09:28 PM
George V. Hulme
George V. Hulme

Security Software Market Remains Strong

While the growth of the security software market took a hit this year, along with most every other market segment, it's still pegged to grow 8 percent, year over year, according to a market research firm. There's also stronger growth ahead.

While the growth of the security software market took a hit this year, along with most every other market segment, it's still pegged to grow 8 percent, year over year, according to a market research firm. There's also stronger growth ahead.Market research firm Gartner Inc. says that the global security software market will tally $14.5 billion this year. That's up 8% from 2008, which saw this segment grow by 19%. The good news is that, for 2010, Gartner predicts double-digit growth to return, with a 13% sequential increase over 2009 to reach $16.3 billion.

Here's what Ruggero Contu, principal research analyst at Gartner had to say in a statement:

"Although the worldwide security software market is affected by the economic downturn, the growth will continue to be strong in 2009 as security remains a critical area where drastic cuts cannot be afforded," s the medium term, the greatest growth opportunities will come from software as a service (SaaS), appliance based offering and small and medium businesses (SMBs), which are in security catch-up mode compared with large companies and therefore spend a higher percentage of their budgets on security."

Not much to nitpick with there. SMBs will be spending more, because in the years past they've, generally, spent so little on IT security. I have to add that the healthcare market, which is rapidly moving to electronic health records, will have to also step up and spend more when it comes to IT security. I expect significant incremental security spend from the healthcare vertical.

As for SaaS taking much of the growth, we've known that for some time and covered this trend in Symantec Buys MessageLabs: SaaS Security Ready To Rock , Identity Management as a Service, and Security Continues Its Drive Toward The Cloud.

The rest of Gartner's statement rehashed the security vendor consolidation of 2008, and the move toward multi-featured integrated security products. Not much new insight there. That's been going on for years, and will continue to be the case for the foreseeable future. Continue to expect the big vendors to buy the well-run startups with good ideas, and keep looking for true innovation from the scrappy security startups.

As for IT security budgets: keep them tight and aligned with the bigger business objectives.

For my mobile and technology observations, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.