Publisher: IDC
Category: Network Security

Network Security market research reports by IDC

(408 reports matching your criteria)
    • IDC PeerScape: Peer Insights for Optimizing Security Policy Development, Promulgation, and Maintenance

      IDC PeerScape: Peer Insights for Optimizing Security Policy Development, Promulgation, and Maintenance This IDC PeerScape offers actionable guidance for optimizing enterprise security policy development, promulgation, and maintenance."The businesses profiled in this document — from the banking, insu ... Read More

    • IDC Perspective: The Current Asia/Pacific (Including Japan) Landscape Concerning Identity Governance and Administration

      IDC Perspective: The Current Asia/Pacific (Including Japan) Landscape Concerning Identity Governance and Administration This IDC Perspective highlights the complexity and diversity of data privacy and regulatory frameworks in the Asia/Pacific (including Japan) (APJ) region, emphasizing the increasin ... Read More

    • Network Detection and Response Explained for the IT Tech Buyer

      Network Detection and Response Explained for the IT Tech Buyer This IDC Perspective explains why network detection and response (NDR) platforms are an important addition to businesses that operate their own security operations. IDC believes that organizations of any size would receive excellent val ... Read More

    • Under Construction: AI for Disaster Recovery and Business Continuity

      Under Construction: AI for Disaster Recovery and Business Continuity The IDC Perspective discusses the integration of artificial intelligence (AI) in disaster recovery and business continuity processes. It highlights the potential of AI in enhancing these processes, including developing runbooks, o ... Read More

    • Exploring Use Cases for Managed Extended Detection and Response Solutions

      Exploring Use Cases for Managed Extended Detection and Response Solutions This IDC Perspective explores a myriad of different use cases for managed extended detection and response (MXDR) services and provides insights to what technology buyers should be mindful of prior to adoption. MXDR represents ... Read More

    • The Digital Business CISO: CISO Skills Evolve to Embrace a New Reality

      The Digital Business CISO: CISO Skills Evolve to Embrace a New Reality The CISO (Chief Information Security Officer) is thought of as a cybersecurity expert. While that is most certainly a requirement of the role, it is simply not enough anymore. As IT has changed, so have the requirements of the CI ... Read More

    • Worldwide Network Detection and Response Forecast, 2024–2028: The Network Is Talking, Are You Listening?

      Worldwide Network Detection and Response Forecast, 2024–2028: The Network Is Talking, Are You Listening? This IDC study presents a forecast for the worldwide network detection and response market for 2024–2028."NDR is like the cool kid in high school that is well thought of and can hang with any cl ... Read More

    • Asia/Pacific (Excluding Japan and China) Identity and Access Management Market Shares, 1H23: Growth in Where It Matters

      Asia/Pacific (Excluding Japan and China) Identity and Access Management Market Shares, 1H23: Growth in Where It Matters This study examines the market shares of identity and access management vendors in 1H23. "Even as security investments continue to grow within APEJC, we observe that security budge ... Read More

    • Top 5 Trends in Enterprise Mobile Devices to Watch in 2024

      Top 5 Trends in Enterprise Mobile Devices to Watch in 2024 This IDC Market Perspective examines the key trends that will impact the enterprise mobile device market in 2024. As mobile hardware, software, and service providers head into 2024, important lessons learned around mobile AI, corporate-liabl ... Read More

    • Zscaler Women in IT and Security CXO Summit

      Zscaler Women in IT and Security CXO Summit This IDC Market Note discusses about the Zscaler Women in IT and Security CXO Summit, hosted by Kavitha Mariappan, EVP, Customer Experience and Transformation at Zscaler, and aimed to foster community among women tech leaders and discuss topics such as sec ... Read More

    • Holistic M365 Data Management: Data Protection, Security, and Data Preservation of M365 Data

      Holistic M365 Data Management: Data Protection, Security, and Data Preservation of M365 Data This IDC Perspective discusses the importance of security, protection, and preservation of business-critical data in Microsoft 365 to succeed in the AI era. It highlights growing concerns about data loss in ... Read More

    • Abundance in Tools, Shortages in Talent — Security Service Providers Addressing Feast and Famine in 2023

      Abundance in Tools, Shortages in Talent — Security Service Providers Addressing Feast and Famine in 2023 This IDC Market Perspective discusses and reflects on the results of security service provider (SP) interviews that IDC had with security service providers in the latter half of 2023. This proces ... Read More

