Lots of opportunity in network security, data security, security services, and strong authentication in 2014 I hope my cybersecurity colleagues enjoyed their holiday these past few weeks. It was surely well deserved as the year 2013 will be remembered as a whirlwind of activity featuring successful IPOs and scary security incidents. Given this, it’s likely that security professionals spent the last few weeks with one eye of family and holidays and another on emerging details about the massive breach at Target. So what’s in store for the information security industry in 2014? On the surface, it should be a happy new year across the board for security technology vendors, MSSPs, and professional service firms. That said, there is a lot of work ahead as enterprise organizations figure out how to transform an army of point tools and manual processes into a cohesive security strategy. To kick-off my blog in 2014, here is my quick assessment of the strongest information security industry sectors and associated prospects for 2014:1. Network security. Okay, this is an easy prediction as network security is always an active area. FireEye and Palo Alto will ride their momentum and continue to be present in nearly every RFI/RFP and proof-of-concept making 2014 a good year for investors. There will also be a number of market disruptions however. The whole SDN/network virtualization will have a growing impact on network security, opening the door for vendors like Check Point, Dell, Fortinet, and Juniper to push innovative solutions. On another front, Cisco/Sourcefire, IBM, and McAfee/Stonesoft, will gain a lot of attention with updated and integrated network security architectures. The key will be user education and architectural integration but expect a lot of overall spending in the network security realm.2. Data security. As 2013 wound down, a lot of CISOs I spoke with spoke of high-priority security projects around an area ESG calls: “Crown Jewel Security.” Instead of taking on complicated data classification initiatives across the enterprise, these organizations are quickly identifying their most valuable data and then surrounding it with enhanced safeguards like multi-factor authentication, privileged user security, granular access controls, encryption/key management, and continuous monitoring. “Crown Jewel Security” projects will increase in 2013, opening the door to vendors like CyberArk, Lieberman Software, RSA, Vormetric, and Thales.3. Security services. This category includes MSSP, professional services, and SaaS for information security. Security services will likely show the strongest growth rate of all in 2014 for the simple reason that demand for cybersecurity talent far exceeds supply. This trend should benefit the likes of Blue Coat, Dell/SecureWorks, HP, IBM, Proofpoint, Verizon, Symantec, and Unisys as well as their high-priced cousins at Accenture, E&Y, and PWC. Traditional private sector security services firms will also be joined by a wave of traditional public sector competitors including Boeing, Booz Allen, CSC, Leidos, Lockheed Martin, Northrop Grumman, and even Raytheon. Why the public-sector incursion? Federal integrators are looking to shield themselves from future sequestration and cost cutting. On the opportunity side, the Washington crowd could be well positioned if and when the Federal cybersecurity framework gains momentum in the private sector.4. Strong authentication. The information security community has known for years that passwords were a liability but the alternatives were too expensive and complex. Things got worse in 2013 when, password risks seemingly grew exponentially. This problem finally has board-level attention which translates into leadership and money. There may also be some hope on the technology side with innovation from vendors like RSA, standards from the FIDO alliance, and integrated “trusted” technologies from the likes of Apple, ARM, and Intel. Yup, there’s bound to be a lot of money spent in this area but there is plenty of work ahead in terms of industry cooperation and user education. First and foremost, the FIDO alliance has to stop talking, publish a 1.0 standard, and push this into the market. So what about other areas like application security, endpoint security, mobile computing security, and security analytics? I’ll cover these segments in my blog soon. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe