High Security Risk Technologies Impacting IT Decision MakersUnited States and Europe
High Security Risk Technologies Impacting IT Decision MakersUnited States and Europe
Opportunities for Network Security Technologies Providers
09-Jul-2014
North America
Customer Research
Description
The overall research objective of this research was to measure the current use and future decision-making behavior toward information technology (IT), specifically network security technologies. Cloud computing is expected to grow rapidly across verticals and tablet usage is on the rise in the workplace. Both create a greater security risk in the organization, but more than half of the respondents feel that they are highly effective in meeting their organizations’ goals. Not surprisingly, large companies invest in high security risk technologies: the larger the company, the greater the value of outsourcing to MSSPs. This study reveals there is much opportunity for network security providers over the next three years.
Table of Contents
Research Objectives
Methodology
Methodology (Continued)
Executive Summary
Growth Opportunities in the for Network Security Companies
High Security Risk Technologies, Current and Future Usage
Currently Used High Security Risk Technologies by Region
Currently Used High Security Risk Technologies by Industry
Currently Used High Security Risk Technologies by Company Size
Planning for Future Use of High Security Risk Technologies by Region
Planning for Future Use of High Security Risk Technologies by Industry
Planning for Future Use of High Security Risk Technologies by Company Size
Effectiveness of High Risk Technologies for Organizations
Outsourcing to Managed Security Service Providers by Region
Outsourcing to Managed Security Service Providers by Industry
Outsourcing to Managed Security Service Providers by Company Size
Implementation of Network Security Technologies by Region
Implementation of Network Security Technologies by Industry
Implementation of Network Security Technologies by Company Size
High Security Risk Technologies by Region
High Security Risk Technologies by Industry
High Security Risk Technologies by Company Size
The Big Picture of IT Budgets
The Big Picture of IT Budgets (continued)
Distribution of Worker Types by Region and Company Size
Distribution of Worker Types by Industry
Attitude Profile: Supporting New Business Needs is Driving Up Costs
Companies’ and Respondents’ Geographic Reach
Country of Residence and Years in IT
IT Decision Making Role and Job Title
Industries and Healthcare Segments Addressed
Healthcare Segments and Sub-segments Addressed
Industries and Government Segments Addressed
Legal Disclaimer
Growth Rate Details
Implementation of Mobility Management Platform
Implementation of Advanced Malware Detection and Advanced Persistent Threat Detection
Implementation of Mobile Endpoint Security
Implementation of Distributed Denial of Service Prevention
Implementation of Web Application Firewall
Implementation of Network Access Control
Implementation of Next Generation Firewall
Implementation of Next Generation Intrusion Prevention Systems
The Frost & Sullivan Story
Value Proposition: Future of Your Company & Career
Global Perspective
Industry Convergence
360º Research Perspective
Implementation Excellence
Our Blue Ocean Strategy
Growth dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Popular Topics
Deliverable Type | Customer Research |
---|---|
No Index | Yes |
Podcast | No |
Author | Alpa Shah |
Industries | Telecom |
WIP Number | MA15-01-00-00-00 |
Is Prebook | No |