The rise in deployment of technologies to improve overall security of companies will drive the global security technology and services market to $67.2bn in 2013, up 8.7% year-over-year, according to a new report from Gartner.
Gartner research director Ruggero Contu revealed that with security being one of the top IT concern areas, the prospect of strong continued growth is assured.
"The consistent increases in the complexity and volume of targeted attacks, coupled with the necessity of companies to address regulatory or compliance-related issues continue to support healthy security market growth," Contu said.
The research firm considers mobile security, big data and advanced targeted attacks as the three major trends influencing the security market.
Bring your own device (BYOD) is considered to be highly responsible for influencing the overall security industry.
Gartner research director Eric Ahlm said: "To support the growing need for security analytics, changes in information security people, technologies, integration methods and processes will be required, including security data warehousing and analytics capabilities, and an emerging role for security data analysts within leading-edge enterprise information security organisations."
Over the next five years, the amount of data required for information security to efficiently identify advanced attacks and, simultaneously, support new business initiatives, will grow rapidly.
Gartner research director Lawrence Pingree said that mitigating the threat from advanced targeted attacks (ATA) requires a defence-in-depth strategy across multiple security controls.
"Enterprises should employ a defence-in-depth, layered approach model," Pingree said.
"Organisations must continue to set the security bar higher, reaching beyond many of the existing security and compliance mandates in order to either prevent or detect these newly emergent attacks and persistent penetration strategies.
"This layered approach is typical of many enterprise organisations and is often managed in independent ways to accomplish stated security goals, namely, detect, prevent, respond and eliminate."