​Cyber spending rises as channel chases security sweet spot

​Cyber spending rises as channel chases security sweet spot

"Security plaudits should go to software and service providers who can identify threats earlier..."

Cyber security spending will surpasses the $US37 billion mark in 2016, as channel partners seek new ways to find the security sweet spot.

Industry analyst firm Ovum - in releasing its Security 2016 Trends to Watch report - claims the IT security industry will focus on helping organisations to know more about the threats they face.

Consequently, findings show that IT will be utilising security intelligence and analytical capabilities to map the threat landscape and find and take action against new and recurring threats.

Industry coverage will include new technologies which have been designed to identify and address the risky actions that users are taking and the unauthorised, often cloud-based facilities they are choosing to use.

“Each year organisations increase spending on cyber security protection to keep their businesses, their data and their users’ safe,” says Andrew Kellett, Principal Analyst, Software - IT solutions, Ovum.

“It is a commitment that continues to be threatened by security attacks ranging from opportunistic hackers using pre-built tools through to targeted, well-resourced, and on occasion, state-sponsored cyber activity.”

For channel partners looking to get ahead in security at a local level, in 2016, Kellett believes the security plaudits should go to software and service providers who can identify threats earlier and provide organisations with the quality of security intelligence they need to keep data safe.

“But more realistically,” Kellett adds. “It is likely to go to vendors who can spot security breaches soon after they occur and deal effectively with the aftermath of remediation.”

In 2016, Kellett believes cybercrime, state-sponsored activities and advanced persistent threats (APTs) will continue to make the headlines, and social engineering that targets human frailties will continue to put business systems at risk.

“Therefore, detection and remediation tools that can spot all types of malware and reduce recovery timelines after a breach will continue to have an important role,” Kellett adds.

Going forward, Kellett believes the need for better security will be driven by operational demands, including the use of technology that makes business information more readily available and consequently more vulnerable to cyber-attacks.

“Increasing use of cloud-based services, user mobility and multiple devices is adding complexity to security, particularly identity and access management requirements,” Kellett adds.

For Kellett, the security industry has the products and services to improve business and data protection.

And as such, 2016 will see more use being made of analytical and intelligence-based security tools to identify threats and help qualify the actions that need to take to keep businesses safe.

“The focus on keeping user and business data safe is a key issue,” Kellett adds.

“As such, there needs to be far more interest in the control elements of security that define what users are allowed to do: what on-premise and cloud-based facilities and services they can and cannot use, what data resources they are allowed to access, and where that data can be kept.”

To succeed in 2016, Kellett believes key players must improving the usefulness of security analytics and threat intelligence, branding it as a “vital” factor in the next twelve months.

In addition, the year will see a greater need for keeping business data safe through new and innovative technology, with cyber security controls required to deal with next-generation business systems.

“Furthermore,” Kellett concludes, “identity management has to evolve to deal with the complete digital lifecycle.”

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags ovum

Show Comments