Analysts to Discuss Cloud Security at Gartner Security & Risk Management Summits 2013, June 10-13 in National Harbor, Maryland, and September 18-20 in London
By 2015, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner, Inc. The services are also driving changes in the market landscape, particularly around a number of key security technology areas, such as secure email and secure Web gateways, remote vulnerability assessment, and Identity and Access Management (IAM). Gartner expects the cloud-based security services market to reach $4.2 billion by 2016.
"Demand remains high from buyers looking to cloud-based security services to address a lack of staff or skills, reduce costs, or comply with security regulations quickly," said Eric Ahlm, research director at Gartner. "This shift in buying behavior from the more traditional on-premises equipment toward cloud-based delivery models offers good opportunities for technology and service providers with cloud delivery capabilities, but those without such capabilities need to act quickly to adapt to this competitive threat."
A January 2013 Gartner survey on security spending shows high demand from security buyers for cloud-based security service offerings. Security buyers from the U.S. and Europe, representing a cross section of industries and company sizes, stated that they plan to increase the consumption of several common cloud services during the next 12 months. The highest-consumed cloud-based security service is email security services, with 74 percent of respondents rating this as the top service.
Furthermore, 27 percent of the respondents indicated they were considering deploying tokenization as a cloud service. Gartner believes regulatory compliance measures to comply with the Payment Card Industry Data Security Standard (PCI DSS), for example, are driving much of the growth of interest in tokenization as a service. As a service, tokenization allows security buyers to avoid having to house personally identifiable information (PII) or other confidential information. The service allows organizations to remove tokenized systems from being considered "in scope" for PCI compliance, thus removing the burden of regulating the environment.
Another area that is likely to experience high growth is security information and event management (SIEM) as a service. Much of the interest is attributed to regulatory compliance concerns and security buyers' need to reduce costs in the area of log management, compliance reporting and security event monitoring. However, many customers in the enterprise segment will remain cautious about sending sensitive log information to cloud services, and this will continue to be an important aspect for security-as-a-service providers to address.
"The overall customer demand for numerous cloud security services presents an opportunity for creating or partnering with cloud services brokers," said Mr. Ahlm. "The customer demand for a brokerage becomes apparent as organizations move more assets to the cloud and require multiple security services to span multiple clouds and/or mixtures of clouds and on-premises."
Gartner is advising value-added resellers (VARs) to supplement product implementations with cloud-based alternatives that offer large customers reduced operational cost and thereby increase the likelihood of customer retention in this market segment. VARs that fail to offer cloud-based alternatives might experience a decline in implementation revenue from customers seeking cloud-based solutions in certain market segments.
Ease of deployment and relief from technology maintenance offer buyers of cloud-based controls direct cost savings. Based on the value that cloud security brings, security buyers may purchase less hardware or software and require fewer implementation services. They can budget through operating expenditure, rather than through capital expenditure. In addition, cloud-based controls can provide more-current protection, sometimes avoiding complex and costly upgrades.
"The value that cloud services bring to security buyers is measurable in terms of capital and operational cost reduction," said Mr. Ahlm. "Security providers that currently offer only a hardware/software-based solution requiring implementation should build product road maps that allow customers to move to the cloud at their pace."
More detailed analysis is available in the report "Demand for Cloud-Based Offerings Impacts Security Service Spending". The report is available on Gartner's website at http://www.gartner.com/resId=2408215.
Gartner analysts will take a deeper look at the outlook for security solutions at the Gartner Security & Risk Management Summit taking place June 10-13 in National Harbor, Maryland and September 18-20 in London, U.K. More information on the U.S. event can be found at www.gartner.com/us/securityrisk. Details on the U.K. event are at http://www.gartner.com/technology/summits/emea/security/.
Information from the Gartner Security & Risk Management Summits 2013 will be shared on Twitter at http://twitter.com/Gartner_inc using #GartnerSEC.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior information technology (IT) leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to supply chain professionals, digital marketing professionals and technology investors, Gartner is the valuable partner to clients in more than 10,000 distinct enterprises. Gartner works with clients to research, analyze and interpret the business of IT within the context of their individual roles. Gartner is headquartered in Stamford, Connecticut, U.S.A., and has almost 9,000 associates, including 1,900 research analysts and consultants, operating in more than 90 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.