Your SlideShare is downloading. ×
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Japan IT Secur...
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
by Company Siz...
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Information Le...
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Fax Order Form...
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Payment Inform...
Upcoming SlideShare
Loading in...5
×

Japan IT Security End-User Survey 2014

1,147

Published on

In this IDC study (a translation of the Japanese document IDC #J14210103), we analyze and report the results of a survey on the implementation of enterprise IT security solutions in Japan conducted by IDC in January 2014.Security threats like malware that target unknown vulnerabilities and highly stealthy bot viruses are getting harder to detect. When a security incident surfaces, extensive damages could already have been caused. Speedy status assessment and risk management are called for. To realize this, it is necessary for user companies to implement solutions that monitor and analyze security incidences and realize GRC. However, as the results of the current survey indicate, the predominant issue faced by companies when implementing security solutions is that of "budget," followed by "difficulty in measuring ROI." "User companies should implement security incidences and GRC solutions and visualize potential security threats. By visualizing the link between security incidents and risk management, IT departments will be able to demonstrate the necessity of the solutions to management teams," says Tsuneo Tosaka, research manager, Software & Security, IDC Japan.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,147
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Japan IT Security End-User Survey 2014"

  1. 1. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Japan IT Security End-User Survey 2014 Published on July 2014 Report Summary In this IDC study (a translation of the Japanese document IDC #J14210103), we analyze and report the results of a survey on the implementation of enterprise IT security solutions in Japan conducted by IDC in January 2014. Security threats like malware that target unknown vulnerabilities and highly stealthy bot viruses are getting harder to detect. When a security incident surfaces, extensive damages could already have been caused. Speedy status assessment and risk management are called for. To realize this, it is necessary for user companies to implement solutions that monitor and analyze security incidences and realize GRC. However, as the results of the current survey indicate, the predominant issue faced by companies when implementing security solutions is that of "budget," followed by "difficulty in measuring ROI." "User companies should implement security incidences and GRC solutions and visualize potential security threats. By visualizing the link between security incidents and risk management, IT departments will be able to demonstrate the necessity of the solutions to management teams," says Tsuneo Tosaka, research manager, Software & Security, IDC Japan. Table of Content Table of ContentsIDC OpinionIn This StudyMethodologyCompany SizeProfile of Survey Respondents and CompaniesExecutive SummaryIT Security SpendingIT Security BreachesFocal Areas of IT Security SpendingIT Security Solutions ImplementationSolutions to Enhance ComplianceUse of IT Security ServicesSituation OverviewIT Security Solutions Spending TrendsIT Security SpendingIT Security BreachesIT Security Spending: Focal AreasIT Security Solutions ImplementationSecurity Threat ManagementFirewall and VPNIntrusion Detection and Prevention and UTMIdentity and Access ManagementImplementation Rates of Single Sign-On and Authentication and Authorization SystemsUser Provisioning (such as User Registration and Deletion) SystemsSecure Content ManagementAntivirus SolutionsImplementation Rates of Antivirus (Client PC) SolutionsNetwork Gateway and Server Antivirus Solutions ImplementationVirtual Server Security Solutions ImplementationMessaging Security (such as Antispam) Solutions ImplementationWeb Security (such as URL Filtering Control) Solutions ImplementationSecurity and Vulnerability ManagementSecurity Information and Event Management SolutionsPolicy Management and GRC Management Solutions ImplementationVulnerability Assessment (Quarantine Systems and Others) Solutions Implementation RatesSolutions to Enhance ComplianceSolutions to Comply with Personal Information Protection LawSolutions for Information Leak Prevention (Client PC and Gateway)Solutions to Prevent Client PC Information Leaks (Encryption Based)Solutions to Prevent Information Leaks through Client PCs (Non-Encryption-Based Solutions like Device Controls)Solutions to Prevent Information Leaks through Gateways (Email, Web Browsing)Implementation of Data Loss Prevention ProductsUsage of IT Security ServicesSecurity System Management ServicesSecurity Consulting ServicesFuture OutlookEssential GuidanceLearn MoreRelated ResearchSynopsisFigure: Respondent Distribution by AppointmentFigure: Respondent Distribution by Authority Level in Respect of IT Security SolutionsFigure: Appointment of CIOs and CSOsFigure: Respondent Distribution by IndustryFigure: Respondent Distribution by Company SizeFigure: FY13 IT Security SpendingFigure: IT Spending as a Share of Capital Spending, FY12 and FY13Figure: Year-over-Year IT Security Spending Changes in FY13Figure: FY14 Projected YoY IT Security Spending Changes, January 2014 SurveyFigure: FY12-FY14 YoY IT Security Spending Changes, Previous (January 2013) and Current (January 2014) SurveysFigure: FY14 Projected YoY IT Security Spending Changes, January 2014 Survey: by IndustryFigure: FY14 Projected IT Security Spending Changes, January 2014 Survey: Japan IT Security End-User Survey 2014 (From Slideshare) Page 1/5
