Despite a considerable hardening of Federal cyber defenses undertaken in the last decade, vulnerabilities do exist and need to be promptly addressed, especially those of legacy IT systems and access control loopholes. Cybersecurity remains a central concern of the U.S. government and by all signs it will stay one of the most imperative government priorities for years to come. Significant funds and efforts will be required to mitigate the ever increasing intensity of cyberattacks, address vulnerabilities and harden up critical infrastructure.
The U.S. Federal cybersecurity market is expected to stay firmly in the $20 Billion Plus territory, with infrastructure hardening segment to grow up at a steady Compound Annual Growth Rate (CAGR) of 12%. The market is somewhat flattening after the period of fast growth, albeit not dramatically. The relatively modest growth rate of the U.S Federal cybersecurity market as a whole is not reflective of more intense internal dynamics of the market segments. Technologies change and high growth opportunities are still there.
It’s not about IT security anymore. When it comes to government networks, it becomes a matter of national security. Enough to say that the annual cyber security spending of the US Federal government is larger than entire national cyber security spending of the most countries in the world. The U.S. government sector is under constant pressure to boost investments in cyber security technologies. The short- to long-term federal cyber security investments will be driven:
- by ever-increasing number and severity of cyber attacks,
- by dramatic expansion in computer interconnectivity and the exponential increase in the data flows and computing power of the government networks;
- by perception of the U.S. adversaries that the United States is dependent on information technology and that this dependency constitutes an exploitable weakness;
- by developments in the existing cyber security approaches and technologies and emergence of new technologies and approaches.
- by growing costs of cybersecurity. It’s time for more cost-effective technologies – increasing costs for intruder without significantly increasing costs of defense. Moving target and decoy networks are the technologies that fill the gap.
- by two conflicting trends in planning and upgrading the cybersecurity infrastructure of the federal IT systems – built-in vs. bolt-on approach, centralized integrated approach vs. point solutions.
Providing cyber security to ever growing and increasingly complicated government IT domain becomes a costly challenge for the government and lucrative opportunity for the cyber security technology vendors.
This new quantitative report provides forecasts for the following U.S. Government market segments::
- Federal agencies (agency-by-agency, defense/civilian/intelligence);
- Federal cyber security market by software, hardware and services: 8 segments;
- Federal cyber security market by investment type: (National Security Systems, Mission Area Support, Infrastructure/Office Automation/Telecommunications, Enterprise Architecture and Planning, Grants to State and Local IT investments);
- Cybersecurity market segments by investment type (National Security Systems, Mission Area Support, Infrastructure/Office Automation/Telecommunications, and two more segments);
- Federal cyber security market by technologies: 12 segments.
The report answers the following questions:
- Why pay any attention at all to the U.S. Government Cyber Security market?
- What segments of the U.S. Government Cyber Security market are poised for fast growth?
- What are the largest segments of the U.S. Government Cyber Security?
- What are key trends in Cyber Security technology deployment?
- What are market opportunities in providing Cyber Security solutions for the Government sector?
- What is the market hierarchy in the complicated web of the Federal Cyber Security market?
- What are the priorities of the government investment in cyber security R&D?
- Where is the money in the U.S. Federal Cyber Security market?
- How can the small cyber security technology vendors benefit from developments in U.S. Federal Cyber Security market?
The report covers the cyber security products, technologies and services for U.S. Government market, including security of government IT networks, cyber security and cyber warfare tools and systems, surveillance and monitoring capabilities of national security agencies.
