
{"id":2602,"date":"2013-08-29T00:00:00","date_gmt":"2013-08-29T00:00:00","guid":{"rendered":"http:\/\/otava.test\/2013-global-infosec-spending-to-hit-64-4-billion\/"},"modified":"2013-08-29T00:00:00","modified_gmt":"2013-08-29T00:00:00","slug":"2013-global-infosec-spending-to-hit-64-4-billion","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/","title":{"rendered":"2013 Global InfoSec Spending to Hit $64.4 Billion"},"content":{"rendered":"<p dir=\"ltr\">Global spending on information security is expected to total $64.4 billion this year with an average annual growth rate of 8.7 percent over the next four years, according to Lawrence Pingree, research director at Gartner, as reported by USAToday.com. Information security threats have increased in many industries, including the healthcare, financial, ecommerce and many other industries that handle sensitive personal data.<\/p>\n<p dir=\"ltr\">Most recently, numerous U.S. media outlets were hit by hackers from Syria, including the NYTimes and Twitter this week, and the Financial Times, CNN, Time and the Washington Post last week. Earlier this year, the same hackers hit the Twitter accounts of the Associated Press, causing the stock market to plunge, as reported by the NYTimes.com.<\/p>\n<p dir=\"ltr\">Most of the global spending was on venture capital deals for tech security firms that support cloud security applications that provide cloud <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a>, monitoring, VPNs (Virtual Private Networks), malware protection and more. Security within the cloud is a major concern, but certain built-in technology and enterprise-class infrastructure can provide adequate protection for mission-critical applications and data.<\/p>\n<p dir=\"ltr\">Software-based encryption as an add-on can slow system processes as it uses the same processing resources as other programs, affecting the performance of other system functions. Hardware-based encryption at the drive-level can protect data at rest without affecting system performance. Data is encrypted and decrypted as it is being written to or read from a drive, allowing for minimal disruptions in performance.<\/p>\n<p dir=\"ltr\">So how can you take advantage of hardware-based encryption, a different encryption method than software-based cloud security software offered by vendors? Look for a cloud solution that has built-in security and offers compatible layered security services. An <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encrypted cloud<\/a> can provide protection at the disk level, and additional security like <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">daily log review<\/a>, <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">file integrity monitoring<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">vulnerability scanning<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a> for VPN access can give you the ultimate defense-in-depth solution for scalability and security.<\/p>\n<p>Read more about cloud security in:<br \/>\n<em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/top-5-healthcare-cloud-security-guides\/\">Top 5 Healthcare Cloud Security Guides<\/a><\/strong><\/em><br \/>\nPrivate cloud or public? Encryption \u2013 addressable or a must-have? Cloud for email and document storage, or enterprise-class infrastructure? As HIPAA continues to evolve with the deadline of the final HIPAA omnibus rule coming up (Sept. 23), it\u2019s a good time \u2026\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/top-5-healthcare-cloud-security-guides\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\">Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches<\/a><\/strong><\/em><br \/>\nGartner recently released recommendations for gaining transparency into cloud software as a service (SaaS) contracts \u2013 including emphasis on annual security audits and certification by a third party to verify a cloud vendor\u2019s operating\/product security. Gartner also recommends that contracts \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/securing-regulated-data-with-a-private-cloud-infrastructure\/\">Securing Regulated Data with a Private Cloud Infrastructure<\/a><\/strong><\/em><br \/>\nDr. Larry Ponemon, chairman and founder of the Ponemon Institute described how the shift of the attack surface from the mobile device is moving to unsecure places in the cloud environment with unsecure data, as reported by HealthITSecurity.com. More specifically, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/securing-regulated-data-with-a-private-cloud-infrastructure\/\">Continue reading \u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.nytimes.com\/2013\/08\/28\/business\/media\/hacking-attack-is-suspected-on-times-web-site.html?_r=0\/\">Times Site Is Disrupted in Attack by Hackers<\/a><br \/>\n<a href=\"https:\/\/www.usatoday.com\/story\/cybertruth\/2013\/08\/27\/investors-saturate-cybersecurity-firms-with-cash\/2702279\/\">Investment Capital Floods Cybersecurity Market<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Global spending on information security is expected to total $64.4 billion this year with an average annual growth rate of 8.7 percent over the next four years, according to Lawrence Pingree, research director at Gartner, as reported by USAToday.com. Information security threats have increased in many industries, including the healthcare, financial, ecommerce and many other industries that handle sensitive personal data. Most recently, numerous U.S. media outlets were hit by hackers from Syria, including the NYTimes and Twitter this week, and the Financial Times, CNN, Time and the Washington Post last week. Earlier this year, the same hackers hit the Twitter accounts of the Associated Press, causing the stock market to plunge, as reported by the NYTimes.com. Most of the global spending was on venture capital deals for tech security firms that support cloud security applications that provide cloud encryption, monitoring, VPNs (Virtual Private Networks), malware protection and more. Security within the cloud is a major concern, but certain built-in technology and enterprise-class infrastructure can provide adequate protection for mission-critical applications and data. Software-based encryption as an add-on can slow system processes as it uses the same processing resources as other programs, affecting the performance of other system functions. Hardware-based&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2602","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2013 Global InfoSec Spending to Hit $64.4 Billion | OTAVA<\/title>\n<meta name=\"description\" content=\"Take advantage of a different encryption method than software-based cloud security software offered by vendors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2013 Global InfoSec Spending to Hit $64.4 Billion\" \/>\n<meta property=\"og:description\" content=\"Take advantage of a different encryption method than software-based cloud security software offered by vendors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-29T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"2013 Global InfoSec Spending to Hit $64.4 Billion\",\"datePublished\":\"2013-08-29T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\"},\"wordCount\":489,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\",\"url\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\",\"name\":\"2013 Global InfoSec Spending to Hit $64.4 Billion | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-08-29T00:00:00+00:00\",\"description\":\"Take advantage of a different encryption method than software-based cloud security software offered by vendors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2013 Global InfoSec Spending to Hit $64.4 Billion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2013 Global InfoSec Spending to Hit $64.4 Billion | OTAVA","description":"Take advantage of a different encryption method than software-based cloud security software offered by vendors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/","og_locale":"en_US","og_type":"article","og_title":"2013 Global InfoSec Spending to Hit $64.4 Billion","og_description":"Take advantage of a different encryption method than software-based cloud security software offered by vendors.","og_url":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/","og_site_name":"OTAVA","article_published_time":"2013-08-29T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"2013 Global InfoSec Spending to Hit $64.4 Billion","datePublished":"2013-08-29T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/"},"wordCount":489,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/","url":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/","name":"2013 Global InfoSec Spending to Hit $64.4 Billion | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-08-29T00:00:00+00:00","description":"Take advantage of a different encryption method than software-based cloud security software offered by vendors.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/2013-global-infosec-spending-to-hit-64-4-billion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"2013 Global InfoSec Spending to Hit $64.4 Billion"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2602"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2602\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2602"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}