SlideShare a Scribd company logo
1 of 9
Download to read offline
SECURITY PRIORITIES
Exploring security roles and technologies that keep the
enterprise functioning.
2018
IDG Communications, Inc.
2
Purpose and Methodology
Source: 2018 IDG Security Priorities Survey
IDG Communications, Inc.
3
12%
39%
SMBEnterprise
Security is a
standalone department
88%
61%
SMBEnterprise
IT and security are managed
together as one department/function
More Likely to See Separate Security
Organization in Enterprise Businesses
Source: 2018 IDG Security Priorities Survey
Q. How is the security function handled at your company?
IDG Communications, Inc.
4
Zero Trust & Blockchain
Top New Security Activity
Source: 2018 IDG Security Priorities Survey
Q. Which option best describes your current activity for each of the following security solutions and services?
30%
30%
31%
33%
34%
36%
36%
38%
38%
39%
42%
9%
14%
11%
11%
15%
12%
16%
13%
15%
7%
10%
17%
22%
11%
24%
20%
12%
16%
22%
19%
7%
8%
6%
7%
5%
10%
6%
5%
7%
7%
9%
4%
5%
38%
27%
43%
22%
24%
35%
25%
20%
19%
42%
35%
Biometrics
Data discovery solutions
Micro-segmentation
Security intelligence services
Cloud-based cybersecurity services
Cloud access security brokers
Big data analytics
Cloud data protection
Behavior monitoring & analysis
Blockchain
Zero trust technologies
On my radar or actively researching Piloting In production Upgrading/refining Not interested
IDG Communications, Inc.
5
Security Budgets Continue to Rise
Source: 2018 IDG Security Priorities Survey
Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months?
52%
2%
46%
Remain
the same
Enterprise 38%
SMB 53%
Increase
Enterprise 60%
SMB 45%
Decrease
Enterprise 2%
SMB 3%
IDG Communications, Inc.
6
Best Practices & Compliance
Fuel Security Spending
Source: 2018 IDG Security Priorities Survey
Q. Which of the following factors help determine the priority of your security spending?
22%
22%
29%
33%
36%
69%
74%
Partner mandates
Responding to a security incident that happened
in a business partner organization
Responding to a security incident that
happened in another organization
Mandates from the Board of Directors
Responding to a security incident that
happened in your organization
Compliance mandates
Best practices
IDG Communications, Inc.
7
Source: 2018 IDG Security Priorities Survey
Q. Which department holds primary responsibility for each of the following IT security areas? (showing the top opportunistictechnologies from slide 21)
Opportunistic Solutions Show Split Involvement
IDG Communications, Inc.
8
Compliance & External Threats Continue
to Eat-Away at Strategic Efforts
Source: 2018 IDG Security Priorities Survey
Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks?
14%
14%
15%
15%
15%
16%
16%
18%
22%
23%
28%
32%
Employee retention/hiring enough skilled workers
Institutional silos
Managing security/addressing risks around mobile devices, BYOD
Addressing security risks in disruptive technologies
Security around technology as a service/cloud computing
Cyber threats from inside the organization/Insider threats
Shadow IT
Ensuring customer privacy confidentiality
Budgetary constraints/demonstrating ROI
Employee awareness and cooperation issues
Cyber threats from outside the organization/APTs, DDoS
Meeting governance & compliance regulations
IDG Communications, Inc.
9
Continue the Conversation
To get results from IDG research when it happens,
or any other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletter
Visit us on LinkedIn here:
https://www.linkedin.com/company-beta/3731/
To receive a briefing on the full results from this study, or for more information, please contact your
IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on this site
under marketing tools, or contact us. We have additional primary research, blogs and white papers
to make you smarter about tech decision makers, and targeted products and programs to help you
reach them!

