Publisher: IDC
Category: Network Security

Network Security market research reports by IDC

(427 reports matching your criteria)
    • Enterprise Internet of Things Security Solution in the Asia/Pacific (Excluding Japan) Region

      Enterprise Internet of Things Security Solution in the Asia/Pacific (Excluding Japan) Region This IDC Perspective discusses the various security solutions that enterprises adopt to protect their Internet of Things (IoT) infrastructure. According to IDC's Worldwide Security Spending Guide, spending o ... Read More

    • The Impact of the Russia-Ukraine War

      The Impact of the Russia-Ukraine War This IDC Perspective examines the potential cybersecurity and other services impacts resulting from the Russia-Ukraine war. Organizations should closely monitor the ongoing situation for political, economic, and business-specific impacts such as supply chain disr ... Read More

    • Attack Surface Management: Impact on Trustworthiness

      Attack Surface Management: Impact on Trustworthiness This IDC Perspective discusses attack surface management. As risk is a foundational element in IDC's Future of Trust framework, organizations need systems to measure and help improve their risk posture. Attack surface management, with its external ... Read More

    • Privileged Identity/Access Management, Niche or Not?

      Privileged Identity/Access Management, Niche or Not? This IDC Market Note is a companion document to IDC's recently published January 2022 Privileged Access Management (PAM) Survey permitting IDC to interpret and inject more color or opinion around survey findings and relating them to recent market ... Read More

    • Video Surveillance and Physical Security: Integrating Video Telemetry into a Comprehensive, Situationally Aware Security Capability

      Video Surveillance and Physical Security: Integrating Video Telemetry into a Comprehensive, Situationally Aware Security Capability This IDC Perspective looks at how to integrate video telemetry into a comprehensive, situationally aware security capability. The objective of physical security is to ... Read More

    • Cyberinsurance: Costs and Requirements Are Rising

      Cyberinsurance: Costs and Requirements Are Rising This IDC Perspective outlines IDC's research regarding the rising costs, growing limitations, and latest developments in the cyberinsurance industry. Since the inception of cyberinsurance in the early 2000s, organization saw this as a way to deal wit ... Read More

    • IDC's Worldwide Physical Security Technology Taxonomy, 2022

      IDC's Worldwide Physical Security Technology Taxonomy, 2022 This IDC study presents IDC's taxonomy for physical security technology. The video surveillance market is increasingly becoming an essential component of the large physical security technology market. However, it is not the only component, ... Read More

    • Identity Fraud: How Big Is It and What Can We Do?

      Identity Fraud: How Big Is It and What Can We Do? This IDC Perspective discusses the fraudster techniques and how to overcome. Identity fraud can occur anytime during the customer life cycle, which starts at a customers' onboarding up through and including their account closure, hopefully many years ... Read More

    • IDC's Worldwide Internet of Things Security Products Taxonomy, 2022

      IDC's Worldwide Internet of Things Security Products Taxonomy, 2022 This IDC study presents IDC's taxonomy for IoT security products. It provides definitions and a detailed framework of security solutions in four technology category markets. This taxonomy forms the foundation for IDC's coverage and ... Read More

    • IDC Perspective: Key Technology Strategy Takeaways from NRF 2022

      IDC Perspective: Key Technology Strategy Takeaways from NRF 2022 This IDC Perspective discusses key takeaways from NRF 2022. An overarching theme at NRF 2022 was the importance of achieving the seamless omni-channel operations that consumers expect to effectively compete and differentiate in today' ... Read More

    • Choosing MDR or XDR? The Prescription for a Detection and Response System Can Get Complicated

      Choosing MDR or XDR? The Prescription for a Detection and Response System Can Get Complicated This IDC Market Perspective discusses the key capabilities of managed detection and response (MDR) and eXtended detection and response (XDR) solutions. MDR and XDR are the key detection and response solutio ... Read More

    • Entrust Enables 9 of 14 Domains in Cybersecurity Maturity Model Certification Compliance for DoD Contractors

      Entrust Enables 9 of 14 Domains in Cybersecurity Maturity Model Certification Compliance for DoD Contractors This IDC Perspective addresses identity and access management as well as payment-enabling technology provider, Entrust, and how the company can prepare contracts on the path to Cybersecurity ... Read More

    • MixMode's Patented Third-Wave AI Enhances Scope and Scale for Cloud Security Monitoring

      MixMode's Patented Third-Wave AI Enhances Scope and Scale for Cloud Security Monitoring This IDC Market Note presents a major artificial intelligence (AI)–focused update to MixMode's cloud security monitoring product. This document provides analysis of MixMode's transformative capabilities powered b ... Read More

    • IDC Global Security Products Analysis: From Power Point to Power Product, Where Is XDR Right Now?

