Global Cyber Security Spend To Grow Only 2.8%

Worldwide IT spending is projected to total $3.4 trillion in 2020, a decline of 8% from 2019, according to the latest forecast by the industry analysts at Gartner.  The virus and effects of the global economic recession are causing CIOs to prioritise spending on technology and services that are deemed “mission-critical” over initiatives aimed at growth or transformation.  

Gartner last year projected that Worldwide IT spending would total $3.7 trillion in 2019, an increase of 0.4% from 2018. This was the lowest forecast growth in 2019. They also thought that global IT spending was expected to rebound in 2020 with a significant growth forecast primarily due to enterprise software spending.

It has become apparent that worldwide spending on information security and risk management technology and services will grow just 2.4% this year, well below the growth rate it had estimated just a few months ago.

The Covid-19 pandemic had disrupted supply chains and production across the world, forcing organisations, whether large or small, to limit their spending to survive until the crisis is over and normality returns.

The significant impact of the pandemic on business revenues across the world has impacted cyber security spending as well. Gartner think a reduction of growth in both security software and services will take place during 2020 but at the same time, the pandemic is driving short-term demand in areas such as cloud adoption, remote worker technologies and cost-saving measures. While worldwide spending on information security and risk management technology and services will not contract, the growth in sectoral spending will be incremental at best with the overall spending rising from $120b in 2019 to nearly 124b in 2020. In particular:-

  • Spending on infrastructure protection will increase from $1.65 billion to $1.74 billion.
  • Spending on security services will increase from $61.9 billion to $64.2 billion.
  • Spending on cloud security will rise from $439 million to $545 million.
  • Spending on identity access management solutions will increase from $9.8 billion to $10.4 billion.
  • Spending on network security equipment  is expected to contract from $13.3 billion in 2019 to $11.6 billion. 

Cloud-based delivery models have reached well above 50% of the deployments in markets such as secure email and web gateways and the contining trend towards a cloud-based delivery model makes the security market more resilient to recession with an average penetration of 12% of overall security deployments cloud-based in 2019.

Gartner’s IT spending forecast methodology relies heavily on rigorous analysis of sales by thousands of vendors across the entire range of IT products and services.  Gartner uses primary research techniques, complemented by secondary research sources, to build a comprehensive database of market size data on which to base its forecast.

Gartner:         TEISS:        Professional Security

You Might Also Read:

Pay-As-You-Go Cybersecurity:

 

« Cyber Security Warnings From The Coronavirus Pandemic
How Hackers Invade Your Computer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.