High Security Risk Technologies Impacting IT Decision MakersUnited States and Europe

High Security Risk Technologies Impacting IT Decision MakersUnited States and Europe

Opportunities for Network Security Technologies Providers

RELEASE DATE
09-Jul-2014
REGION
North America
Research Code: MA15-01-00-00-00
SKU: TE00313-NA-CR_01806
$12,500.00
In stock
SKU
TE00313-NA-CR_01806
$12,500.00
DownloadLink

Pay by invoice

ENQUIRE NOW

Description

The overall research objective of this research was to measure the current use and future decision-making behavior toward information technology (IT), specifically network security technologies. Cloud computing is expected to grow rapidly across verticals and tablet usage is on the rise in the workplace. Both create a greater security risk in the organization, but more than half of the respondents feel that they are highly effective in meeting their organizations’ goals. Not surprisingly, large companies invest in high security risk technologies: the larger the company, the greater the value of outsourcing to MSSPs. This study reveals there is much opportunity for network security providers over the next three years.

Table of Contents

Research Objectives

Methodology

Methodology (Continued)

Executive Summary

Growth Opportunities in the for Network Security Companies

High Security Risk Technologies, Current and Future Usage

Currently Used High Security Risk Technologies by Region

Currently Used High Security Risk Technologies by Industry

Currently Used High Security Risk Technologies by Company Size

Planning for Future Use of High Security Risk Technologies by Region

Planning for Future Use of High Security Risk Technologies by Industry

Planning for Future Use of High Security Risk Technologies by Company Size

Effectiveness of High Risk Technologies for Organizations

Outsourcing to Managed Security Service Providers by Region

Outsourcing to Managed Security Service Providers by Industry

Outsourcing to Managed Security Service Providers by Company Size

Implementation of Network Security Technologies by Region

Implementation of Network Security Technologies by Industry

Implementation of Network Security Technologies by Company Size

High Security Risk Technologies by Region

High Security Risk Technologies by Industry

High Security Risk Technologies by Company Size

The Big Picture of IT Budgets

The Big Picture of IT Budgets (continued)

Distribution of Worker Types by Region and Company Size

Distribution of Worker Types by Industry

Attitude Profile: Supporting New Business Needs is Driving Up Costs

Companies’ and Respondents’ Geographic Reach

Country of Residence and Years in IT

IT Decision Making Role and Job Title

Industries and Healthcare Segments Addressed

Healthcare Segments and Sub-segments Addressed

Industries and Government Segments Addressed

Legal Disclaimer

Growth Rate Details

Implementation of Mobility Management Platform

Implementation of Advanced Malware Detection and Advanced Persistent Threat Detection

Implementation of Mobile Endpoint Security

Implementation of Distributed Denial of Service Prevention

Implementation of Web Application Firewall

Implementation of Network Access Control

Implementation of Next Generation Firewall

Implementation of Next Generation Intrusion Prevention Systems

The Frost & Sullivan Story

Value Proposition: Future of Your Company & Career

Global Perspective

Industry Convergence

360º Research Perspective

Implementation Excellence

Our Blue Ocean Strategy

Related Research
The overall research objective of this research was to measure the current use and future decision-making behavior toward information technology (IT), specifically network security technologies. Cloud computing is expected to grow rapidly across verticals and tablet usage is on the rise in the workplace. Both create a greater security risk in the organization, but more than half of the respondents feel that they are highly effective in meeting their organizations goals. Not surprisingly, large companies invest in high security risk technologies: the larger the company, the greater the value of outsourcing to MSSPs. This study reveals there is much opportunity for network security providers over the next three years.
More Information
No Index Yes
Podcast No
Author Alpa Shah
Industries Telecom
WIP Number MA15-01-00-00-00
Is Prebook No