More Related Content

What's hot

What's hot (20)

IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018
 
Cloud Insights 2018
Cloud Insights 2018Cloud Insights 2018
Cloud Insights 2018
 
2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
2020 B2C Audience Portait Infographic
2020 B2C Audience Portait Infographic2020 B2C Audience Portait Infographic
2020 B2C Audience Portait Infographic
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
Technology Purchase Process by Specific Tech Solutions
Technology Purchase Process by Specific Tech Solutions Technology Purchase Process by Specific Tech Solutions
Technology Purchase Process by Specific Tech Solutions
 
Exploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase ProcessExploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase Process
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 

Similar to 2018 Security Priorities

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Harry Gunns
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Assespro Nacional
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
MichelleTartalio
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
CompTIA
 

Similar to 2018 Security Priorities (20)

2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
2018 IDG Security Priorities Infographic
2018 IDG Security Priorities Infographic2018 IDG Security Priorities Infographic
2018 IDG Security Priorities Infographic
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
 
2019 IDG Role of the Developer Study
2019 IDG Role of the Developer Study2019 IDG Role of the Developer Study
2019 IDG Role of the Developer Study
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing Innovations
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 

More from IDG

State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 

More from IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 

Recently uploaded

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 

Recently uploaded (20)

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 

2018 Security Priorities

  • 1. SECURITY PRIORITIES Exploring security roles and technologies that keep the enterprise functioning. 2018
  • 2. IDG Communications, Inc. 2 Purpose and Methodology Source: 2018 IDG Security Priorities Survey
  • 3. IDG Communications, Inc. 3 12% 39% SMBEnterprise Security is a standalone department 88% 61% SMBEnterprise IT and security are managed together as one department/function More Likely to See Separate Security Organization in Enterprise Businesses Source: 2018 IDG Security Priorities Survey Q. How is the security function handled at your company?
  • 4. IDG Communications, Inc. 4 Zero Trust & Blockchain Top New Security Activity Source: 2018 IDG Security Priorities Survey Q. Which option best describes your current activity for each of the following security solutions and services? 30% 30% 31% 33% 34% 36% 36% 38% 38% 39% 42% 9% 14% 11% 11% 15% 12% 16% 13% 15% 7% 10% 17% 22% 11% 24% 20% 12% 16% 22% 19% 7% 8% 6% 7% 5% 10% 6% 5% 7% 7% 9% 4% 5% 38% 27% 43% 22% 24% 35% 25% 20% 19% 42% 35% Biometrics Data discovery solutions Micro-segmentation Security intelligence services Cloud-based cybersecurity services Cloud access security brokers Big data analytics Cloud data protection Behavior monitoring & analysis Blockchain Zero trust technologies On my radar or actively researching Piloting In production Upgrading/refining Not interested
  • 5. IDG Communications, Inc. 5 Security Budgets Continue to Rise Source: 2018 IDG Security Priorities Survey Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months? 52% 2% 46% Remain the same Enterprise 38% SMB 53% Increase Enterprise 60% SMB 45% Decrease Enterprise 2% SMB 3%
  • 6. IDG Communications, Inc. 6 Best Practices & Compliance Fuel Security Spending Source: 2018 IDG Security Priorities Survey Q. Which of the following factors help determine the priority of your security spending? 22% 22% 29% 33% 36% 69% 74% Partner mandates Responding to a security incident that happened in a business partner organization Responding to a security incident that happened in another organization Mandates from the Board of Directors Responding to a security incident that happened in your organization Compliance mandates Best practices
  • 7. IDG Communications, Inc. 7 Source: 2018 IDG Security Priorities Survey Q. Which department holds primary responsibility for each of the following IT security areas? (showing the top opportunistictechnologies from slide 21) Opportunistic Solutions Show Split Involvement
  • 8. IDG Communications, Inc. 8 Compliance & External Threats Continue to Eat-Away at Strategic Efforts Source: 2018 IDG Security Priorities Survey Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks? 14% 14% 15% 15% 15% 16% 16% 18% 22% 23% 28% 32% Employee retention/hiring enough skilled workers Institutional silos Managing security/addressing risks around mobile devices, BYOD Addressing security risks in disruptive technologies Security around technology as a service/cloud computing Cyber threats from inside the organization/Insider threats Shadow IT Ensuring customer privacy confidentiality Budgetary constraints/demonstrating ROI Employee awareness and cooperation issues Cyber threats from outside the organization/APTs, DDoS Meeting governance & compliance regulations
  • 9. IDG Communications, Inc. 9 Continue the Conversation To get results from IDG research when it happens, or any other news, follow us on Twitter: @IDGWorld ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG : Sign up to receive our monthly marketing newsletter at www.idg.com/newsletter Visit us on LinkedIn here: https://www.linkedin.com/company-beta/3731/ To receive a briefing on the full results from this study, or for more information, please contact your IDG sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools, or contact us. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs to help you reach them!