Security Market Analysis of Three Major Trends

Security Market Analysis of Three Major Trends

I’ve been thinking lately about the actual size of the security market, and it never fails to amaze me just how many unique products and services that are offered to help ensure the safety and security of people and things.

It seems Gartner, Inc. is just as fascinated, because they recently analyzed and forecasted that the worldwide security technology and services market will reach $67.2 billion in 2013. Now, that’s great news! And, what’s even better news? The firm also projected this same market would grow to more than $86 billion in 2016.

So, with dollar amounts growing, what should the IT security industry focus on to enhance their financial growth?

Of course, the BYOD trend is expected to highly-influence this projected growth, but Gartner analysts also mentioned three other main trends:

  1. Mobile security

    Security Market Analysis of Three Major TrendsMobile device management technologies (MDM), such as mobile VDI, containers, app wrapping and device virtualization used to segregate personal data from corporate data on personal devices will see advancement throughout 2013. Also, it seems that HTML5 apps will become the preferred way to deliver enterprise apps because they are simple, cheaper to develop and have lower maintenance costs. And, a final note about mobile security: business models are developing around user preferences and activity history, which could eventually lead to more pervasive mobile data collection.

  2. Big Data

    Security Market Analysis of Three Major TrendsBig Data requires security systems to adopt intelligence-driven security models that are more risk-aware, contextual and agile to protect against illicit activities and advanced cyber threats. This means that security teams are going to need analysts to combine data with a deep understanding of business risks and cyber-attack techniques.

  3. Advanced targeted attacks (ATA)

    Security Market Analysis of Three Major TrendsAttackers with financial motivation tend to devise strategies to penetrate signature-based antivirus and intrusion prevention by deploying malware for the initial breach and the data-gathering phase. Once inside the system, advanced hackers can actively remain persistent on the organization’s internal network.

Defense against “ATAs requires a defense-in-depth strategy across multiple security controls,” said Lawrence Pingree, research director at Gartner. “Enterprises should employee a defense-in-depth, layered approach model to accomplish security goals, namely detect, prevent, respond and eliminate.”

Sources: 
http://www.eweek.com/small-business/security-technology-market-to-reach-86b-in-2016-gartner/ 
http://www.cio.com/article/731749/4_Mobile_Security_Predictions_to_Help_CIOs_Plan_for_the_Future 
http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation 
http://www.emc.com/collateral/industry-overview/big-data-fuels-intelligence-driven-security-io.pdf

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.