Security spending is set to exceed US$37 billion next year as organisations look to fend off potential cyber-attacks, according to Ovum.Next year, the IT security industry will
focus on helping organisations to know more about the threats they face,
according to Ovum’s Security 2016 Trends to Watch report.
IT
will utilise security intelligence along with analytical capabilities to
map the threat landscape and find and take action against new and
recurring threats.
“Industry coverage will include new
technologies which have been designed to identify and address the risky
actions that users are taking and the unauthorised, often cloud-based
facilities they are choosing to use,” Ovum states.
Ovum lists its
trends to watch next year as: improving the usefulness of security
analytics and threat intelligence is vital; keeping business data safe
calls for new and innovative technology; cybersecurity controls must
improve to deal with next-generation business systems; and, identity
management has to evolve to deal with the complete digital life cycle.
“In
2016, the security plaudits should go to software and service providers
who can identify threats earlier and provide organisations with the
quality of security intelligence they need to keep data safe,” Andrew
Kellett, Ovum principal analyst, software – IT solutions and report
author, commented.
“More realistically, it is likely to go to
vendors who can spot security breaches soon after they occur and deal
effectively with the aftermath of remediation.”
Kellett added
that “detection and remediation tools that can spot all types of malware
and reduce recovery timelines after a breach will continue to have an
important role”.
Operational demands, including the use of
technology that makes business information more readily available and
consequently more vulnerable to cyber-attacks, will drive the need for
better security, according to Ovum, with the increasing use of
cloud-based services, user mobility and multiple devices adding
complexity to security, particularly identity and access management
requirements.
Next year, more use will be made of analytical
and intelligence-based security tools to identify threats and help
qualify the actions that need to be taken to keep businesses safe.
“The focus on keeping user and business data safe is a key issue,” Kellet commented.
“As
such, there needs to be far more interest in the control elements of
security that define what users are allowed to do: what on-premise and
cloud-based facilities and services they can and cannot use, what data
resources they are allowed to access, and where that data can be kept.”