Risk
9/22/2009
09:28 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Security Software Market Remains Strong

While the growth of the security software market took a hit this year, along with most every other market segment, it's still pegged to grow 8 percent, year over year, according to a market research firm. There's also stronger growth ahead.

While the growth of the security software market took a hit this year, along with most every other market segment, it's still pegged to grow 8 percent, year over year, according to a market research firm. There's also stronger growth ahead.Market research firm Gartner Inc. says that the global security software market will tally $14.5 billion this year. That's up 8% from 2008, which saw this segment grow by 19%. The good news is that, for 2010, Gartner predicts double-digit growth to return, with a 13% sequential increase over 2009 to reach $16.3 billion.

Here's what Ruggero Contu, principal research analyst at Gartner had to say in a statement:

"Although the worldwide security software market is affected by the economic downturn, the growth will continue to be strong in 2009 as security remains a critical area where drastic cuts cannot be afforded," s the medium term, the greatest growth opportunities will come from software as a service (SaaS), appliance based offering and small and medium businesses (SMBs), which are in security catch-up mode compared with large companies and therefore spend a higher percentage of their budgets on security."

Not much to nitpick with there. SMBs will be spending more, because in the years past they've, generally, spent so little on IT security. I have to add that the healthcare market, which is rapidly moving to electronic health records, will have to also step up and spend more when it comes to IT security. I expect significant incremental security spend from the healthcare vertical.

As for SaaS taking much of the growth, we've known that for some time and covered this trend in Symantec Buys MessageLabs: SaaS Security Ready To Rock , Identity Management as a Service, and Security Continues Its Drive Toward The Cloud.

The rest of Gartner's statement rehashed the security vendor consolidation of 2008, and the move toward multi-featured integrated security products. Not much new insight there. That's been going on for years, and will continue to be the case for the foreseeable future. Continue to expect the big vendors to buy the well-run startups with good ideas, and keep looking for true innovation from the scrappy security startups.

As for IT security budgets: keep them tight and aligned with the bigger business objectives.

For my mobile and technology observations, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.