  2. 2. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! by Company SizeFigure: Security DamagesFigure: Affected IT Assets, Previous (January 2013) and Current (January 2014) SurveysFigure: Discovery of Security ViolationsFigure: Time Taken to Resolve Security Breaches from Discovery: by CIO and CSO AppointmentFigure: Major Security Risks Companies Are Concerned AboutFigure: Level of Concern about IT Security ThreatsFigure: Future IT Security Spending Focal AreasFigure: Implementation Landscapes of IT Security SolutionsFigure: Firewall and VPN ImplementationFigure: Firewall and VPN Implementation: by IndustryFigure: Firewall and VPN Implementation: by Company SizeFigure: Firewall and VPN Implementation (Appliance or Software)Figure: Firewall and VPN Implementation (Cloud and Outsourcing Services or Internal Systems)Figure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) ImplementationFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation: by IndustryFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation: by Company SizeFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation Methods (Appliance or Software)Figure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Single Sign-On and Authentication and Authorization Systems ImplementationFigure: Single Sign-On and Authentication and Authorization Systems Implementation: by IndustryFigure: Single Sign-On and Authentication and Authorization Systems Implementation: by Company SizeFigure: Single Sign-On and Authentication and Authorization Systems Implementation Methods: by System AreaFigure: Single Sign-On and Authentication and Authorization Systems Implementation (Cloud and Outsourcing Services or Internal Systems)Figure: User Provisioning (such as User Registration and Deletion) Solutions ImplementationFigure: User Provisioning (such as User Registration and Deletion) Solutions Implementation: by IndustryFigure: User Provisioning (such as User Registration and Deletion) Solutions Implementation: by Company SizeFigure: User Provisioning (such as User Registration and Deletion) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Client PC Antivirus Solutions ImplementationFigure: Client PC Antivirus Solutions Implementation: by IndustryFigure: Client PC Antivirus Solutions Implementation: by Company SizeFigure: Client PC Antivirus Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Network Gateway and Server Antivirus Solutions ImplementationFigure: Network Gateway and Server Antivirus Solutions Implementation: by IndustryFigure: Network Gateway and Server Antivirus Solutions Implementation: by Company SizeFigure: Network Gateway and Server Antivirus Solutions Implementation Methods (Appliance or Software)Figure: Network Gateway and Server Antivirus Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Virtual Server Security Solutions ImplementationFigure: Virtual Server Antivirus Solutions Implementation: by Company SizeFigure: Messaging Security (such as Antispam) Solutions ImplementationFigure: Messaging Security (such as Antispam) Solutions Implementation: by IndustryFigure: Messaging Security (such as Antispam) Solutions Implementation: by Company SizeFigure: Messaging Security (such as Antispam) Solutions Implementation Methods (Appliance or Software)Figure: Messaging Security (such as Antispam) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Web Security (such as URL Filtering Control) Solutions ImplementationFigure: Web Security (such as URL Filtering Control) Solutions Implementation: by IndustryFigure: Web Security (such as URL Filtering Control) Solutions Implementation: by Company SizeFigure: Web Security (such as URL Filtering Control) Solutions Implementation Methods (Appliance or Software)Figure: Web Security (such as URL Filtering Control) Solutions Implementation Methods (Cloud & Outsourcing Services or Internal Systems)Figure: Security Information and Event Management ImplementationFigure: Security Information and Event Management Implementation: by IndustryFigure: Security Information and Event Management Implementation: by Company SizeFigure: Security Information and Event Management Implementation Methods (Appliance or Software)Figure: Security Information and Event Management Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Policy Management and GRC Management Solutions ImplementationFigure: Policy Management and GRC Management Solutions Implementation: by IndustryFigure: Policy Management and GRC Management Solutions Implementation: by Company SizeFigure: Policy Management and GRC Management Solutions Implementation Methods (Appliance or Software)Figure: Policy Management and GRC Management Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Vulnerability Assessment (Quarantine Systems and Others) Solutions ImplementationFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation: by IndustryFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation: by Company SizeFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation Methods (Appliance or Software)Figure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Interest in IT Security Solutions for Compliance with Personal Information Protection LawFigure: Client PC Japan IT Security End-User Survey 2014 (From Slideshare) Page 2/5
