Growth in Cloud-Based Security Remains Strong Although Opportunities Vary by Sector
Cloud Identity and Access Management to Be Examined in more detail at the Gartner Identity & Access Management Summits, November 18-20 in Los Angeles and March 17-18, 2014 in London
The cloud-based security services market will be worth $2.1 billion in 2013, rising to $3.1 billion in 2015, according to Gartner, Inc. Gartner said that growth in cloud-based security will remain strong, but revenue opportunities will vary.
"The cloud-based security market remains a viable one, offering providers many opportunities for expansion," said Ruggero Contu, research director at Gartner. "Encryption will be a new area of growth, but it remains a complex activity. The strongest interest will be in encryption products from cloud security brokers, which are relatively easy to deploy and have options for on-premises encryption management."
Gartner predicts that the top three most sought-after cloud services moving forward will remain email security, web security services and identity and access management (IAM). However, in 2013 and 2014, the highest growth is forecast to occur in cloud-based tokenisation and encryption, security information and event management (SIEM), vulnerability assessment and web application firewalls.
"Areas such as SIEM and IAM offer the biggest growth potential, although for SIEM this will be from a small base," said Kelly Kavanagh, principal research analyst at Gartner. "The benefits cloud security offers — particularly encryption — are making it an increasingly popular choice. However, trust concerns and regional variations mean that providers will have to assess each market opportunity carefully before deciding which to focus on."
Overall adoption of software as a service (SaaS) applications and other cloud-based services encourages organizations to adopt cloud-based security controls. These are delivered either as stand-alone features or as part of an integrated SaaS package. Managed security services (MSS) are also driving adoption of cloud-based security services among enterprises. MSS delivery models are in turn being affected by demand for cloud-based security services, which is enabling security providers to become de facto MSS players.
"The benefits of deploying cloud-based security services are clear," said Mr Kavanagh. "Aside from the broad area of IAM, specific controls, such as encryption, are becoming vital to the adoption of cloud computing. They are further helping to generate interest in this particular form of security service delivery."
Gartner expects acceptance of, and reliance on, cloud-based security-as-a-service offerings to increase, based on organizations gaining more experience with SaaS and more consumer-grade technology being made available to corporate systems as a result of trends, such as bring your own device (BYOD).
Cloud-based security services will grow faster than the market for remotely monitored customer premises equipment (CPE) MSS through 2012, but starting from a smaller base. In the next 24 months, new security-as-a-service-based offerings that address specific security controls for cloud-based IT resources will be available from larger IT and network service providers, aimed initially at small or midsize businesses (SMBs). Gartner predicts that smaller, pure-play managed security service providers (MSSPs) will be most affected by the introduction of these services, and expects them to consolidate
Within the IAM space, interest in cloud-based security has been driven mostly by SMBs' needs to extend their basic IAM functions and serve employees who are accessing SaaS and some internal web-architected applications. An increasing number of organizations seem to be adopting cloud-based IAM services to replace IAM on-premises tools. Larger businesses are often looking to use IAM as a mixture of legacy- and web-architected cloud and on-premises.
"Although organizations' interest in encryption is expected to grow, service providers' relative lack of interest in cloud-based encryption means it has remained a complex activity, requiring organizations to initiate complex, build-your-own deployments," said Mr Contu. "The strongest interest is in encryption products from cloud security brokers, thanks to their relative ease of deployment and their options for on-premises encryption management. Nevertheless, Gartner expects cloud hosting providers and IaaS providers to show an increased interest in cloud-based encryption capabilities."
Given the differences in maturity, cultural acceptance and local IT infrastructures, considerable regional differences exist in the deployment rates of cloud-based security systems. The maturity of the related business communities, local regulations and cultural aspects all play a part in the level of spending dedicated to this delivery model compared with on-premises deployments. Privacy remains an important inhibitor in the deployment of all forms of cloud-based services. This is particularly true in those regions and countries with strong regulatory requirements (such as Europe, with its data protection legislation).
Additional information is available in the report "Market Trends: Cloud-Based Security Services Market, Worldwide, 2014." The report can be found on Gartner's website at http://www.gartner.com/resId=2607617.
Additional information on security can be found in the Gartner Special Report "The Future of Global Information Security" The special report can be viewed at http://www.gartner.com/technology/research/security-risk-management/. The report explores the major tectonic forces at play that will change how business use of technology will be dramatically changed by rapid escalations in threat, defense and societal demands.
This topic will be discussed in more detail at the Gartner Identity and Access Management Summits. For more information about the Gartner Identity and Access Management Summit taking place November 17-18 in Los Angeles, please visit http://www.gartner.com/technology/summits/na/identity-access/. To register for a press pass for this event, please contact email@example.com.
For details on the Gartner Identitiy and Access Management Summit 2014, taking place taking place on March 17-18, in London, please visit europe.gartner.com/iam.
About Gartner Identity and Access Management Summit
The Gartner Identity and Access Management Summit is the only IT event dedicated to the issues faced by Identity and Access Management (IAM) professionals. It aims to lay out the key trends and strategies that will define successful IAM programs the technology, tools and techniques needed to establish effective IAM programmes at a time when IT architectures and the regulatory landscape are rapidly changing in response to the Nexus of Forces – mobile, cloud, information and social.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. The company delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is the valuable partner to clients in approximately 10,000 distinct enterprises worldwide. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, USA, and has 8,300 associates, including more than 1,800 research analysts and consultants, and clients in more than 90 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.