Feeds

Security Biz: the double edged sword

Boom/Bust

  • alert
  • submit to reddit

SANS - Survey on application security programs

The security industry is in a state of a flux. While companies like Baltimore and iDefense are suffering self-evident problems, the rest of the market appears to be buoyant.

IDC reported last week that the security industry looks set for a bumper few years and with the UK's Confederation of British Industry stating that two thirds of companies fell victim to cyber crime last year, it seems that security companies could be set to boom.

According to IDC, the security market is going to grow from strength from strength over the next four years, rising at a compound annual rate of 23, until it tops more than $14 billion in 2005. This isn't just for virus protection either -which seems to be an increasingly virulent threat - but for all sectors of the security industry: firewalls, encryption, authentication authorisation and administration.

Evidence of the boom can be traced as early as last year when, again, all sectors experienced considerable growth. Antivirus software turned in a healthy 25 per cent growth figure while the firewall segment managed an astonishing 42 per cent growth in 2000. Internet security, benefiting from the surge in ecommerce activity throughout 2000, also managed considerable gains, rising 33 per cent to $5.1 billion.

'The question that vendors will be asking themselves however is where do I need to be investing?'

The problem with the security market right now however is that it is, as IDC says, a 'double-edged sword.' Whilst Baltimore has seen the bottom fall out of its market and iDefense has filed for Chapter 11, others in the market are booming.

Brian Burke, senior research analyst in IDC's Internet Security program, said: "On the one hand, it [the economic climate] is forcing companies to reduce spending. On the other hand, it's forcing companies to look for ways to cut costs, become more security proficient, and build trusted relationships.' And obviously that's where security products can help.

The question that vendors will asking themselves however is "where do I need to be investing?" According to IDC, the most popular areas of security over the next few years are going to be the 3As, authentication, authorisation, and administration. This segment alone is expected to surge beyond the $9 billion mark by 2005, buoyed by a compound annual growth rate over the next four years of 28 per cent.

© IT-Analysis.com. All rights reserved.

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.