    • IDC PlanScape: Generative AI Fraud Strategy

      IDC PlanScape: Generative AI Fraud Strategy This IDC PlanScape looks at the most common types of GenAI-generated fraud that organizations are facing, how each is created, and steps for successfully identifying and reacting to them.“Digital fraud is nothing new. But generative AI has taken it to a wh ... Read More

    • Worldwide Attack Surface Management and Breach and Attack Simulation Software Forecast, 2024–2028: Proactively Discovering Potential Attacks

      Worldwide Attack Surface Management and Breach and Attack Simulation Software Forecast, 2024–2028: Proactively Discovering Potential Attacks This IDC study provides our 2024–2028 forecast for the attack surface management (ASM) and breach and attack simulation (BAS) software markets."Attack surface ... Read More

    • How Threat Modeling Enables Security by Design

      How Threat Modeling Enables Security by Design This IDC Perspective looks at the benefits of adopting threat modeling within into the application development life cycle and as an instrument within DevOps. Threat modeling can help identify threats (flaws) and countermeasures (security requirements). ... Read More

    • Securities and Exchange Commission Cybersecurity Ruling

      Securities and Exchange Commission Cybersecurity Ruling This IDC Market Perspective discusses that in March 2022, the Securities and Exchange Commission (SEC) published a proposal introducing new rules, rule amendments, and form amendments for public companies that are subject to the reporting requi ... Read More

    • What It Takes to Have a Successful SASE Adoption

      What It Takes to Have a Successful SASE Adoption This IDC Perspective discusses the secure access service edge (SASE), a rapidly growing security practice that integrates networking technologies and network security technologies into a unified cloud service. It highlights the benefits of SASE includ ... Read More

    • Digital Sovereignty: Implications for European Organizations

      Digital Sovereignty: Implications for European Organizations This IDC Market Perspective explores the significance of digital sovereignty for European organizations against the backdrop of evolving market dynamics. Examining the European context amidst geopolitical and economic uncertainties, the re ... Read More

    • How to Build a Security Awareness Culture

      How to Build a Security Awareness Culture This IDC Perspective focuses on best practices for building a security awareness culture in an organization. It addresses the following:Trends in causes of security incidentsCommonly used security awareness interventions Innovations in security awareness int ... Read More

    • The Renewed Significance of Data Security for GenAI Initiatives

      The Renewed Significance of Data Security for GenAI Initiatives This IDC Perspective discusses the renewed significance of data security for generative AI (GenAI) initiatives. Generative AI offers clear benefits to executives, data managers, and lines of business, helping rapidly extract value from ... Read More

    • Five Trends to Watch in Endpoint Device Management in 2024

      Five Trends to Watch in Endpoint Device Management in 2024 This IDC Market Perspective discusses five key trends in endpoint device management for 2024. Generative AI, advanced wearables, frontline employee engagement, private 5G networks, and zero trust network access (ZTNA) are among technologies ... Read More

    • Trustwave Reemerges with a Promising Future and Partner

      Trustwave Reemerges with a Promising Future and Partner This IDC Market Note discusses the divestiture of managed security services provider Trustwave from Singapore-based Singtel to The Chertoff Group. During the eight years Trustwave was part of Singtel, it was also looking ahead to changing custo ... Read More

    • Worldwide Consumer Digital Life Protection Forecast Update, 2023-2027: Market Lift of Broader CDLP Product Portfolios Has Not Yet Materialized

      Worldwide Consumer Digital Life Protection Forecast Update, 2023-2027: Market Lift of Broader CDLP Product Portfolios Has Not Yet Materialized This IDC study presents a five-year forecast for the worldwide consumer digital life protection market for 2023–2027."The investments CDLP vendors have made ... Read More

    • AWS re:Invent 2023: Simplicity, Security, and "Q"

      AWS re:Invent 2023: Simplicity, Security, and "Q" This IDC Market Note discusses the key highlights from AWS re:Invent 2023, focusing on the launch of Amazon generative AI (GenAI) "Q" and AWS security strategy covering the various security features and initiatives announced, including enhancements t ... Read More

    • Worldwide Corporate Endpoint Security Forecast Update, 2023–2027: Endpoint Security Platformization Propels Robust Growth

      Worldwide Corporate Endpoint Security Forecast Update, 2023–2027: Endpoint Security Platformization Propels Robust Growth This IDC study presents an updated five-year forecast for the worldwide corporate endpoint security market for the 2023–2027 period."The underlying demand factors driving market ... Read More

1 2 3 4 5 6 7 8 9 10

Research Assistance

Live help

Join Alert Me Now!

Sign Up

Find out more on our blog
Cookie Settings