Publisher: IDC
Category: Network Security

Network Security market research reports by IDC

(466 reports matching your criteria)
    • IDC PlanScape: A Case for Kubernetes Security

      IDC PlanScape: A Case for Kubernetes Security This IDC study provides an in-depth review of Kubernetes security."Kubernetes security is not just about protecting an enterprise's containerized applications and data, it is also about safeguarding the organization's reputation and customer trust," says ... Read More

    • Review of Fujitsu Uvance — An Example of an Integrated Approach to Security Services

      Review of Fujitsu Uvance — An Example of an Integrated Approach to Security Services This IDC Market Note discusses the introduction of Fujitsu Uvance and the implications of the highly integrated approach to its security business. In October 2021, Fujitsu launched its new brand for its global busin ... Read More

    • Software Supply Chain Security in U.S. Federal Government

      Software Supply Chain Security in U.S. Federal Government This IDC Perspective addresses how continued and evolving threats have put national supply chains at risk to cyberattacks. This has prompted mandates to modernize supply chain components and improve supply chain risk management. Agencies like ... Read More

    • Convergence: SD-WAN, Security, and Edge Services

      Convergence: SD-WAN, Security, and Edge Services This IDC Market Perspective explores the emerging trend toward convergence of key technologies including software-defined networking, security services, and edge computing. Market participants spanning technology, service, CDN providers, and cloud pro ... Read More

    • The Future of B2B Digital Payments: Virtual Cards and Real-Time Payments Offer Speed, Convenience, and Security

      The Future of B2B Digital Payments: Virtual Cards and Real-Time Payments Offer Speed, Convenience, and Security This IDC Perspective provides insight into the current trends and future of B2B digital payment management. As virtual cards, real-time payments, and even cryptocurrency grow in popularit ... Read More

    • Future of Digital Innovation and DevSecOps: Understanding and Securing the Attack Vectors of the Modern Software Supply Chain

      Future of Digital Innovation and DevSecOps: Understanding and Securing the Attack Vectors of the Modern Software Supply Chain This IDC Perspective provides insights into the various dimensions of the software supply chain that can be attacked by bad actors, with actionable insight into practices and ... Read More

    • Defining the CIAM Market Opportunity: An IDC Market Study

      Defining the CIAM Market Opportunity: An IDC Market Study This IDC Market Perspective is meant to accompany IDC's November 2022 U.S. Security B2C Identity Survey, permitting IDC to interpret and inject more color or opinion around survey findings and relate them to recent market developments. User s ... Read More

    • U.S. Government Digital Sovereignty: Self-Determination

      U.S. Government Digital Sovereignty: Self-Determination This IDC Perspective presents the U.S. federal government requirements, laws, and presidential executive orders relating to digital sovereignty as it relates to data, technical requirements of cloud and cybersecurity, operational requirements, ... Read More

    • Asia/Pacific (Excluding Japan and China) Security Services Forecast, 2022–2026

      Asia/Pacific (Excluding Japan and China) Security Services Forecast, 2022–2026 This IDC forecast details the 2022–2026 market size and growth rate for the security services market of Asia/Pacific (excluding Japan and China) (APEJC). "With impending uncertainty looming overhead surrounding economic c ... Read More

    • The Convergence of Networking and Security in Europe

      The Convergence of Networking and Security in Europe This IDC Market Perspective looks at the emerging convergence of networking and security. IDC research shows that enterprise network operators are increasingly looking toward their networking vendors for security solutions. In addition to the pote ... Read More

    • Worldwide Service Mesh Forecast, 2023–2027

      Worldwide Service Mesh Forecast, 2023–2027 This IDC study provides a worldwide service mesh market forecast through 2027. "While architectural questions remain, particularly at the data plane where eBPF and sidecar-free offerings are beginning to proliferate, service meshes are finding growing favor ... Read More

    • IDC PlanScape: Edge Security for Federal Agencies

      IDC PlanScape: Edge Security for Federal Agencies This IDC PlanScape discusses edge security for federal agencies."Many agencies' primary goal for improving security is implementing a zero trust architecture (ZTA). Zero trust network architecture (ZTNA) does reduce risk, but agencies can substantial ... Read More

    • The Biden–Harris Administration's Bold National Cybersecurity Strategy Is Poised to Reshape the Future Digital Ecosystem

      The Biden–Harris Administration's Bold National Cybersecurity Strategy Is Poised to Reshape the Future Digital Ecosystem This IDC Perspective looks at the Biden–Harris administration's release of its National Cybersecurity Strategy (NCS) on March 2, 2023, which seeks to address profound shifts in th ... Read More

