IDC: Security Software Investments Drive Market Growth as CE Organizations Fight to Stay Ahead of Threats

idc-logoIT security investments are growing steadily across all delivery models (software, appliances, and security services), according to a new series of reports published by International Data Corporation (IDC).

The reports track the security solutions markets across the Czech Republic, Hungary, Poland, and Romania, with total investments across the four nations expected to reach $685 million in 2015.

At the heart of this market expansion is the evolution of data-driven organizations that collect, store, and analyze growing amounts of data on citizens and customers, placing them in the role of data custodians, with responsibility for maintaining the security and the privacy of that data.

“IT departments in both public- and private-sector organizations face greater IT security challenges than ever before,” says CEE software research manager Mark Child. “They are called upon to protect the organization against an ever-increasing range of threats, while simultaneously transitioning to 3rd-Platform architectures and acting as service providers and innovation enablers.”

Spending on security services comprises about two-fifths of the market, the vast majority going towards implementation and operational security services. Although large global players are the overall leaders in security services provision, in each country market there are standout local or regional players; systems integrators with security expertise hold significant shares of the implementation services markets, while local telcos show up strongly in operational security services.

A key driver of security services growth is demand from the small and medium-sized business (SMB) segment, with smaller companies looking to external providers to plug gaps in their internal skill sets and free up resources to focus on their core business.

“The constant stream of well-publicized breaches at large organizations serves as a reminder that investments into protection against cyber threats should remain a priority,” Child noted.

(For more information, visit