Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

IDC

Below you will find reports with the source of “IDC”

image from Worldwide Security Spending Guide

Worldwide Security Spending Guide

The Worldwide Security Spending Guide examines the security opportunity from a technology, industry, company size, and geography perspective. This comprehensive database delivered via IDC’s Customer Insights query tool allows the user to easily extract meaningful information about the security technology market by viewing data trends and relationships and making data comparisons. (more available)
Added: February 14, 2020
image from The Changing Face of Data Security- 2019 Thales Data Threat Report

The Changing Face of Data Security- 2019 Thales Data Threat Report

This report focuses specifically on data threats in the healthcare industry.
Added: September 18, 2019
image from Worldwide Semiannual Security Spending Guide

Worldwide Semiannual Security Spending Guide

The Worldwide Semiannual Security Spending Guide examines the security spending opportunity from a country, industry, and technology perspective. This comprehensive database delivered via pivot table format or IDC’s Customer Insights query tool allows users to easily extract meaningful information about the core and next-generation security markets by viewing data trends and relationships and making data comparisons. (more available)
Added: March 26, 2019
image from The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

According to IDC’s 2018 Data Services for Hybrid Cloud Survey: » 65% of enterprise IT security, line-of-business IT, and data management specialists cited a medium to robust digital rights management deployment in their organization. (more available)
Added: March 1, 2019
image from Understanding And Managing Identity In The Digital Era

Understanding And Managing Identity In The Digital Era

Almost every individual and every business now has a cyberpresence that needs to be secured. Digital transformation has also created a growing supply of security targets in the form of information-rich storehouses of data. (more available)
Added: November 24, 2018
image from Investigation or Exasperation: The State of Security Operations

Investigation or Exasperation: The State of Security Operations

This Infographic lays out details of the State of Security Operations. It reveals data that discusses how much time and budget are being spent on cybersecurity issues. (more available)
Added: October 25, 2018
image from Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

This report takes a look at Cloud Security Gateways and asks important questions that lead to proper vendor assesment.
Added: October 24, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured. (more available)
Added: October 23, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration. (more available)
Added: October 22, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.
Added: October 21, 2018
image from Fighting File Based Exploits Across The Expanding Attack Surface

Fighting File Based Exploits Across The Expanding Attack Surface

This report provides insight into taking a proactive approachv against known, unkown, and zero-day exploits that serve as the starting point for multi-vector cyberattacks. (more available)
Added: October 20, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment. (more available)
Added: October 19, 2018
© Cyentia Institute 2021
Library updated: March 5, 2021 12:07 UTC (build 7e736b2)