Table of Contents
1. Market Report Scope & Methodology
1.1. Scope
1.2. Research Methodology
2. Executive Summary
2.1. Making Case for Booming U.S. Government Cyber Security Market
2.1.1. Nation-State Confrontation
2.1.2. Government Data Overflow
2.1.3. Government-Industry Cooperation: Paradigm Shift
2.1.4. Comprehensive National Cybersecurity Initiative (CNCI) and Market Opportunities
2.2. Cyber Threats
2.3. Cyber Security Technologies
2.3.1. Access Control Technologies
2.3.2. System Integrity Technologies
2.3.3. Cryptography Technologies
2.3.4. Audit and Monitoring Technologies
2.3.5. Configuration Management and Assurance Technologies
2.3.6. Cyber Warfare
2.3.7. Deep Packet Inspection (DPI)
2.3.8. Moving Target Defense
2.3.9. Threat Intelligence & Sharing Management
2.3.10. Big Data/Log Analysis, M2M, AI
2.3.11. Deception (Decoy/Honepot) Networks
2.3.12. Endpoint Security Management
2.3.13. Infrastructure Hardening
2.4. U.S. Federal Cyber Security Market: R&D Challenges and Opportunities
2.4.1. Cyber Security: Hard R&D Challenges and Big Market Opportunities
2.4.2. Scalable Trustworthy Systems: R&D Challenges and Market Opportunities
2.4.3. Enterprise-Level Metrics (ELMs): R&D Challenges & Market Opportunities
2.4.4. System Evaluation Life Cycle: R&D Challenges & Market Opportunities
2.4.5. Combatting Insider Threats: R&D Challenges & Market Opportunities
2.4.6. Combatting Malware and Botnets: R&D Challenges & Market Opportunities
2.4.7. Global-Scale Identity Management: R&D Challenges & Market Opportunities
2.4.8. Survivability of Time-Critical Systems: R&D Challenges & Market Opportunities
2.4.9. Situational Understanding and Attack Attribution: R&D Challenges & Market Opportunities
2.4.10. Provenance: R&D Challenges & Market Opportunities
2.4.11. Privacy-Aware Security: R&D Challenges & Market Opportunities
2.4.12. Usable Security: R&D Challenges & Market Opportunities
2.5. Built-in vs. Bolt-on Solutions: SOC, UTM and Firewalls
2.6. What is the competitive landscape of the U.S. Federal Cyber Security market?
2.6.1. U.S. Federal Government Cyber Security Agencies and Organizations
2.6.2. Federal Cyber Security Contractors
2.7. Key Report Findings
2.8. U.S. Federal Cybersecurity Market Forecast
2.8.1. Department of Defense: Cybersecurity Market Forecast
2.8.2. Civilian Agencies: Cybersecurity Market Forecast
2.8.3. Intelligence Community: Cybersecurity Market Forecast
2.8.4. U.S. Federal Cybersecurity Market by Defense, Civilian and Intelligence Agencies
2.8.5. U.S. Federal Cybersecurity Market by Investment Type
2.8.6. U.S. Federal Cybersecurity Market by Software, Hardware and Services
2.8.7. U.S. Federal Cybersecurity Market by Technologies
List of Figures
Fig. 1- Information Sharing Architecture
Fig. 2- Usable Security Domain
Fig. 3- Security Operations Center (SOC) Components
Fig. 4- Competitive Landscape of the U.S. Federal Cyber Security Market
Fig. 5- U.S. Federal Cyber Security Market Hierarchy
Fig. 6- U.S. Federal Cybersecurity Market Forecast, $Mln
Fig. 7- Department of Defense: Cybersecurity Market by Agency, $Mln
Fig. 8- Cumulative DoD Cybersecurity Spending by Agency, %
Fig. 9- Top Ten Civilian Agencies by Cybersecurity Market Size, $Mln
Fig. 10- Intelligence Community: Cybersecurity Market Forecast, $Mln
Fig. 11- U.S. Federal Cumulative Cybersecurity Market by Investment Type, %
Fig. 12- U.S. Federal Cumulative Cybersecurity Market by Investment Type, $Mln
Fig. 13- U.S. Federal Cybersecurity Market by Software, Hardware and Services, $Mln
Fig. 14- Cumulative U.S. Federal Cybersecurity Market by Software, Hardware and Services, %
Fig. 15- Threat Intelligence & Sharing Mananagement: U.S. Federal Cyber Security Market, $Mln
Fig. 16- Cyber Warfare: U.S. Federal Cyber Security Market, $Mln
Fig. 17- Access Controls: U.S. Federal Cyber Security Market, $Mln
Fig. 18- System Integrity Controls: U.S. Federal Cyber Security Market, $Mln
Fig. 19- Cryptography Controls: U.S. Federal Cyber Security Market, $Mln
Fig. 20- Audit & Monitoring Controls: U.S. Federal Cyber Security Market, $Mln
Fig. 21- Configuration Management & Assurance Controls: U.S. Federal Cyber Security Market, $Mln
Fig. 22- Endpoint Security Management: U.S. Federal Cyber Security Market, $Mln
Fig. 23- Moving Target Defense: U.S. Federal Cyber Security Market, $Mln
Fig. 24- Deception (Decoy/Honepot) Networks: U.S. Federal Cyber Security Market, $Mln
Fig. 25- Big Data/Log Analysis, M2M, AI: U.S. Federal Cyber Security Market, $Mln
Fig. 26- Deep Packet Inspection (DPI): U.S. Federal Cyber Security Market, $Mln
List of Tables
Table 1 – Structure of the U.S. Government-related IP Traffic
Table 2 – CNCI Projects, Market Opportunities and Lead Agencies
Table 3 – Sources of Cyber Threats
Table 4 – Types and Techniques of Cyber Attacks
Table 5 – Access Control Technologies
Table 6 – System Integrity Technologies
Table 7 – Cryptography Technologies
Table 8 – Audit and Monitoring Technologies
Table 9 – Configuration Management and Assurance Technologies
Table 11 – Technology Readiness Levels
Table 12 – U.S. Federal Cyber Security Market: R&D Challenges & Market Opportunities
Table 13 – Scalable Trustworthy Systems: R&D Challenges and Market Opportunities
Table 14 – Enterprise-Level Metrics (ELMs): R&D Challenges & Market Opportunities
Table 15 – System Evaluation Life Cycle: R&D Challenges & Market Opportunities
Table 16 – Combatting Insider Threats: R&D Challenges & Market Opportunities
Table 17 – Combatting Malware and Botnets: R&D Challenges & Market Opportunities
Table 18 – Global-Scale Identity Management: R&D Challenges & Market Opportunities
Table 19 – Survivability of Time-Critical Systems: R&D Challenges & Market Opportunities
Table 20 – Situational Understanding and Attack Attribution: R&D Challenges & Market Opportunities
Table 21 – Provenance: R&D Challenges & Market Opportunities
Table 22 – Privacy-Aware Security: R&D Challenges & Market Opportunities
Table 23 – Usable Security: R&D Challenges & Market Opportunities
Table 24 – U.S. Federal Cybersecurity Market Forecast, $Mln
Table 25 – Department of Defense: Cybersecurity Market by Agency, $Mln
Table 26 – Civilian Agencies: Cybersecurity Market by Agency, $Mln
Table 27 – Intelligence Community: Cybersecurity Market Forecast, $Mln
Table 28 – Major Intelligence Agencies: Cybersecurity Market by Agency, $Mln
Table 29 – U.S. Federal Cybersecurity Market by Defense and Civilian Agencies, $Mln
Table 30 – U.S. Federal Cybersecurity Market by Software, Hardware and Services, $Mln
Table 31 – U.S. Federal Cyber Security Market by Technologies, $Mln
Table 32 – SOC, UTM and Firewalls: U.S. Federal Cyber Security Market, $Bln