IDC MaturityScape IT Security - Maturity Adoption Trends in New Zealand, 2015 - Synopsis
1. IDC MaturityScape: IT Security
Maturity Adoption Trends in New Zealand, 2015
Donnie Krassiyenko, IT Services Market Analyst
Adam Dodds, IT Services Research Manager
March 2015
3. Table of Contents
IDC's IT Security MaturityScape....……...………….……………………………..............4
IT Security Maturity Adoption Trends in New Zealand
Assessed vs. Perceived Maturity………….………………………………………….....................5
Analysis of Perceptual Gap ….……………………………………………………………..............6
Maturity by Business Size.….…….……………………………………………….………………...7
Maturity by Industry.….…………………………………….……………….………..………………8
Use of IT Security: External vs. Internal.………………………………………................9
Security Services Contract Preferences………………………………………………….10
Budget Plans
Managed Security...…………………………………………………...........................................11
Business Continuity and Disaster Recovery Services...........................................................12
New Zealand Technology Investment Shift
Radar...………………………………………….........................................................................13
Ripple Visualisation................................................................................................................14
Security Analysis...………………………………………………….............................................15
Essential Guidance
For Technology Buyers........….……..…………………....……………………………………….17
For Service Providers........….……..………………………....………………………………..….18
Read More: Related Research...….……….….….….…………………….....................20
3
4. 4
About IDC’s IT Security MaturityScape
Question: For IT Security, please indicate the level of your company’s use?
New Zealand organisations are maturing quickly in the adoption of the core categories of the 3rd platform (Mobile, Cloud, Social and Big Data) coupled
with the requirements of Security. Establishing a framework for understanding an organisations maturity is important as size and industry analysis are
normalising and provide only a partial view of the picture. Maturity has two categories:
Assessed view of maturity – This is where IDC assesses the organisation’s adoption of IT Security. It is quantitative in nature and is subject to a
number of IDC assumptions.
Perceived view of maturity – The organisation provides a view of where they perceive themselves to be in the adoption process of IT Security. It is
qualitative in nature and is subject to respondents’ bias.
The difference between organisations’ assessed position and their perceived positions, as shown above, is important as it provides a framework for road-
mapping the organisation and service provider engagement. Organisations often have a higher perception of their maturity than the assessed. Often
service providers treat the organisation based on the organisations self-perception and this creates an expectation/perception gap. The graph shows how
New Zealand organisations overestimate their adoption of security. Analysis on the next page provides a deeper insight into the current situation.
Ad Hoc Opportunistic Repeatable Managed Optimised
Assessed Maturity
Perceived Maturity*
Source (assessed): IDC New Zealand IT Services Heatmap 2014
Source (perceived): IDC New Zealand IT Services Ecosystem 2014 (n=337)
IT Security Maturity Adoption Trends in New Zealand
Assessed View vs. Perceived View
*Note: 18% of respondents didn’t manage to identify their perceived maturity level and, thus, are excluded from the graph.
5. 5
Questions: What are the top services that currently help your organisation’s IT needs? As part of your business objectives, are you looking to invest in any of the
following solutions over the next 12-24 months?* By perceived maturity stage of security.
The circles below represent visualisation of the investment radars from the previous slide; they are clustered by current/future-oriented focus and security layers. The
best way to read this graph is to compare colour differences between the left and the right circles and note how, for instance, DaaS/WaaS lost its positions over the
time, while Mobility gained significant interest across all maturity layers. Security-related implications of this shift are discussed in the following slides.
Technology Investment Shift: Ripple Visualisation