Official Statistics

UK security export statistics 2024: quality and methodology report

Published 16 December 2025

1. Introduction

This report outlines the methodology, revision policy and data quality information relevant to the security export statistics. These annual statistics are designated as Official Statistics under the Statistics and Registration Act 2007.

Its aim is to support users to understand the strengths and limitations of these statistics and reduce the risk of misusing data. This statistical report includes details about the Department for Business and Trade’s (DBT’s) compliance with the quality principles as stated in the Code of Practice for Statistics.

2. Methodology

2.1 Overview  

The UK security export statistics is an annual publication that presents figures on UK security exports from 2016 to 2024. The publication also includes global estimates of security exports, but as the methodology is different to that used to estimate UK exports, the UK and global export figures are not comparable with one another.

Security export figures are collected by Westlands Advisory (WA), on behalf of DBT. To calculate the UK export statistics, WA conducts a thorough analysis of the UK security industry export performance using Companies House data and primary research with industry partners. To calculate the global export statistics, WA used global export datasets published by the World Bank to estimate global exports.

3. Identifying a security export

For the purposes of this release, a physical or cyber security export is defined as: For the purposes of this release, a physical/cyber security export is defined as any sale of physical security/cyber technology or services:

  • from a UK-registered organisation, except sales to defence organisations (Ministry of Defence, US Department of Defense) as these have been classified as a ‘Defence Export’

  • accounted to the UK office – if a UK company makes a sale from an office registered in another country and reports the revenues within that country, this will not be counted as a UK export, as the revenues have not been attributed to the UK

  • from joint ventures – only the UK value-added part of the venture is counted

3.1 UK security exports methodology

To calculate the export statistics, WA conducted a thorough analysis of the UK security industry export performance using secondary data sources and primary research. WA developed a structured database of physical and cyber security companies registered in the UK that provides the cornerstone and evidence of security export performance. The approach for determining figures for physical and cyber security exports was the same. The only difference was tagging by segmentation and sectors, as set out in the terms and definitions section. WA’s methodological approach is summarised in the following sections.

3.2 UK exports data collection

WA collected both primary and secondary research to form the statistics. For secondary research, WA completed a comprehensive analysis of Companies House to capture all registered security companies. WA engaged other sources that hold information on security companies to ensure that a full representation of the UK industrial base was captured. These included:

WA also launched an online survey that was sent out through trade associations and security mailing lists to identify potential security exporting companies. Responses providing exact figures was low. This is due to multiple reasons including confidentiality, financial reporting cycles, accounting difficulties, or companies not wanting to release export information.

WA attended major UK security trade shows that fell within the contract start date. These included:

Engagement with WA at the shows was positive. Including the online survey, over 170 companies engaged in conversations and provided qualitative and quantitative information about export performance. This was all captured and used throughout the analysis.

3.3 Global security exports methodology overview

WA followed a similar methodology as used to calculate the UK export statistics but used global export data sets published by the World Bank.[footnote 1] More details on WA’s methodological approach to global exports can be found in following sections.

WA collected published export data from the World Bank. This included exports of Goods and Services, High Technology Exports and Exports as a percentage of GDP.

In addition, WA used internal data sets that track the financial performance of over 4,000 of the largest physical and cyber security companies around the world.

4. Data quality

This section provides a range of information that describes the quality of the outputs and their reliability. Quality is measured in terms of the dimensions of the European Statistical System.

4.1 Relevance

Data and information relating to UK security exports are fundamental to understanding trends in the security export market. A review and user engagement exercise was conducted over summer 2024 by DBT to get feedback on the statistics.

These statistics are particularly relevant for:

UK public

The publication of the statistics helps to hold the government accountable to the taxpayer while informing them how investment is helping drive UK security exports

UK government

The publication of the statistics helps to:

  • identify the security market’s strength and weaknesses relative to other countries
  • inform policy and funding initiatives to facilitate greater growth of the UK security industry

Security industry and trade organisations

The statistics provide information on:

  • where UK companies are having most success
  • which technologies are in demand
  • how the market is likely to change in the future.

They deliver insights to industry, helping to inform business and technology strategy, as well as prioritising export opportunities

4.2. Accuracy and reliability

4.2.1 UK Exports

All data collected for the UK security export estimates was collated and stored in a database of over 2,300 security companies registered in the UK. WA collated all financial data that was reported for the years 2020, 2021, 2022, 2023 and 2024. This included company revenues and reported export revenue.

Data was sourced and tagged in line with DBT physical and cyber security sectors, technology segments and regions. To ensure a transparent process, all data was tagged high, medium and low in confidence:

  • high – sourced and company reported information

  • medium – no official source or company report, but based on our analysis there is a strong confidence in the data

  • low – limited sourced information available with assumptions based on industry benchmarks and comparable to similar organisations.

The following tables demonstrate the level of confidence of information and sources overall and the confidence of information and sources by technology segment.

