerings to include new security controls is expected to help maintain momentum and slow down commoditization of these mature markets.
By 2018, more than half of organizations will use security services firms that specialize in data protection, security risk management and security infrastructure management to enhance their security postures.
Many organizations continue to lack the appropriate skills necessary to define, implement and operate appropriate levels of data protection and privacy-specific security controls. This lack of skills leads organizations to contract security consulting firms that specialize in data protection and security risk management to address regulatory compliance demands and enhance their security postures. A significant portion of organizations are shifting existing resources away from the operational aspects of security technologies, such as security device administration and monitoring, toward mitigation and incident response. This new dynamic has given rise to significant growth throughout the globe for managed security services.
Mobile security will be a higher priority for consumers from 2017 onward.
There is a lack of penetration of security tools among users of new mobile platforms, and Gartner does not expect to see new demand for this type of capability to emerge before 2016. Most consumers do not recognize that antivirus is important on mobile devices and therefore have not yet established a consistent practice of buying mobile device endpoint protection software. This purchasing trend and market shift away from PCs will have significant repercussions on the consumer security market. However, as mobile devices gain in mass popularity and as security is likely to be a higher priority from 2017 onward, then new market opportunities are likely to emerge.
Gartner’s latest forecast for information security is available in the report ‘Forecast: Information Security, Worldwide, 2012-2018, 2Q14 Update’, available on Gartner’s web site at: http://www.gartner.com/doc/2815822 and more detail on the trends behind the forecast can be found in the report ‘Forecast Overview: Information Security, Worldwide, 2014 Update’, available at http://www.gartner.com/doc/2780717.
About Gartner Security & Risk Management Summit
Gartner analysts will take a deeper look at the outlook for security solutions at the Gartner Security & Risk Management Summits taking place August 25-26 in Sydney, Australia, September 8-9 in London, U.K and September 15-16 in Dubai, UAE. More information on the Australian event are at http://www.gartner.com/technology/summits/apac/security/. More information on the U.K. event is at http://www.gartner.com/technology/summits/emea/security/. Details on the Dubai Summit are at http://www.gartner.com/technology/summits/emea/security-dubai/.
Information from the Gartner Security & Risk Management Summits 2014 will be shared on Twitter at using #GartnerSEC.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, we are the valuable partner to clients in over 9,000 distinct enterprises worldwide. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, USA, and has 6,400 associates, including more than 1,480 research analysts and consultants, and clients in 85 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.