Global Information Security Market Trends
Category Intelligence on Global Information Security covers the following
- Information relating to market, supply, cost, and pricing analysis
- Hard to find data on cost and TCO models, supplier details, and performance benchmarks
- Macroeconomic and regional trends impacting cost, supply, and other market dynamics
- Category-specific negotiation and sourcing advice
Industry Outlook & Drivers
Global Market Outlook on Information Security Market
The global IT security market comprises of a number of segments, based on the type of security attack or component of security addressed or by the nature of software provided. Application security was the largest segment, contributing to over US$ 18 billion to worldwide spend in 2017.
- The worldwide spend on information security or cybersecurity was US$ 89.39 billion in 2017. It is expected to reach US$ 134 billion by 2021, growing at a CAGR of 10.7 percent
- North America and Europe are the leading contributors for Information security, with APAC set to experience the fastest growth
- Application security was the largest segment contributing to over US$ 18 billion to worldwide spend in 2017
- The IT security market is a continuously evolving market with different solution segments at different levels of maturity.While 5 basic need-based segments can be identified, in terms of software or solution sub-categories offered, there is a considerable overlap, due to same set of suppliers with integrated offerings
Key Technology Trends
Memory protection and exploit prevention for endpoint threat prevention
- Signature-based approach does not have capabilities in identifying advanced treats. Non-signature methods, like behavior analysis, coupled with machine learning, help mitigate memory exploitation
CASB to extend security beyond existing infrastructure
- CASB is a tool or service that is placed between on-premise infrastructure and cloud provider's infrastructure that can extend security policies to all the cloud applications. They provide control point, necessary to manage all the applications simultaneously, including identification of unsanctioned usage across cloud applications
- The data that CASBs collect can be used for reasons other than security, such as monitoring cloud service usage for budgeting purposes. Vendors in the cloud access security space include Adallom, Elastica, Skyhigh Networks, and Netskope
Security Analytics: User and behavioral analytics
- Has broader capabilities in security monitoring and can be used as an alternative to SIEM. User and behavioral analytics will provide user- centric analytics around user behavior and also has capabilities in analyzing applications, endpoints, and networks. A subsequent correlation analysis helps in accurately identifying the threats
IT/OT Convergence and Edge Computing
- The increase in connected devices has resulted in greater focus on endpoint security through OT/IT convergence
- A related development from IoT has been edge computing, where micro data centres are used to store and analyse data closer to the creation source that being sent over long routes to the centralized data centres
- Edge computing reduces the vulnerability surface, as individual local data centres need to be hacked. Localized encryption and access control deployments are also favored