Security will be the fastest growing segment of the Asian software sector in 2014, according to a technology research firm.
Indian CIOs will need to invest in new security as they migrate to public cloud services, increase mobility, and use social media . According to Forrester this trend is the result of "age of the customer".
“The CISO and other security and risk leaders no longer have the authority to block or significantly inhibit business adoption of any new service or technology. Instead, they must focus on mitigating the most egregious security concerns and help develop solutions,” said Manatosh Das, senior analyst at Forrester,
The analyst company revealed that spending on security software by Asian companies will increase 55% in 2014 compared to 2013.
Security technology likely to receive investment includes identity and access management, encryption, key management, two-factor authentication, next-generation firewall, security information management, VPN, security modules for mobile device management, mobile application management, and mobile content management technologies.. These technologies offer security without negating the customer experience.
The growth in security spending outstrips other software catagories often seen as high growth, such as infrastructure software (46%), business intelligence (46%), SaaS (41), collaboration (40%), big data (40%) and mobile applications and middleware.
“Digitally empowered customers are disrupting every industry; the age of the customer brings with it some inherent risks that will push organizations to increase spending on security software. In Asia Pacific, security software has leapfrogged other software categories and leads the region in terms of expected software spending growth in 2014,” said Das.
The risks of the age of the customer, according to Forrester
1. Migration to public cloud services
“Increased adoption of public cloud-based services such as storage and disaster recovery is stretching the attack surface, exposing enterprises to a variety of security issues related to confidentiality, integrity, availability, and accountability. In response, firms must strengthen their security infrastructure.”
2. Increased mobility
“As enterprises introduce mobility into their environment and add devices to support the initiative, the footprint of their infrastructure increases. The new access points attached to the network create opportunities for attackers to break into the infrastructure directly or via mobile application portals that provide gateways to protected, sensitive data."
3. Increased social media adoption
“Cybercriminals frequently embed malware in social media websites or third-party applications. Infected users can then spread the malware to other devices by unknowingly sharing malicious links and files with their contacts.”