Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

IDC

Below you will find reports with the source of “IDC”

image from Worldwide Security Spending Guide

Worldwide Security Spending Guide

The Worldwide Security Spending Guide examines the security opportunity from a technology, industry, company size, and geography perspective. This comprehensive database delivered via IDC’s Customer Insights query tool allows the user to easily extract meaningful information about the security technology market by viewing data trends and relationships and making data comparisons.

(more available)
Added: February 14, 2020
image from The Changing Face of Data Security- 2019 Thales Data Threat Report

The Changing Face of Data Security- 2019 Thales Data Threat Report

This report focuses specifically on data threats in the healthcare industry.

Added: September 18, 2019
image from Worldwide Semiannual Security Spending Guide

Worldwide Semiannual Security Spending Guide

The Worldwide Semiannual Security Spending Guide examines the security spending opportunity from a country, industry, and technology perspective. This comprehensive database delivered via pivot table format or IDC’s Customer Insights query tool allows users to easily extract meaningful information about the core and next-generation security markets by viewing data trends and relationships and making data comparisons.

(more available)
Added: March 26, 2019
image from The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

According to IDC’s 2018 Data Services for Hybrid Cloud Survey: » 65% of enterprise IT security, line-of-business IT, and data management specialists cited a medium to robust digital rights management deployment in their organization. » Organizations are struggling to secure data across multi-cloud and hybrid environments. More than 37% of survey respondents indicated that the growing complexity of security solutions is a significant challenge that often impedes data governance policy enforcement.

(more available)
Added: March 1, 2019
image from Understanding And Managing Identity In The Digital Era

Understanding And Managing Identity In The Digital Era

Almost every individual and every business now has a cyberpresence that needs to be secured. Digital transformation has also created a growing supply of security targets in the form of information-rich storehouses of data. Identity and access management (IAM) platforms offer one way to tackle this problem. IAM platforms provide a set of solutions to identify users and control their access within an IT environment. However, modern identity isn’t just about security, privacy, or even convenience. The key value of an identity platform is enablement, in that it allows an organization to securely provide services to end users. It is all “Yes you can … but only you can.”

(more available)
Added: November 24, 2018
image from Investigation or Exasperation: The State of Security Operations

Investigation or Exasperation: The State of Security Operations

This Infographic lays out details of the State of Security Operations. It reveals data that discusses how much time and budget are being spent on cybersecurity issues.

(more available)
Added: October 25, 2018
image from Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

This report takes a look at Cloud Security Gateways and asks important questions that lead to proper vendor assesment.

Added: October 24, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.

Added: October 21, 2018
image from Fighting File Based Exploits Across The Expanding Attack Surface

Fighting File Based Exploits Across The Expanding Attack Surface

This report provides insight into taking a proactive approachv against known, unkown, and zero-day exploits that serve as the starting point for multi-vector cyberattacks.

(more available)
Added: October 20, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment.

(more available)
Added: October 19, 2018
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)