  3. 3. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Information Leak (Encryption Based) Solutions ImplementationFigure: Client PC Information Leak (Encryption Based) Solutions Implementation: by IndustryFigure: Client PC Information Leak (Encryption Based) Solutions Implementation: by Company SizeFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions ImplementationFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions Implementation: by IndustryFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions Implementation: by Company SizeFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions ImplementationFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation: by IndustryFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation: by Company SizeFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation Methods (Appliance or Software)Figure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: DLP Products ImplementationFigure: DLP Products Implementation: by IndustryFigure: DLP Products Implementation: by Company SizeFigure: Reasons for Implementing DLP ProductsFigure: Issues Faced in Implementing DLP ProductsFigure: IT Security Service UsageFigure: IT Security Services Companies Intend to Use in the Future: by Company SizeFigure: Security System Management Outsourcing Service UsageFigure: Security System Operation Management Outsourcing Service Usage: by IndustryFigure: Security System Management Outsourcing Service Usage: by Company SizeFigure: Security System Management Outsourcing Service Usage: by FunctionFigure: Level of Concerns about Security Management Outsourcing Issues: by IssueFigure: Security Consulting Service Usage: by Service CategoryFigure: Security Consulting Service (Security Systems Planning and Strategizing) Usage: by Company SizeFigure: Security Consulting (Security System Audit) Service Usage: by Company SizeFigure: Security Consulting (Security System Audit) Service Usage: by Company Size Japan IT Security End-User Survey 2014 (From Slideshare) Page 3/5
  4. 4. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Fax Order Form To place an order via fax simply print this form, fill in the information below and fax the completed form to: Europe, Middle East and Africa : + 33 4 37 37 15 56 Asia, Oceania and America : + 1 (805) 617 17 93 If you have any questions please visit http://www.reportlinker.com/notify/contact Order Information Please verify that the product information is correct and select the format(s) you require. Product Formats Please select the product formats and the quantity you require. Contact Information Please enter all the information below in BLOCK CAPITALS Title: Mr Mrs Dr Miss Ms Prof First Name: _____________________________ Last Name: __________________________________ Email Address: __________________________________________________________________________ Job Title: __________________________________________________________________________ Organization: __________________________________________________________________________ Address: __________________________________________________________________________ City: __________________________________________________________________________ Postal / Zip Code: __________________________________________________________________________ Country: __________________________________________________________________________ Phone Number: __________________________________________________________________________ Fax Number: __________________________________________________________________________ Japan IT Security End-User Survey 2014 1 User License--USD 0.00 Quantity: _____ Japan IT Security End-User Survey 2014 (From Slideshare) Page 4/5
  5. 5. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Payment Information Please indicate the payment method, you would like to use by selecting the appropriate box. Payment by credit card Card Number: ______________________________________________ Expiry Date __________ / _________ CVV Number _____________________ Card Type (ex: Visa, Amex…) _________________________________ Payment by wire transfer Crédit Mutuel RIB : 10278 07314 00020257701 89 BIC : CMCIFR2A IBAN : FR76 1027 8073 1400 0202 5770 189 Payment by check UBIQUICK SAS 16 rue Grenette – 69002 LYON, FRANCE Please note that by ordering from Reportlinker you are agreeing to our Terms and Conditions at http://www.reportlinker.com/index/terms Please fax this form to: Europe, Middle East and Africa : + 33 4 37 37 15 56 Asia, Oceania and America : + 1 (805) 617 17 93 Customer signature:   Japan IT Security End-User Survey 2014 (From Slideshare) Page 5/5

×