Welcome!

News Feed Item

Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook

LONDON, April 7, 2014 /PRNewswire/ -- Reportbuyer.com has added a new market research report:

Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook

This IDC Government Insights report offers a U.S. federal IT security forecast through 2017 plus breakouts, by agency, of the major IT security initiatives currently underway. It also looks at how IT security elements within government offices can be significantly different than what is seen in other industries -- because of the need for physical and national security. Federal IT security spending continues to climb, increasing at an anticipated 3-6% each year through 2017.

"At this time, many agencies are reviewing how their move to cloud-based solutions might affect their overall IT security posture," says Shawn P. McCarthy, research director at IDC Government Insights. "Many are finding that unified threat management solutions are becoming increasingly popular."

Table of Contents

IDC Government Insights Opinion

In This Study

Situation Overview

Recent Trends

The Approach

Monitoring Key Offices

Offices That Focus on IT Security Issues

Offices That Focus on Issues Related to Physical or National Security

Key Security Initiatives

Staffing

IT Security Spending -- The Big Picture

IT Security Spending Versus IT Spending on National Security Solutions

IT Security Views -- By Federal Agency

Department of Defense

Department of Veterans Affairs

Department of Homeland Security

Department of Health and Human Services

Department of the Treasury

Department of Agriculture

Social Security Administration

Department of Energy

Department of Justice

Department of State

Department of Commerce

U.S. Army Corps of Engineers

Department of the Interior

National Aeronautics and Space Administration

Department of Transportation

Department of Education

General Services Administration

Environmental Protection Agency

Department of Labor

Department of Housing and Urban Development

Nuclear Regulatory Commission

Small Business Administration

National Science Foundation

Smaller Agencies

Future Outlook

Essential Guidance

Actions to Consider

For Government Agencies

For Vendors

Learn More

Related Research

Synopsis

Table: Defense Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Veterans Affairs Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Homeland Security Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Health and Human Services Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Treasury Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Agriculture Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Social Security Administration Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Energy Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Justice Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: State Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Commerce Department Top 6 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Army Corps of Engineers Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Interior Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: NASA Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Transportation Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Education Department Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: General Services Administration Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Environmental Protection Agency Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Labor Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Housing and Urban Development Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Nuclear Regulatory Commission Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Small Business Administration Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: National Science Foundation Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Smithsonian Institution Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Agency for International Development Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Office of Personnel Management Top Area of Focus for IT Security Spending, FY12-FY14 ($M)

Table: National Archives and Records Administration Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Federal Government IT Security Spending by Security Solution, 2012-2017 ($M)

Figure: U.S. Federal Budgeted IT Security Spending Share by Agency, 2014

Figure: Spending on Traditional IT Security, FY12-FY14

Figure: National Security Spending on Traditional IT Security, FY12-FY14

Read the full report:
Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook
http://www.reportbuyer.com/countries/north_america/usa/business_strategy_u_s_federal_government_security_spending_forecast_market_outlook.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=NoCategory

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Enterprises have forever faced challenges surrounding the sharing of their intellectual property. Emerging cloud adoption has made it more compelling for enterprises to digitize their content, making them available over a wide variety of devices across the Internet. In his session at 19th Cloud Expo, Santosh Ahuja, Director of Architecture at Impiger Technologies, will introduce various mechanisms provided by cloud service providers today to manage and share digital content in a secure manner....
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.