Table 1: Data confidence – overall percentage of total

Confidence Percentage of total (%)
High 76
Medium 19
Low 5

Table 2: Data confidence – percentage of technology segment

Technology segment high (%) medium (%) low (%)
Access control and identity 69 12 19
Command and control 70 12 18
Communications 68 12 20
Cyber security 66 12 22
Data and analytics 68 12 20
Fire equipment 68 12 20
Managed services 70 12 18
Disaster management 69 12 19
Risk services and protection 69 12 19
Screening and Detection 69 12 19
Surveillance 68 12 20
Vehicles 70 12 18
Personal protective equipment 68 12 20

Table 3:Data confidence – percentage of destination region

Destination region high (%) medium (%) low (%)
Africa 33 18 48
Asia Pacific 16 17 66
Central Asia No data 33 67
Europe 19 19 63
Latin America 13 27 60
Middle East 9 27 64
North America 25 21 55
Rest of World No data No data No data

Notes:

  1. No data was available for Central Asia marked as high confidence, and no data was reported for Rest of the World.

  2. Percentages may not sum to 100 due to rounding.

4.2.2 Global exports

The World Bank ensures the highest quality of its data and products by adhering to internationally accepted standards, methodologies, sources, definitions, and classifications. This commitment is reflected in their use of:

  • General Data Dissemination System GDDS: developed by the International Monetary Fund (IMF) and World Bank, this framework enhances the quality and dissemination of national statistics, guiding countries in the public release of comprehensive, timely, and reliable data

  • Data Quality Assessment Framework (DQAF): an IMF and World Bank methodology that assesses data quality by incorporating best practices and international standards, providing a comprehensive view of data quality and its interrelations

4.3 Timeliness and punctuality

This is an annual publication, with the 2024 publication covering the calendar year from January 2024 to December 2024. Reports from Companies House that provide most of the information for UK security exports cover 2023.

4.4 Accessibility and clarity

In line with the government accessibility requirements, the UK security export statistics are provided in the HyperText Markup Language (HTML) which follows the AA accessibility standards for GOV.UK publications.  In this HTML web page, we provide a narrative and charts that can easily be toggled between a table and chart where appropriate. Where there are images in the methodology note, we have commented on this throughout the report to cover this information.

DBT continues to review the accessibility of these statistics prior to each publication, ensuring it adheres to the government accessibility requirements. This release is also reviewed by the DBT Digital Team. For further information or additional requests, refer to the Contact section in the statistical publication. 

4.5 Coherence and comparability

4.5.1 Comparability over time


These statistics should be interpreted with caution as they are not directly comparable across years due to changes in contractors and methodologies. Prices are presented in nominal terms and are not adjusted for inflation, which further limits trend analysis. 

4.5.2 Comparability between UK security exports and global exports


The UK and global security export figures are not directly comparable because different methodologies were used. WA used World Bank data and internal financial records from over 4,000 global physical and cyber security firms to estimate worldwide exports. In contrast, UK export data was derived from comprehensive primary and secondary research, including sources such as Companies House, industry associations (for example RISC, BSIA, TechUK), trade shows, web scraping, and an online survey. These distinct approaches resulted in 2 separate datasets.

4.5.3 Comparability between UK security exports and other trade statistics


UK security exports statistics are not directly comparable with other trade statistics as they are taken on a basis of revenues reported rather than movement of goods. Movement of goods and balance of payments are the basis of goods exports statistics produced by HMRC and the Office for National Statistics (ONS). In addition to different data collection methods, HMRC and ONS trade statistics rely on commodity codes derived from the UK Tariff classification (for example Harmonised System), whereas the DBT Security Exports statistics use a classification system defined by market segmentation and security sectors.

5. Data analysis

5.1 UK exports

Once the input of available data was complete, a thorough review of the sourced data was conducted. Due to the nature of the security market, confidentiality of information and company reporting timelines, not all required information is reported or available. For information that was not accessible, WA created assumptions to calculate the uncaptured exports that were not reported.

The process for this included the following steps:

  1. An analysis was completed on each technology segment. This was based on our industry experience, information gathered through the survey and interview process and working knowledge of UK security companies. This included analysis of the size of companies, number of employees, estimated revenues and office locations.

  2. WA assessed the number of companies tagged in the segment, and which ones had reported numbers and which ones had not.

  3. Based on our knowledge of the size and scale of the companies that had not reported, WA created an assumption of how much of the export market had been captured to estimate the uncaptured market.

Example technology sector: screening and detection
There are over 40 companies who offer screening and detection products and services in the UK. However the majority of the market revenue is from 5 companies. Based on the customer profiles and size of market, we can be confident that when these 5 companies have reported they have accounted for over 95% of the market. The uncaptured exports can then be calculated based on this assessment.

At a total market level, over 470 companies report security export figures. When all these companies have reported, WA has assessed that they capture 89% of total exports. The remaining 11% of exports are made up from small companies that do not report export figures and from large multinational companies who are not pure play security companies and do not report specific UK export figures. At the time of reporting, 71% of 2024 export revenues have been reported. Regional analysis was based on the sourced data that included tagging by regional export sales. These figures were applied to the total export market.

