Organisations will spend £10.2bn in 2010 on securing their networks and systems, UK market analyst Datamonitor...
has said, up 32% from the £7bn they will spend this year.
But Alaa Owaineh, an associate analyst at the firm, said that different sectors will grow at significantly different rates. "There is a big rise in the importance of data protection, data-loss prevention and encryption," he said. "Another area that is growing quickly, although its debatable if one should include it with IT security or management, is the area of IT auditing and risk management."
Other sectors, such as virtual private networks (VPNs) and firewalls, are growing much more slowly, Owaineh added - although with certain faster growth areas, such as the use of Secure Sockets Layer (SSL) technology for VPNs.
In a report, Decision Matrix: Selecting an Enterprise Security Vendor, Owaineh writes that consolidation is likely among suppliers. "End-users are fed up with buying 30 solutions from 30 vendors. They want three or four that will integrate easily," he said, adding that company acquisitions will speed this process.
Such purchases have been common in recent weeks, with Google buying Postini, PatchLink buying SecureWave and, on 18 July, Oracle buying its Silicon Valley neighbour identity theft and fraud detection supplier Bharosa for an undisclosed amount..
Owaineh said Symantec, McAfee and IBM are well-placed to become primary suppliers of IT security, providing a framework to organisations and claiming much of their spending, although this will leave space for specialist providers such as Check Point and RSA. Symantec does not provide identity management, preferring to focus on infrastructure, while McAfee has more depth than breadth than Symantec, he said.
He added that IBM is adding security functions to its existing infrastructure products. "IBM sees the future of many aspects of enterprise security as part of infrastructure security, things like placing data protection in the infrastructure," said Owaineh.
This story first appeared on the Infosecurity Magazine website.
Comment on this article: firstname.lastname@example.org