Source |
AlienVault Lab Blog |
Identifiant |
8619456 |
Date de publication |
2024-12-04 14:00:00 (vue: 2024-12-04 14:07:57) |
Titre |
How Regional Service Providers Can Grab a Larger Share of the Cybersecurity Market |
Texte |
Security leaders continue to be under intense pressure. Increasingly, they are turning toward third parties for support and expertise as their cybersecurity woes become more dire and it becomes harder to recruit and retain talent. This is reflected in the projected growth for cybersecurity services through 20281 (managed security services, managed detection and response, security consulting, and security professional services).
According to Gartner1, end-user spending for all security services will grow from $77.4 billion in 2024 to $116.9 billion in 2028, with a compound annual growth rate (CAGR) of 11.4 percent. Managed detection and response (MDR) is forecasted to be the highest growth area of security services, with a projected 17.1 percent CAGR through 2028. This is in part due to the continued, acute need for support with threat monitoring, detection, and response. However, it’s also due to a growing need for help with risk identification, management and governance, exposure and vulnerability management, and incident readiness due to increasingly stringent requirements by regulators for reporting in these areas.
Let’s compare that to the forecasted growth rate of network security products (a 9.9 percent 5-year CAGR, 2023-28, projected to reach $32.8 billion) and security software spending (a 13.4 percent 5-year CAGR, 2023-28, projected to reach $132.0 billion). What’s the storyline? The desire for help and expertise within security is as critical as the need for security products themselves. And, as the threat landscape grows ever-more formidable, especially with adversaries leveraging new AI tech, that need is likely not going to wane.
With this growing demand, many, many different (and very large) providers have realized the opportunity in security services and are diving into the security services market for their piece of the “cyber money pie.” This includes everyone from software vendors, telecom companies, cloud service providers, IT service providers and traditional IT consulting firms to global MSPs (managed service providers) and MSSPs (managed security service providers). This is creating a very crowded market, and one in which business models are quickly changing so providers can better compete. For example, many organizations now see some of the big consultancies as a “one-stop shop,” for everything from consulting to MDR.
In managed security services, for example, the top 10 MSSPs include (alphabetically): Accenture, Atos, AT&T (LevelBlue), Deloitte, Fortinet, Leidos, HCL Tech, NTT Data, PwC, and Tata Consultancy Services. Together, these providers hold 49 percent of MSS market share worldwide. Extending beyond the top 10 to top the 30 global MSS providers, the total “owned” market share jumps to 88 percent, leaving just 12 percent for the smaller, regional players. The raises several questions. Can the smaller, regional players compete against these big guns? Or, do they have to remain satisfied with fighting over the remaining 12 percent market share globally (which equates to approximately $3.5 million worldwide for MSS in 2025). Is it possible for smaller players to take a portion of the $26 million projected 2025 market share from the top 30?
How can smaller, regional players win the security service game?
Yes, smaller, regional service providers are going to be the most challenged as the services market continues its rapid evolution, especially as they try to keep up with technology changes, AI’s impact on service delivery, cyber skills shortages, and more. However, they also have an advantage, including the ability to:
Specialize in industry or specific tech environments such as OT, cloud, or edge
Provide regional context (including culture and language support)
Partner with the larger players who can’t be everything to everyone
This is wh |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
$116 $132 $26 $32 $77 “alarms “cyber “do “one this whether 2022 2023 2024 2024: 2025 2028 20281 3q24 ability accenture accomplish according acute addition additional advantage advantages adversaries advisor against ai’s alien all alphabetically also analysis analysis: analysts annual anyone anywhere approximately are area areas asking at&t atos augment augmenting become becomes beginning best better beyond big bigger biggest billion brands bring brings build building bundled business but buy cagr call can can’t capital capture challenged changes changing channel choosing classic cloud coat comes companies compare compelling compete complexity complicated comply component compound comprehensive consider consultancies consultancy consulting context continue continued continues continuing contracts cost could country creating credentials critical crowded culture customer customers cyber cybersecurity data deal decades deliver delivery deloitte demand desire detection determine development different difficult dire directives discounted diving done dora due easy edge effective end endpoint energy enough ensuring environments equates especially established european even ever everyone everyone everything evolution evolving example existing expand expanded expanding expect experience expertise experts exposure extending extensible fast faster fastest fence” fighting firms flexible forecast: forecasted forget formerly formidable fortinet from future game gartner gartner1 get getting giving global globally going good govern governance grab grow growing grows growth guns hand harder has have having hcl heavy help high higher highest highly hitters hold house how however hunters identification identify impact important improve incident incidents include includes including increasingly indirect industry inform information integrations intelligence intense internal investment isn’t it’s its jumps just keep key labs landscape language large larger last leaders leading learnings leaving leidos less let’s levelblue levelblue’s leveraging life likely looking maintain managed management many margins market marketing material mdr mean means measures meet metrics million mitigate mitigation model models money monitoring more most msps mss mssp mssps multiple must nearly need network new nis2 not now ntt offers often ole’ one only operational operations opportunities opportunity organizations other out over own pace paired part parties partner partnering partners partnerships path people percent pie piece plain platform platforms player players portion possible posture practices pressure preventative pricing proactive processes products professional projected pros protection provide provider providers pwc questions quickly raises rapid rate raucous reach reactive readiness realized reasons recovery recruit reduce reflected refocus refresh regional regulations regulators regulatory relationships remain remaining reporting require requirements requires research resell reseller resellers response retain rethink risk risks roll rolled satisfied saturated sec security see seeking segment selling sentinelone service services set several share shop shortages should significant simply single skills small smaller soc software some someone sophisticated specialize specific speed spending stop storyline stringent stronger struggling such suite support survive tactical tails take taking talent tata teams tech technology telecom ten terms than them themselves these think third those threat three thrive through thrown time to: today together too top total toward track traditional trust trusted try turning under understanding union updates upon user using usm vendors very vulnerability wane want ways we’re well what’s when which who why will win within woes worked working worldwide year years yield your |
Tags |
Vulnerability
Threat
Industrial
Cloud
|
Stories |
Deloitte
|
Move |
|