5.2. Global exports

For the estimates of global security exports, an assessment of all countries was completed to understand their security exports using the following parameters:

  1. Assessment of a country’s security industrial base – this was developed based on their strengths and weaknesses of developing, selling and implementing security products and services across technology segments. This included consideration of the major domestic security suppliers, relative size and reputation within the global security market.

  2. Security export base – this was an assessment of countries being used as a strategic base for security companies to set up offices to export their products and solutions to other countries, rather than exporting from their headquarters. This is to ensure that the exports are comparable to the UK, where the industrial base has a number of companies that are headquartered outside of the UK but have registered offices and report large security exports from the UK.

  3. Analysis of export reach – this was an assessment of overall export performance and specific ability to export security products based on trading partners, geopolitical alliances, and economic environments.

Based on the profile of each country, an estimate of the percentage of the total goods and services exported that was security products was assigned. The percentage was assigned to the World Bank 2024 data for total exports of goods and services by country.

5.3 Output and validation

5.3.1 UK exports

After input and analysis were completed, outputs of exports were developed by region, technology and sectors. Throughout the whole project, a robust review and quality assurance process was in place to ensure that data, assumptions, and outputs were transparent, reliable and defendable. Internal quality assurance meetings were completed weekly to review the status of project progress and quality of data and analysis. The methodology, analysis and assumptions were presented to DBT for feedback and approval at key project milestones.

Before final delivery, WA conducted an internal workshop to review data, analysis and outputs which involved sense checking information against security industry benchmarks, historical data, WA global data sets and other published government data sources. Following the delivery, DBT analysts performed a comprehensive sense check against historical data. This process aimed to investigate the distribution of key variables and identify any potential outliers. Additionally, the analysts conducted further checks to ensure the consistency of labelling across both categories and subcategories.

5.3.2 Global exports

For global exports, once all analysis and calculations were complete, the output gave estimated security exports by country. This was then validated against benchmarks including the total security market, internal security market dynamics and review of the performance of major security companies within each of the countries.

6. Terms and definitions

This section outlines the segmentation and definitions for physical and cyber security technology, solutions and services that have been used throughout this report and the statistical publication. Abbreviations used throughout this report and the statistical publication are also covered.

6.1 Physical security

Technology segmentation Description
Access control and identity management access control and identity management including cards, keypads, biometrics, door locks, bolts, physical barriers and area protection, perimeter fencing and counter-IED infrastructure
Command and control command and control including information technology, computer-aided dispatch, physical security information management, geographical information systems, public service answering points, managed services and integration
Communications communications including radio equipment, fibre optic and satellite equipment, network solutions and integration
Data analytics data analytics including storage, big data solutions and data intelligence
Risk services risk services including advisory and analysis, maritime protection, VIP protection and anti-theft systems
Detection technologies detection technologies for the screening of baggage, vehicles and people from hand-held devices to large sensor arrays
Surveillance surveillance including cameras, drone systems, CCTV systems, storage, analytics, networks, novel technologies for locating and identifying unmanned aerial vehicles and passive and active radar systems
Vehicles vehicles including sirens and blue light services, fixed wing and rotary aircraft
Personal Protective Equipment (PPE) personal protective equipment including shields, vests and CBRN suits
Fire equipment fire equipment including active fire protection (detection and alarm systems, sprinklers, mists and inert gas systems), passive fire protection (structural fire protection, fire stopping and fire doors) and fire and rescue (appliances, hoses, uniforms and breathing apparatus)
Managed services managed services including manned guarding, total security solutions, security as a service
Crisis management provision of products and services in support of humanitarian aid and disaster relief efforts

6.2 Cyber security

Segmentation Description
Training awareness, training, and education – products or services in relation to cyber awareness, training or education
Professional services cyber professional services – providing trusted contractors or consultants to advise on, or implement, cyber security products, solutions, or services for others
Endpoint and mobile security endpoint and mobile security – hardware or software that protects devices when accessing networks (EDR / XDR)
IAM identification, authentication, and access controls – products or services that control user access, for example with passwords, biometrics, or multi-factor authentication
Incident response management (MSS, monitoring) incident response and management – helping other organisations react, respond, or recover from cyber-attacks
Information risk management (Data Security, DLP) information risk assessment and management – products or services that support other organisations to manage cyber risks, for example around security compliance or data leakage
Internet of Things (IoT) products or services to embed or retrofit security for Internet of Things devices or networks
Network Security network security – hardware or software designed to protect the usability and integrity of a network (NGFW, IPS/IPD, ATP)
SCADA SCADA and Information Control Systems – cyber security specifically for industrial control systems, critical national infrastructure, and operational technologies
Threat intelligence (Security Operations and Incident Response – Technology) threat intelligence, monitoring, detection, and analysis – monitoring or detection of varying forms of threats to networks and systems
Application security products and solutions to protect applications including web application firewalls, bot management, DDoS mitigation, code protection and application shielding, application security testing
Cloud security tools to protect data, policy and configuration management in the cloud including Cloud Access Security Broker (CASB), Cloud Security Posture Management (CSPM) and Cloud Workload Security