Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

US Government to Spend $6.1 Billion on IT Security in 2014

According to new market research from IDC Government Insights, overall IT security spending by the U.S. Federal Government will rise from $5.9 billion in 2012 to over $7.3 billion in 2017. In 2014, IT security spending by the Federal Government is expected to top $6.1 billion.

According to new market research from IDC Government Insights, overall IT security spending by the U.S. Federal Government will rise from $5.9 billion in 2012 to over $7.3 billion in 2017. In 2014, IT security spending by the Federal Government is expected to top $6.1 billion.

The report, Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook, revealed that overall security spending has been ticking upward at an average rate of about 4% per year, with the steady increase showing no signs of narrowing.

As IDC points out, IT security elements within government offices can be significantly different than what is seen in other industries because of the need for physical and national security.

“While federal IT security spending continues to climb, the expansion is not universal,” IDC explained. “Different agencies are investing in IT security at different rates, and most have distinct focuses depending on their existing legacy systems and what they need to improve.”

“At this time, many agencies are reviewing how their move to cloud-based solutions might affect their overall IT security posture and many are finding that unified threat management (UTM) solutions are becoming increasingly popular,” said Shawn P. McCarthy, Research Director, IDC Government Insights.

IDC anticipates that federal UTM spending will rise from $213.8 million in 2012 to over $541.4 million in 2017, McCarthy said.

Additional key findings from the report include:

• Most IT security spending goes toward staff salaries. This is because security scanning and proactive mitigation efforts still have a heavy manual component, with people needed to set configuration and to make decisions when threats are detected. Most years staff salaries account for between 85% and 91% of total spending.

Advertisement. Scroll to continue reading.

• The Office of Management and Budget (OMB) tracks two broad categories of IT security spending — money spent strictly on IT security versus money spent on the IT elements of larger physical and nation security efforts. The government needs both types of IT spending to maintain an effective security posture. While the latter group is not traditional information security spending as IDC defines it in taxonomy documents, it is often listed as security related when it is mentioned in government IT budgets. For that reason, IDC Government Insights has included details on both types of security budgets, including a five-year forecast for both types of security spending.

IDC Government Insights expects to see steady long-term growth for security spending between now and 2017, with staffing growing to $6.2 billion by 2017, firewall spending growing to $249.6 million, unified threat management growing to $541.4 million, intrusion detection and prevention growing to $226.3 million, and virtual private network spending growing to $80.9 million.

Currently, about 40% of IT staffing for security management goes to contractors, a number that IDC expects to climb to roughly 60% by 2017, mainly as a result of increased adoption of cloud computing.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.