Access and Feeds

Security and Risk Management: Four Vectors Repositioning the Direction of Today’s Security Market

By Dick Weisinger

Software, IT and technology have been in a constant state of rapid change for some time.  Specifically, in the area of security and risk management, businesses are rethinking their current strategies.

Gartner recently identified what they are calling the four vectors that are repositioning the security market:

  • By 2020, three-quarters of security products will include capabilities powered by advanced analytics, artificial intelligence, machine learning, and heuristics.
  • Regulatory requirements will increasingly drive demand for security software.
  • Vendors of mature security products will try to keep pace with changes in the market by acquiring and integrating new products and technologies, often from startups, into their existing products.
  • Businesses are increasingly adopting software-as-a-service (SaaS) because of the business benefits, and as a result, will also look for SaaS security solutions.

Deborah Kish, principal research analyst at Gartner, said that “the overall security market is undergoing a period of disruption due to the rapid transition to cloud-based digital business and technology models that are changing how risk and security functions deliver value in an organization. At the same time, the threat landscape and rise in the number of high-impact security incidents are also creating demand for security technologies and innovations that deliver greater effectiveness.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on DotNetKicks.com
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)
One comment on “Security and Risk Management: Four Vectors Repositioning the Direction of Today’s Security Market
  1. Understanding security and risk management vectors reshapes today’s market, ensuring robust defenses and proactive strategies for safeguarding digital assets.

Leave a Reply

Your email address will not be published. Required fields are marked *

*