Cloud-Enabling Technologies Market To Reach $22.6 Billion In 2016

Cloud-Enabling Technologies Market to Reach $22.6 Billion in 2016, According to New 451 Research Study

End Users Remain Focused on Internal Cloud Initiatives

NEW YORK, Sept. 20, 2013 /PRNewswire/ — Market Monitor, a service of 451 Research, projects that the Cloud-Enabling Technologies market revenue will increase at a 21% compound annual growth rate (CAGR) to reach $22.6 billion in 2016.

The recently published Market Monitor Cloud-Enabling Technologies overview report defines Cloud-Enabling Technologies as technologies that are installed, delivered and consumed on-premises. The report examines 143 vendors, segmented into three primary categories – virtualization, security, and automation and management. Cloud-Enabling Technologies, by definition, are not hosted by third parties. A report overview can be viewed here.

Full report highlights include:

  • Virtualization – the foundation of cloud computing – accounts for the majority of total market revenue, with a 66% share. But, as the most mature market segment, it also has the lowest CAGR through 2016 (16%).
  • Automation and Management, a broad category that includes incumbent technologies and cloud platforms, will continue to grow at a healthy 28% CAGR as users move up the stack from first-tier virtualization implementation.
  • At the top of the stack is security, with no single vendor dominating. This sector has the highest CAGR through 2016 at 29%.
  • Since September 2012, there have been 12 significant acquisitions in the CET space. Going forward, we expect to see more of the same as firms look to either bulk up their cloud offerings or make an initial ‘roll of the dice’ in the cloud market.
  • Revenue generated by public firms accounted for 87% of the total, with private firms accounting for the remaining 13%.
  • Public vendors accounted for 21% of the total companies in the CET space, with private vendors accounting for 79%.
  • A smaller percentage of companies are generating less than $5m in revenue than the year before: nearly half of the vendors in 2012 generated less than $5m in revenue (44%), compared with 58% in 2011. Roughly one-third of vendors fall into the midmarket range (defined as $5m-$25m), up from 27% in the midmarket the year before. Only six vendors have revenue (deriving strictly from CET) over $500m.

The drivers of growth are twofold,” said Victoria Simons, Research Analyst, 451 Research. “Initial adoption of the cloud is driven by the need for cost reduction and more efficient computing options. As the infrastructure is virtualized, customers then need tools to manage, control and secure their IT environments to fully realize the benefits of virtual/cloud environments. We see the cloud-enabling technologies market growing strongly as large enterprises and SMBs continue along the path of flexible computing.”

Leveraging 451 Research’s deep insight into established cloud vendors and startups, Market Monitor employs a pure bottom-up approach, with active participation from sector analysts. The resulting forecast incorporates the unique traits, strengths and weaknesses of each market participant, and when used with in-depth qualitative research from 451 Research, Market Monitor provides a holistic view of the cloud computing marketplace. This bottom-up analysis methodology enables 451 Research to provide granular detail at the vendor and individual service level.

About Market Monitor: Cloud-Enabling Technologies

Market Monitor: Cloud-Enabling Technologies is a quantitative research service that tracks and forecasts the size and growth of the rapidly evolving server virtualization and on-premises cloud-enabling technologies marketplace. In addition to forecasting revenues over a five-year horizon, the service breaks out revenue by geographic region, company size and industry verticals. The service tracks revenue generated by server virtualization, automation and management, cloud security, and cloud platforms. The Market Monitor analyst team uses a bottom-up approach to track and project revenue for vendors operating in this marketplace.

About 451 Research 

451 Research, a division of The 451 Group, is focused on the business of enterprise IT innovation. The company’s analysts provide critical and timely insight into the competitive dynamics of innovation in emerging technology segments. Business value is delivered via daily concise and insightful published research, periodic deeper-dive reports, data tools, market-sizing research, analyst advisory, and conferences and events. Clients of the company – at vendor, investor, service-provider and end-user organizations – rely on 451 Research’s insight to support both strategic and tactical decision-making. 451 Research is headquartered in New York, with offices in key locations, including San Francisco, Washington DC, London, Boston, Seattleand Denver.

SOURCE 451 Research

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…