      IDC Global Security Products Analysis: From Power Point to Power Product, Where Is XDR Right Now? This IDC Market Perspective discusses the current state of the extended detection and response (XDR) market. Entering 2021, with a few notable exceptions, XDR was more of an aspiration than a practical ... Read More

    • Latest Product Launches Exhibit Great Innovations from the MSSPs

      Latest Product Launches Exhibit Great Innovations from the MSSPs This IDC Market Perspective selects the latest product launches of four major managed security services providers (MSSPs) to provide a discussion on some of the common themes and trends that the managed security services industry is m ... Read More

    • Security and Other Challenges Will Lead to Containerized Workloads Repatriating Within Next Two Years

      Security and Other Challenges Will Lead to Containerized Workloads Repatriating Within Next Two Years This IDC Market Perspective looks at a trend in container technology. IDC's IT Infrastructure for Storage and Data Management Survey, 4Q21 found more than half of organizations intend to repatriate ... Read More

    • Top 5 Trends in Unified Endpoint Management to Watch in 2022

      Top 5 Trends in Unified Endpoint Management to Watch in 2022 This IDC Market Perspective examines the key trends that will impact the unified endpoint management market in 2022. As enterprises continue to recover from the COVID-19 pandemic, the important lessons learned around modern PC management, ... Read More

    • The Pulse of IT in the European Hospital: Key Deals and Initiatives, October–December 2021

      The Pulse of IT in the European Hospital: Key Deals and Initiatives, October–December 2021 This IDC Perspective looks at key developments and news in the European hospital market in 4Q21."The future of healthcare requires systems where medical records are easily accessible and sharable. The increasi ... Read More

    • How and Why Kubernetes Complicates Security

      How and Why Kubernetes Complicates Security This IDC Perspective discusses Kubernetes security. Securing Kubernetes though is not like securing servers or applications. Kubernetes totally changes the rules of the game as applications move from monolithic to microservices based, changing applications ... Read More

    • Automating Your Security Program

      Automating Your Security Program This IDC Perspective discusses the role that automation can play in improving the efficiency and effectiveness of an organization's cybersecurity program. It includes eight suggestions of areas where technology leaders can immediately achieve gains through security a ... Read More

    • Cybersecurity Insurance: Are You Covering Your Risk?

      Cybersecurity Insurance: Are You Covering Your Risk? This IDC Perspective identifies five crucial principles for IT executives about the use of cybersecurity insurance to transfer portions of an organization's cybersecurity risk to an insurance carrier. Modern cybersecurity insurance policies requir ... Read More

    • Critical Knowledge: Encryption in the Modern Enterprise

      Critical Knowledge: Encryption in the Modern Enterprise This IDC Perspective identifies six principles that IT executives must understand about the use of encryption technology to protect sensitive information. Different encryption technologies exist to protect data that is stored at rest, in transi ... Read More

    • Using Security Certifications to Recruit and Retain Critical Skills

      Using Security Certifications to Recruit and Retain Critical Skills This IDC Perspective discusses the use of cybersecurity certifications to recruit and retain critical skills. This document advises technology and business leaders as they determine whether it is appropriate to encourage employees ... Read More

    • Sub-Saharan Africa ICT Regulatory Developments and Outlook

      Sub-Saharan Africa ICT Regulatory Developments and Outlook This IDC Market Perspective reviews the current ICT regulatory landscape across Sub-Saharan Africa and examines ongoing developments in this space — particularly those that address digital regulations and emerging technologies (including fut ... Read More

    • Worldwide Consumer Digital Life Protection Market Shares, July 2020–June 2021: McAfee Outpaces the Market

      Worldwide Consumer Digital Life Protection Market Shares, July 2020–June 2021: McAfee Outpaces the Market This IDC study reviews consumer digital life protection market shares for the 12-month period ending June 2021.According to Michael Suby, research vice president, Security and Trust at IDC, "Con ... Read More

12 13 14 15 16 17 18

Research Assistance

Live help

Join Alert Me Now!

Sign Up

Find out more on our blog
Cookie Settings