Welcome!

News Feed Item

Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook

LONDON, April 7, 2014 /PRNewswire/ -- Reportbuyer.com has added a new market research report:

Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook

This IDC Government Insights report offers a U.S. federal IT security forecast through 2017 plus breakouts, by agency, of the major IT security initiatives currently underway. It also looks at how IT security elements within government offices can be significantly different than what is seen in other industries -- because of the need for physical and national security. Federal IT security spending continues to climb, increasing at an anticipated 3-6% each year through 2017.

"At this time, many agencies are reviewing how their move to cloud-based solutions might affect their overall IT security posture," says Shawn P. McCarthy, research director at IDC Government Insights. "Many are finding that unified threat management solutions are becoming increasingly popular."

Table of Contents

IDC Government Insights Opinion

In This Study

Situation Overview

Recent Trends

The Approach

Monitoring Key Offices

Offices That Focus on IT Security Issues

Offices That Focus on Issues Related to Physical or National Security

Key Security Initiatives

Staffing

IT Security Spending -- The Big Picture

IT Security Spending Versus IT Spending on National Security Solutions

IT Security Views -- By Federal Agency

Department of Defense

Department of Veterans Affairs

Department of Homeland Security

Department of Health and Human Services

Department of the Treasury

Department of Agriculture

Social Security Administration

Department of Energy

Department of Justice

Department of State

Department of Commerce

U.S. Army Corps of Engineers

Department of the Interior

National Aeronautics and Space Administration

Department of Transportation

Department of Education

General Services Administration

Environmental Protection Agency

Department of Labor

Department of Housing and Urban Development

Nuclear Regulatory Commission

Small Business Administration

National Science Foundation

Smaller Agencies

Future Outlook

Essential Guidance

Actions to Consider

For Government Agencies

For Vendors

Learn More

Related Research

Synopsis

Table: Defense Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Veterans Affairs Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Homeland Security Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Health and Human Services Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Treasury Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Agriculture Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Social Security Administration Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Energy Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Justice Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: State Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Commerce Department Top 6 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Army Corps of Engineers Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Interior Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: NASA Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Transportation Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Education Department Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: General Services Administration Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Environmental Protection Agency Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Labor Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Housing and Urban Development Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Nuclear Regulatory Commission Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Small Business Administration Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: National Science Foundation Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Smithsonian Institution Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Agency for International Development Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Office of Personnel Management Top Area of Focus for IT Security Spending, FY12-FY14 ($M)

Table: National Archives and Records Administration Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Federal Government IT Security Spending by Security Solution, 2012-2017 ($M)

Figure: U.S. Federal Budgeted IT Security Spending Share by Agency, 2014

Figure: Spending on Traditional IT Security, FY12-FY14

Figure: National Security Spending on Traditional IT Security, FY12-FY14

Read the full report:
Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook
http://www.reportbuyer.com/countries/north_america/usa/business_strategy_u_s_federal_government_security_spending_forecast_market_outlook.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=NoCategory

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We analyze the video streaming experience. We are gathering the user behavior in real time from the user devices and we analyze how users experience the video streaming," explained Eric Kim, Founder and CEO at Streamlyzer, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.