Cloud Security Authors: Elizabeth White, Maria C. Horton, Liz McMillan, Ravi Rajamiyer, Pat Romanski

Related Topics: Government Cloud

News Feed Item

Federal Civilian Cyber Security Spending to Grow 27 Percent by FY 2009

Nearly Failing Security Ratings and Continued Homeland Security Concerns Cause Dramatic Increase in Security Expenditures

RESTON, Va., March 16 /PRNewswire/ -- Civilian cyber security-related IT spending is anticipated to grow 27 percent over the next five years due to poor security assessment ratings and increased attention on homeland security, according to the latest INPUT/Output(R) report released today by INPUT, the quantifiable leader in government market intelligence. Although cyber security spending grew modestly prior to September 11, 2001, terrorist attacks changed the focus of IT spending from development and modernization to advanced infrastructure security, initially causing rapid growth in spending over the past three years.

"The effects of 9/11 have changed the way federal agencies approach cyber security," said Marcus Fedeli, manager of federal opportunity products at INPUT. "Continued fear over potential terrorist attacks has caused an almost desperate need for improvement of current standards and levels of security. New requirements will cause civilian IT security spending to grow steadily this year."

The Office of Management and Budget (OMB) set forth cyber security standards in the Federal Security Management Act (FISMA) of 2002, encouraging federal agencies to further secure their IT systems. According to the recent FISMA Report Card released in February 2005, government agencies are still not operating in a secure environment and have earned a nearly failing overall rating of D+. Recent findings outlined the current limitations and shortcomings of current cyber security technologies, which include insecure VPN connections, faulty firewall protection and the need for customized solutions. These vulnerabilities open IT systems to potential fraud, sabotage, and destruction.

Planned IT security spending for civilian agencies for FY 2005 is roughly $1.6 billion, accounting for roughly 17 percent of the total civilian agencies' development/modernization/enhancement (DME) budget for the year. Top civilian agency spenders include the departments of Homeland Security, Health and Human Services, Energy, and Transportation.

"As demonstrated by the current security evaluation, there are still important advancements to be made in the area of cyber security, particularly within federal civilian agencies," added Fedeli. "We expect to see these agencies rely heavily on outside contractors to provide the products and services necessary to secure IT systems government-wide. The need to satisfy legislative mandates will create opportunities for technology vendors to work in the public sector."

INPUT's complete Cyber Security Market INPUT/Output(R) report is available to clients of INPUT's Information Services subscription program. For more information on the subscription program, visit http://info.input.com/ or call 703-707-3500.

About INPUT:

INPUT is the quantifiable leader in government market intelligence. Established in 1974 and based in Reston, Virginia, INPUT provides information services, industry analysis, consulting, software solutions, and events to help technology vendors win more government business, and to help government organizations further advance their IT initiatives. INPUT tracks more than a half trillion dollars in contract and grant opportunities within the US federal, state & local government markets, as well as tender opportunities throughout the European Union. INPUT has built a solid reputation for high quality and in-depth government industry insight and analysis with over 1,000 clients, including 80 of the top 100 IT contractors. Leading defense, hardware, software, telecommunications and IT services contractors, plus 4 of the top 5 8(a)s, rely on INPUT to help them win more than $45 billion in government business each year. For more information about INPUT, visit http://www.input.com/ or call 703-707-3500.

Proper use of name is INPUT

CONTACT: Lara Sedar of INPUT, +1-703-707-3672, or [email protected].


CONTACT: Lara Sedar of INPUT, +1-703-707-3672, or [email protected]

Web site: http://www.input.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...