{"id":13279,"date":"2019-08-26T14:56:52","date_gmt":"2019-08-26T09:26:52","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=13279"},"modified":"2019-08-26T14:56:52","modified_gmt":"2019-08-26T09:26:52","slug":"enterprise-information-security-spending-in-india-to-grow-12-in-2019-gartner","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/enterprise-information-security-spending-in-india-to-grow-12-in-2019-gartner\/","title":{"rendered":"Enterprise Information Security Spending in India to Grow 12% in 2019 : Gartner"},"content":{"rendered":"<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<blockquote>\n<p class=\"grid-norm  mg-t0\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\">\u2022 Analysts to Discuss IT Security and Risk Strategy at the Gartner Security &amp; Risk Management Summit, August 26-27, 2019 in Mumbai.<\/span><\/strong><\/p>\n<\/blockquote>\n<\/div>\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  \"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Mumbai, India, August 26, 2019 :<\/strong> Enterprise information security\u00a0spending in India is on pace to total US$1.86 billion in 2019, an increase of 12.4% from 2018, according to the latest forecast from Gartner, Inc.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">\u201cThe growth of enterprise spending on information security in India will continue to grow unabated to reach over US$2 billion in 2020,\u201d <strong>said\u00a0Prateek Bhajanka, principal research analyst at Gartner.<\/strong> \u201cThe increased awareness on the benefits of risk assessment and the acknowledgement that security is one of the enablers of digital transformation are boosting enterprise security spending in India. In addition, the rise in advanced cyberattacks, ransomware and malware attacks has put\u00a0cybersecurity\u00a0as a top investment priority for Indian CISOs, therefore increasing spending on security locally.\u201d<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Gartner analysts are describing how security and risk management leaders (CISOs) can advance their IT security and risk strategy in front of over 600 attendees at the\u00a0<a href=\"https:\/\/www.gartner.com\/en\/conferences\/apac\/security-risk-management-india\">Gartner Security &amp; Risk Management Summit<\/a>, which is taking place here through Tuesday.\u00a0<\/span><span style=\"font-family: arial, helvetica, sans-serif;\">\u201cLocal CISOs and security leaders are investing in advanced threat detection programs and capabilities like endpoint detection and response (EDR) and user and entity behavior analytics (UEBA) to help detect attacks and breaches in their IT infrastructure,\u201d said Mr. Bhajanka.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Security services will attract the most spending from CISOs and security leaders in 2019 as local organizations are emphasizing on threat detection, compliance and security hygiene. In 2019, security services will represent 51.5% of the total enterprise information security spending in India.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Enterprise Information Security Spending by Segment, India, 2017-2020 (Millions of U.S. Dollars)<\/strong><\/span><\/p>\n<table style=\"height: 638px;\" border=\"1\" width=\"587\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Market Segment<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>2017<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>2018<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>2019<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>2020<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Application Security<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">66<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">72<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">79<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">88<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Cloud Security<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">0<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">1<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">4<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">10<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Data Security<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">69<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">77<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">91<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">112<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Identity Access Management<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">152<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">163<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">178<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">197<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Infrastructure Protection<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">171<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">185<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">207<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">233<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Integrated Risk Management<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">56<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">65<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">80<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">104<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Network Security Equipment<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">186<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">209<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">240<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">267<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Other Information Security Software<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">23<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">24<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">26<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">28<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\">Security Services<\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\">809<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">867<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">963<\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\">1,069<\/span><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" width=\"327\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Total<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"73\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>1,532<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>1,662<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>1,868<\/strong><\/span><\/td>\n<td valign=\"bottom\" width=\"91\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>2,108<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Due to rounding, figures may not add up precisely to the totals shown.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Source: Gartner (August 2019)<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Cloud Security and Integrated Risk Management Are Fastest Growing Segments in 2019<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Enterprise spending on cloud security is expected to total $US4 million in 2019, an increase of 300% from 2018. \u201cThe Personal Data Protection bill which is likely to be accepted by the Indian parliament in 2019 and the Indian government\u2019s initiatives like \u2018Digital India\u2019 and \u2018Smart City\u2019 are increasing net-new adopters of\u00a0cloud. In addition, Indian organizations are increasingly using cloud-specific security tools such as\u00a0cloud access security broker\u00a0(CASB) solutions for threat prevention, data loss prevention and compliance requirements, which is fueling the tripe-digit growth of cloud security in India,\u201d <strong>said\u00a0Rustam Malik, principal research analyst at Gartner.<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">In 2019, integrated risk management solutions will be the second fastest growing segment, achieving a 23.1% increase year over year. \u201cOnline payments rose since demonetization in 2016 and led to an increase in investments toward IT infrastructure security,\u201d said Mr. Bhajanka. \u201cThe move to digital business is also forcing CISOs to increase their spending on managing risks arising from cyberattacks and non-compliance.\u201d<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Incidents of privacy breaches have put an increasing pressure on the role of CISOs in India to secure data, address privacy concerns and create secured IT infrastructure for online transactions. Local regulatory bodies have mandated Indian organizations to store critical data in local data centres to ensure better monitoring of data, confidentiality and data security. In addition, Indian CISOs are also concerned about compliance issues that will arise with the implementation of\u00a0<a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/ready-guide-to-gdpr\/\">General Data Protection Regulation<\/a>\u00a0(GDPR).<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">In 2020, cloud security, integrated risk management and data security will continue to be the highest growing segments among local businesses. \u201cCISOs need to focus on developing a data security governance framework which will help mitigate the risks caused by security threats, data residency and privacy issues,\u201d said Mr. Malik. \u201cInvestment in password-less authentication technologies should be one of the focus areas as we are seeing a spike in attacks arising from exploitation of user credentials.\u201d<\/span><\/p>\n<\/article>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u2022 Analysts to Discuss IT Security and Risk Strategy at the Gartner Security &amp; Risk Management Summit, August 26-27, 2019 in Mumbai. Mumbai, India, August 26, 2019 : Enterprise information security\u00a0spending in India is on pace to total US$1.86 billion in 2019, an increase of 12.4% from 2018, according to the latest forecast from Gartner, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,4],"tags":[977,7278,313],"class_list":{"0":"post-13279","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-security","7":"category-technology","9":"tag-gartner-forecasts-enterprise-information-security-spending-in-india-to-grow-12-in-2019","10":"tag-gartner-security-risk-management-summit"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/13279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=13279"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/13279\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=13279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=13279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=13279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}