Security Market Analysis of Three Major Trends

Security Market Analysis of Three Major Trends

I’ve been thinking lately about the actual size of the security market, and it never fails to amaze me just how many unique products and services that are offered to help ensure the safety and security of people and things.

It seems Gartner, Inc. is just as fascinated, because they recently analyzed and forecasted that the worldwide security technology and services market will reach $67.2 billion in 2013. Now, that’s great news! And, what’s even better news? The firm also projected this same market would grow to more than $86 billion in 2016.

So, with dollar amounts growing, what should the IT security industry focus on to enhance their financial growth?

Of course, the BYOD trend is expected to highly-influence this projected growth, but Gartner analysts also mentioned three other main trends:

  1. Mobile security

    Security Market Analysis of Three Major TrendsMobile device management technologies (MDM), such as mobile VDI, containers, app wrapping and device virtualization used to segregate personal data from corporate data on personal devices will see advancement throughout 2013. Also, it seems that HTML5 apps will become the preferred way to deliver enterprise apps because they are simple, cheaper to develop and have lower maintenance costs. And, a final note about mobile security: business models are developing around user preferences and activity history, which could eventually lead to more pervasive mobile data collection.

  2. Big Data

    Security Market Analysis of Three Major TrendsBig Data requires security systems to adopt intelligence-driven security models that are more risk-aware, contextual and agile to protect against illicit activities and advanced cyber threats. This means that security teams are going to need analysts to combine data with a deep understanding of business risks and cyber-attack techniques.

  3. Advanced targeted attacks (ATA)

    Security Market Analysis of Three Major TrendsAttackers with financial motivation tend to devise strategies to penetrate signature-based antivirus and intrusion prevention by deploying malware for the initial breach and the data-gathering phase. Once inside the system, advanced hackers can actively remain persistent on the organization’s internal network.

Defense against “ATAs requires a defense-in-depth strategy across multiple security controls,” said Lawrence Pingree, research director at Gartner. “Enterprises should employee a defense-in-depth, layered approach model to accomplish security goals, namely detect, prevent, respond and eliminate.”


About the Author

Ginger Hill is Group Social Media Manager.


  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

  • Live From ISC West 2023 Preview

    Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3