Growth in Cloud-Based Security Remains Strong Although Opportunities Vary by Sector
Cloud Identity and Access Management to Be Examined in more detail at the Gartner Identity & Access Management Summits, November 18-20 in Los Angeles and March 17-18, 2014 in London
The cloud-based security services market will be worth $2.1 billion in 2013, rising to $3.1 billion in 2015, according to Gartner, Inc. Gartner said that growth in cloud-based security will remain strong, but revenue opportunities will vary.
"The cloud-based security market remains a viable one, offering providers many opportunities for expansion," said Ruggero Contu, research director at Gartner. "Encryption will be a new area of growth, but it remains a complex activity. The strongest interest will be in encryption products from cloud security brokers, which are relatively easy to deploy and have options for on-premises encryption management."
Gartner predicts that the top three most sought-after cloud services moving forward will remain email security, web security services and identity and access management (IAM). However, in 2013 and 2014, the highest growth is forecast to occur in cloud-based tokenisation and encryption, security information and event management (SIEM), vulnerability assessment and web application firewalls.
"Areas such as SIEM and IAM offer the biggest growth potential, although for SIEM this will be from a small base," said Kelly Kavanagh, principal research analyst at Gartner. "The benefits cloud security offers — particularly encryption — are making it an increasingly popular choice. However, trust concerns and regional variations mean that providers will have to assess each market opportunity carefully before deciding which to focus on."
Overall adoption of software as a service (SaaS) applications and other cloud-based services encourages organizations to adopt cloud-based security controls. These are delivered either as stand-alone features or as part of an integrated SaaS package. Managed security services (MSS) are also driving adoption of cloud-based security services among enterprises. MSS delivery models are in turn being affected by demand for cloud-based security services, which is enabling security providers to become de facto MSS players.
"The benefits of deploying cloud-based security services are clear," said Mr Kavanagh. "Aside from the broad area of IAM, specific controls, such as encryption, are becoming vital to the adoption of cloud computing. They are further helping to generate interest in this particular form of security service delivery."
Gartner expects acceptance of, and reliance on, cloud-based security-as-a-service offerings to increase, based on organizations gaining more experience with SaaS and more consumer-grade technology being made available to corporate systems as a result of trends, such as bring your own device (BYOD).
Cloud-based security services will grow faster than the market for remotely monitored customer premises equipment (CPE) MSS through 2012, but starting from a smaller base. In the next 24 months, new security-as-a-service-based offerings that address specific security controls for cloud-based IT resources will be available from larger IT and network service providers, aimed initially at small or midsize businesses (SMBs). Gartner predicts that smaller, pure-play managed security service providers (MSSPs) will be most affected by the introduction of these services, and expects them to consolidate
Within the IAM space, interest in cloud-based security has been driven mostly by SMBs' needs to extend their basic IAM functions and serve employees who are accessing SaaS and some internal web-architected applications. An increasing number of organizations seem to be adopting cloud-based IAM services to replace IAM on-premises tools. Larger businesses are often looking to use IAM as a mixture of legacy- and web-architected cloud and on-premises.
"Although organizations' interest in encryption is expected to grow, service providers' relative lack of interest in cloud-based encryption means it has remained a complex activity, requiring organizations to initiate complex, build-your-own deployments," said Mr Contu. "The strongest interest is in encryption products from cloud security brokers, thanks to their relative ease of deployment and their options for on-premises encryption management. Nevertheless, Gartner expects cloud hosting providers and IaaS providers to show an increased interest in cloud-based encryption capabilities."
Given the differences in maturity, cultural acceptance and local IT infrastructures, considerable regional differences exist in the deployment rates of cloud-based security systems. The maturity of the related business communities, local regulations and cultural aspects all play a part in the level of spending dedicated to this delivery model compared with on-premises deployments. Privacy remains an important inhibitor in the deployment of all forms of cloud-based services. This is particularly true in those regions and countries with strong regulatory requirements (such as Europe, with its data protection legislation).
Additional information is available in the report "Market Trends: Cloud-Based Security Services Market, Worldwide, 2014." The report can be found on Gartner's website at http://www.gartner.com/resId=2607617.
Additional information on security can be found in the Gartner Special Report "The Future of Global Information Security" The special report can be viewed at http://www.gartner.com/technology/research/security-risk-management/. The report explores the major tectonic forces at play that will change how business use of technology will be dramatically changed by rapid escalations in threat, defense and societal demands.
This topic will be discussed in more detail at the Gartner Identity and Access Management Summits. For more information about the Gartner Identity and Access Management Summit taking place November 17-18 in Los Angeles, please visit http://www.gartner.com/technology/summits/na/identity-access/. To register for a press pass for this event, please contact firstname.lastname@example.org.
For details on the Gartner Identitiy and Access Management Summit 2014, taking place taking place on March 17-18, in London, please visit europe.gartner.com/iam.
About Gartner Identity and Access Management Summit
The Gartner Identity and Access Management Summit is the only IT event dedicated to the issues faced by Identity and Access Management (IAM) professionals. It aims to lay out the key trends and strategies that will define successful IAM programs the technology, tools and techniques needed to establish effective IAM programmes at a time when IT architectures and the regulatory landscape are rapidly changing in response to the Nexus of Forces – mobile, cloud, information and social.
Gartner, Inc. (NYSE: IT), is the world's leading research and advisory company and a member of the S&P 500. We equip business leaders with indispensable insights, advice and tools to achieve their mission-critical priorities and build the successful organizations of tomorrow.
Our unmatched combination of expert-led, practitioner-sourced and data-driven research steers clients toward the right decisions on the issues that matter most. We're trusted as an objective resource and critical partner by more than 15,000 organizations in more than 100 countries—across all major functions, in every industry and enterprise size.
To learn more about how we help decision makers fuel the future of business, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.