In This Study MethodologySituation Overview Consulting Services OverviewImplementation Services OverviewSecurity Operations OverviewEducation and Training OverviewFuture Outlook Forecast and AssumptionsWorldwide Security ServicesU.S. Security Services SpendingMarket ContextEssential Guidance Learn More Related ResearchMethodologyHistorical Market Values and Exchange RatesSynopsisTable: Worldwide Security Services Spending by Region, 2006–2015 ($M) Table: Worldwide Security Services Spending Growth by Region, 2010–2015 (%) Table: U.S. Security Services Spending by Activity, 2006–2015 ($M) Table: U.S. Security Services Spending Growth by Activity, 2010–2015 (%) Table: Top 3 Assumptions for the Worldwide and U.S. Security Services Market, 2011–2015 Table: Key Forecast Assumptions for the Worldwide and U.S. Security Services Market, 2011–2015 Table: Worldwide Security Services Spending, 2006–2015: Comparison of January 2009 and May 2011 Forecasts ($M) Table: Exchange Rates, 2003–2010 (%) Figure: IDC's Security Services Taxonomy Figure: Worldwide Security Services Spending by Region, 2010–2015 Figure: U.S. Security Services Spending by Activity, 2006–2015 Figure: Worldwide Security Services Spending, 2006–2015: Comparison of January 2009 and May 2011 Forecasts
Worldwide and U.S. Security Services 2011–2015 Forecast and Analysis
This IDC study presents the worldwide and U.S. security services forecast for the period 2011-2015.
"Enterprises see more and more of their IT budget consumed with costs to secure their environment. They already know that antivirus tools don't work against advanced persistent threats (APTs) and other malicious threats and that they are vulnerable to becoming part of the 70% of organizations that have been breached in some way. Their security and IT staff want to stay focused on tightening up their infrastructure against threats but the changing and persistent nature of those with malicious intent make it very challenging to stay ahead of security threat management. Security services providers have built out security consultant and implementation teams to architect infrastructures that address key business concerns of data protection and keeping unauthorized traffic off their network. As security services providers streamline their consultancy and implementation practices, and technology advances and service delivery platforms have developed, security services are a viable alternative for enterprises of all sizes. The growth in this market shows that security services providers are a preferred route to completing the task in-house for those reasons. Security services vendors are positioning themselves as a trusted partner and must implement their own services within their own infrastructures to create trust within the enterprise community. Security is a very sensitive subject, particularly when heavy fines are levied for noncompliance of industry and regulatory controls. Brand degradation and R&D loss are common effects of poorly implemented security measures, and enterprises are well aware of that exposure. Security tends to be 'sticky' and enterprises don't switch security services providers as they do other services. It also provides the services providers the opportunity to up-sell incremental security services since they are already in the customer environment and have visibility into customer security vulnerabilities and threat vectors. But security services providers have to remain diligent against emerging threats and maintain focus as a trusted partner, with their own reputation on the line to maintain their customers' security," said Chris Liebert, senior analyst, Security Services, IDC.