Third Platform of Technology to Drive China IT Security Market's Rapid Development Over Next Five Years: IDC
17 Sep 2013
Beijing, September 17, 2013 –IDC expects China IT security market to experience a year-on-year growth of 12.7% in 2013 to reach a market size of USD 1,830 million.
In line with the forecast, IDC predicts that the compound growth rate of China IT security market from 2012 to 2017 will reach 12.2%.
According to IDC’s China IT Security Software, Appliance and Services 2013-2017 Forecast and Analysis: The Big Picture (Doc# CH2638203V), China IT security market reached USD 1,660 million in 2012, an increase of 12.9% year-on-year.
The security appliance market at USD 830 million, accounted for 51.3%, while the security service and software market accounted for 24.5% and 24.3% respectively.
Due to an overall slowdown in economic growth, multiple fields in the IT industry experienced slow growth in 2012, however, the IT security market maintained a rapid growth.
"Compared with developed countries, China’s IT security investment in 2012 only accounted for 1% of the overall IT industry; in addition, influenced by the recent ‘Prism’ event, the government is expected to issue new security policies to protect the national information security system," says Pei Wang, Research Manager responsible for IT Security Market Research in IDC China.
He notes that at the same time, customer demand for IT security is increasing continuously, therefore, China IT security market has a great potential for future growth.
"Emerging technologies for the third IT platform including cloud computing, big data, mobile and social network will lead the future growth of the IT security field.”
As cloud computing matures, the internal resources in the current data center are increasingly virtualized, and the physical-based traditional protection mechanism is unable to effectively protect user applications and information security under the shared virtualization environment. That leads to separation of ownership and management right of information, making unauthorized access to information assets a serious security problem for the cloud computing system.
Speed, flexibility and simplicity will become key indicators for cloud security solutions. Cloud computing ecosystem vendors and service providers are increasing their investments in cloud computing to improve the reliability, usability and data security of the cloud computing platform to ensure the healthy development of cloud computing.
"China entered the big data era in 2012. Big data analysis will transform the network security protection technologies. It is an inevitable trend that big data analysis and security technologies will integrate, and the technologies based on traditional security including virus resistance, firewall, and an intrusion prevention system will accelerate the transformation to big data analysis- and monitoring-based security technologies. This will impact China’s information security technology and product research and development, as well as network security defense system construction."
The popularity of social networks provides new opportunities for online fraud. As a result, social network users and their friends, colleagues and family members are cheated by these criminals.
Social networks challenge enterprise security strategies. Although social networks can boost the marketing efforts of enterprises, the benefits must be balanced with information security management and the risk of information breaches.
At the recent Black Hat USA 2013 conference, mobile computing became a new area for people to research. According to IDC, the total shipment of China smartphones in Q1 2013 was 79 million with a year-on-year growth of 120%, while tablets reached 6.20 million with a year-on-year growth of 163.5%, exceeding the shipment of smartphones in the first half of 2012. As market shares of desktops and laptops decrease and more people use tablets and smartphones to access to data and applications stored in the cloud platform, the system bugs are becoming more harmful. At the same time, enterprises are beginning to consider deploying BYOD solutions, which makes enterprise-level mobile security protection more complicated.
In view of these factors, IDC suggests that enterprises formulate a thorough mobile security protection strategy while deploying mobile applications, and utilize the mobile appliance and application management solutions to integrate mobility and security, thereby minimizing security risks.
ContactFor more information, contact: