Welcome!

News Feed Item

Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook

LONDON, April 7, 2014 /PRNewswire/ -- Reportbuyer.com has added a new market research report:

Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook

This IDC Government Insights report offers a U.S. federal IT security forecast through 2017 plus breakouts, by agency, of the major IT security initiatives currently underway. It also looks at how IT security elements within government offices can be significantly different than what is seen in other industries -- because of the need for physical and national security. Federal IT security spending continues to climb, increasing at an anticipated 3-6% each year through 2017.

"At this time, many agencies are reviewing how their move to cloud-based solutions might affect their overall IT security posture," says Shawn P. McCarthy, research director at IDC Government Insights. "Many are finding that unified threat management solutions are becoming increasingly popular."

Table of Contents

IDC Government Insights Opinion

In This Study

Situation Overview

Recent Trends

The Approach

Monitoring Key Offices

Offices That Focus on IT Security Issues

Offices That Focus on Issues Related to Physical or National Security

Key Security Initiatives

Staffing

IT Security Spending -- The Big Picture

IT Security Spending Versus IT Spending on National Security Solutions

IT Security Views -- By Federal Agency

Department of Defense

Department of Veterans Affairs

Department of Homeland Security

Department of Health and Human Services

Department of the Treasury

Department of Agriculture

Social Security Administration

Department of Energy

Department of Justice

Department of State

Department of Commerce

U.S. Army Corps of Engineers

Department of the Interior

National Aeronautics and Space Administration

Department of Transportation

Department of Education

General Services Administration

Environmental Protection Agency

Department of Labor

Department of Housing and Urban Development

Nuclear Regulatory Commission

Small Business Administration

National Science Foundation

Smaller Agencies

Future Outlook

Essential Guidance

Actions to Consider

For Government Agencies

For Vendors

Learn More

Related Research

Synopsis

Table: Defense Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Veterans Affairs Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Homeland Security Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Health and Human Services Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Treasury Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Agriculture Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Social Security Administration Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Energy Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Justice Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: State Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Commerce Department Top 6 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Army Corps of Engineers Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Interior Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: NASA Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Transportation Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Education Department Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: General Services Administration Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Environmental Protection Agency Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Labor Department Top 5 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Department of Housing and Urban Development Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Nuclear Regulatory Commission Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Small Business Administration Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: National Science Foundation Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Smithsonian Institution Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Agency for International Development Top 4 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: Office of Personnel Management Top Area of Focus for IT Security Spending, FY12-FY14 ($M)

Table: National Archives and Records Administration Top 2 Areas of Focus for IT Security Spending, FY12-FY14 ($M)

Table: U.S. Federal Government IT Security Spending by Security Solution, 2012-2017 ($M)

Figure: U.S. Federal Budgeted IT Security Spending Share by Agency, 2014

Figure: Spending on Traditional IT Security, FY12-FY14

Figure: National Security Spending on Traditional IT Security, FY12-FY14

Read the full report:
Business Strategy: U.S. Federal Government IT Security Spending Forecast and Market Outlook
http://www.reportbuyer.com/countries/north_america/usa/business_strategy_u_s_federal_government_security_spending_forecast_market_outlook.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=NoCategory

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...