    • IDC Market Presentation: Worldwide Threat Intelligence Report: Observing the Adversary When They Retreat to the Dark Web and Behind Social Media

      IDC Market Presentation: Worldwide Threat Intelligence Report: Observing the Adversary When They Retreat to the Dark Web and Behind Social Media In this IDC Market Perspective, we look at two of the most common use cases in which the demand is increasing for what companies are looking for in threat ... Read More

    • Worldwide Threat Intelligence Market Shares, 2022: Providing Insight on the Gathering Threats Outside the Network Perimeter

      Worldwide Threat Intelligence Market Shares, 2022: Providing Insight on the Gathering Threats Outside the Network Perimeter This IDC study presents the worldwide threat intelligence market shares for 2022."Let's think about this logically. Businesses are building virtual walls around their cyberass ... Read More

    • Engendering Trust with Proactive Cybersecurity Using Continuous Risk-Based Posture Assessment

      Engendering Trust with Proactive Cybersecurity Using Continuous Risk-Based Posture Assessment This IDC Perspective looks at engendering trust with proactive cybersecurity using continuous risk-based posture assessment. Proactive cybersecurity moves beyond vulnerability management to consider all ris ... Read More

    • The "New" NTT DATA Inc. Debuts

      The "New" NTT DATA Inc. Debuts This IDC Market Note discusses a major reorganization at NTT Corporation to address business services that NTT DATA Inc. will now offer worldwide, excluding the Japanese market. IDC foresees that business simplification by service providers will not only benefit their ... Read More

    • Managed Security Services Market Trends in South Africa

      Managed Security Services Market Trends in South Africa This IDC Market Perspective analyzes current trends in the managed security services market of South Africa. It examines prevailing trends among managed security services (MSS) and presents them in the context of South Africa from an end-user p ... Read More

    • VMware Enhances Developers' Experience and Security in the Latest Tanzu Application Platform 1.4 Announcements

      VMware Enhances Developers' Experience and Security in the Latest Tanzu Application Platform 1.4 Announcements This IDC Market Note focuses on the recent VMware Tanzu Application Platform 1.4 announcements. The central focus is to enhance the productivity and experience of developers, DevOps, DevSec ... Read More

    • Japan Cybersecurity Solutions Market Shares, 2021: SIEM Market Growth

      Japan Cybersecurity Solutions Market Shares, 2021: SIEM Market Growth This study divides the Japan targeted cyberattack protection product market into two markets: the targeted cyberattack protection product (endpoint) market and the Japan cybersecurity analytics, intelligence, response, and orchest ... Read More

    • Evolution and Trends in European Zero Trust Adoption

      Evolution and Trends in European Zero Trust Adoption This IDC Market Perspective assesses the attitudes of European organizations to the adoption of zero trust principles in the architecture of their infrastructure and processes. The European regulatory environment, particularly in terms of data pri ... Read More

    • IDC PlanScape: IaaS Cloud Networking

      IDC PlanScape: IaaS Cloud Networking This IDC PlanScape helps enterprises understand why IaaS cloud networking is important, what IaaS cloud networking is, who the key stakeholders for the technology are within your organization, and how your organization can leverage IaaS cloud networking in suppor ... Read More

    • IDC Perspective: Is Defense in Depth Dead?

      IDC Perspective: Is Defense in Depth Dead? This IDC Perspective details the fundamental concepts behind defense in depth and how it has drastically evolved to cater to our current environment. The document also touches on the core components of zero trust and its common use cases and technological b ... Read More

    • China Data Loss Prevention Market Shares, 2021: Compliance and Business Needs Jointly Drive the Resurgence of the Data Loss Prevention Market

      China Data Loss Prevention Market Shares, 2021: Compliance and Business Needs Jointly Drive the Resurgence of the Data Loss Prevention Market This IDC study focuses on the revenue, share, and technological development of China's DLP market in 2021. In recent years, China has significantly strengthen ... Read More

    • Why a "Back to the Office" Strategy will Fail (And Work will Shift to a "Digital HQ")

      Why a "Back to the Office" Strategy will Fail (And Work will Shift to a "Digital HQ") This IDC Market Note discusses the issues with a "full return to the office" currently demanded by many European managers. We fact-check worries such as performance drop, lack of teamwork, and security in hybrid wo ... Read More

8 9 10 11 12 13 14 15 16 17

Research Assistance

Live help

Join Alert Me Now!

Sign Up

Find out more on our blog
Cookie Settings