Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/18/2019
04:25 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Cloud Security Spend Set to Reach $12.6B by 2023

Growth corresponds with a greater reliance on public cloud services.

Businesses are expected to spend $12.6 billion on cloud security tools by 2023, up from $5.6 billion in 2018 and with an especially close focus on public cloud native platform security, Forrester reports.

The data comes from its "Cloud Security Solutions Forecast, 2018 to 2023," which investigates the ways companies will invest in cloud security tools over the next five years. This global increase in cloud security spend aligns with a broader trend toward cloud spend overall: Researchers report public cloud services spend will reach $236 billion by 2020, up from $178 billion spent in 2018.

More than half (54%) of infrastructure decision makers have implemented or are expanding use of the public cloud, up from 25% in 2015. While respondents have become used to public cloud services, they're still wary of risk. Businesses typically use a mix of public, private, and hybrid clouds and work with multiple service providers. Different implementations serve different needs, but complexity creates challenges in monitoring data and detecting threats.

"There's more and more of a sensitivity that if data is personal, it needs to be kept private," says Jennifer Adams, senior forecast analyst at Forrester, citing penalties from regulations such as GDPR. "As more data is stored in the cloud, we need to use tools to make sure data in the cloud is safe."

Public cloud native platform security dominates the spending forecast, which she says stood out for its rapid growth. The category wasn't even specified in Forrester's earlier cloud security surveys, Adams says, and now the sector is expected to grow 20% per year. Companies spent $4 billion on it in 2018, when it made up over 70% of total spending on all cloud security tools. Researchers anticipate it'll be the fastest-growing sector for cloud security, reaching $9.7 billion in spend by 2023.

"This is a huge change from what we've seen previously," Adams noted. These tools, provided by cloud platforms, typically include data categorization, data segmentation, server access control, resource-based access control and access control lists, user IAM, data-at-rest encryption, data-in-transit encryption, encryption key management, logging and anomaly detection, and role-based access control. As more companies partner with cloud platforms like Amazon Web Services and Microsoft Azure, they're adopting their security tools as well.

Because companies often use multiple cloud providers, cloud workload security (CWS) tools are also seeing growth. CWS is designed to centralize and automate security controls across platforms; with businesses relying on multiple clouds, it's expected to grow 17.3% each year.

Some Businesses Still Wary 
Researchers asked respondents how worried they are about risks that software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) bring to their environments, using a scale of one (not concerned) to five (very concerned). Nearly 60% responded with a four or five for SaaS, 57% said the same for PaaS, and 57% echoed great concern for IaaS.

"I think we're finding that when we step back … the cloud isn't the biggest area of risk," Adams notes. There is a perception the cloud brings risk, but it isn't where threats typically appear.

Existing cloud security measures seem to be working, experts found, and organizations are coming around to the idea that the cloud may be better for their data protection. Research shows only 12% of breaches targeted public cloud environments; further, 37% of decision makers cited better security as an important reason to make the transition to public cloud.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
CVE-2019-4409
PUBLISHED: 2019-10-18
HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...