Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/18/2019
04:25 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Cloud Security Spend Set to Reach $12.6B by 2023

Growth corresponds with a greater reliance on public cloud services.

Businesses are expected to spend $12.6 billion on cloud security tools by 2023, up from $5.6 billion in 2018 and with an especially close focus on public cloud native platform security, Forrester reports.

The data comes from its "Cloud Security Solutions Forecast, 2018 to 2023," which investigates the ways companies will invest in cloud security tools over the next five years. This global increase in cloud security spend aligns with a broader trend toward cloud spend overall: Researchers report public cloud services spend will reach $236 billion by 2020, up from $178 billion spent in 2018.

More than half (54%) of infrastructure decision makers have implemented or are expanding use of the public cloud, up from 25% in 2015. While respondents have become used to public cloud services, they're still wary of risk. Businesses typically use a mix of public, private, and hybrid clouds and work with multiple service providers. Different implementations serve different needs, but complexity creates challenges in monitoring data and detecting threats.

"There's more and more of a sensitivity that if data is personal, it needs to be kept private," says Jennifer Adams, senior forecast analyst at Forrester, citing penalties from regulations such as GDPR. "As more data is stored in the cloud, we need to use tools to make sure data in the cloud is safe."

Public cloud native platform security dominates the spending forecast, which she says stood out for its rapid growth. The category wasn't even specified in Forrester's earlier cloud security surveys, Adams says, and now the sector is expected to grow 20% per year. Companies spent $4 billion on it in 2018, when it made up over 70% of total spending on all cloud security tools. Researchers anticipate it'll be the fastest-growing sector for cloud security, reaching $9.7 billion in spend by 2023.

"This is a huge change from what we've seen previously," Adams noted. These tools, provided by cloud platforms, typically include data categorization, data segmentation, server access control, resource-based access control and access control lists, user IAM, data-at-rest encryption, data-in-transit encryption, encryption key management, logging and anomaly detection, and role-based access control. As more companies partner with cloud platforms like Amazon Web Services and Microsoft Azure, they're adopting their security tools as well.

Because companies often use multiple cloud providers, cloud workload security (CWS) tools are also seeing growth. CWS is designed to centralize and automate security controls across platforms; with businesses relying on multiple clouds, it's expected to grow 17.3% each year.

Some Businesses Still Wary 
Researchers asked respondents how worried they are about risks that software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) bring to their environments, using a scale of one (not concerned) to five (very concerned). Nearly 60% responded with a four or five for SaaS, 57% said the same for PaaS, and 57% echoed great concern for IaaS.

"I think we're finding that when we step back … the cloud isn't the biggest area of risk," Adams notes. There is a perception the cloud brings risk, but it isn't where threats typically appear.

Existing cloud security measures seem to be working, experts found, and organizations are coming around to the idea that the cloud may be better for their data protection. Research shows only 12% of breaches targeted public cloud environments; further, 37% of decision makers cited better security as an important reason to make the transition to public cloud.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.