from DSSResources.com

Evolving IT security trends and challenges within today's organizations

NEW YORK, April 4, 2013 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Frost & Sullivan, "Evolving IT Security Trends and Challenges Within Today's Organizations" Publication date: December 2012, Report size: 45 pages, Report price: $ 10, 000

The customer research study investigates the IT security trends and challenges within today's organizations. In particular, it investigates deployment status of a variety of solutions, it explores which security solutions are being outsourced to managed security service providers (MSSPs), and it aims to understand the top security priorities within today's organizations. It appears that firewall/VPN remains the most prevalent security solution, while reduction of customer identity theft and fraud remains the top security priority, followed by reduction of law breaching behavior. Moreover, only one third of respondents report outsourcing IT security to MSSPs, to which firewall/VPN solutions are mostly outsourced.

Research Background
As the sophistication and frequency of cyber threats continues to increase, the information technology (IT) security industry faces the daunting challenge of defending against heterogeneous, complicated attack methods. Protection against data theft and distributed denial of service (DDoS) attacks remain a top priority within the industry.
Businesses of all sizes face unprecedented security risks with the emergence of innovative IT strategies such as the bring your own device (BYOD) trend, social media, and cloud computing. Weak mobile-device management and ineffective security solutions pose a high threat to personal and intellectual property (IP) data through the proliferation of mobile malware.
The severity of cyber threats against government systems became clear in light of the increased targeting of key energy and utility systems by supervisory control and data acquisition (SCADA) attacks. The United States Federal Bureau of Investigation (FBI) reported that, in 2011 alone, three U.S. cities experienced SCADA breaches.

TABLE OF CONTENTS

Research Objectives and Methods 6
Executive Summary 11
Security Systems' Deployment Status and Importance 13
•Currently Deployed Security Solutions: Total Sample 14
•Currently Deployed Security Solutions
Vertical Market Assessment: Education 15
•Currently Deployed Security Solutions
Vertical Market Assessment: Government 16
•Currently Deployed Security Solutions Vertical Market Assessment: Financial Services 17
•Currently Deployed Security Solutions Vertical Market Assessment: Healthcare 18
•Currently Deployed Security Solutions Vertical Market Assessment: Retail 19
Outsourcing to MSSPs 20
•Outsourcing to MSSPs 21
•Outsourcing to MSSPs Among Organizations Deploying Firewall/VPN Solutions 22
•Outsourcing to MSSPs Among Organizations Deploying Anti-Malware Solutions 23
•Outsourcing to MSSPs Among Organizations Deploying NAC Solutions 24
•Outsourcing to MSSPs Among Organizations Deploying DLP Solutions 25
•Outsourcing to MSSPs Among Organizations Deploying IDS/IPS Solutions 26
•Outsourcing to MSSPs Among Organizations Deploying UTM Solutions 27
•Outsourcing to MSSPs Among Organizations Deploying SIEM/Log Management Solutions 28
Top Security Priorities 29
•Top Security Priority: Total Sample 30
•Top Security Priorities by Deployed Solution 31
Firmographics 32
•Overall Workforce Trends 33
Appendix 39
The Frost & Sullivan Story 41

SOURCE Reportlinker



From http://www.researchandmarkets.com/reports/2396633/evolving_it_security_trends_and_challenges_within

As the sophistication and frequency of cyber threats continues to increase, the information technology (IT) security industry faces the daunting challenge of defending against heterogeneous, complicated attack methods. Protection against data theft and distributed denial of service (DDoS) attacks remain a top priority within the industry. Businesses of all sizes face unprecedented security risks with the emergence of innovative IT strategies such as the bring your own device (BYOD) trend, social media, and cloud computing. Weak mobile-device management and ineffective security solutions pose a high threat to personal and intellectual property (IP) data through the proliferation of mobile malware.

The severity of cyber threats against government systems became clear in light of the increased targeting of key energy and utility systems by supervisory control and data acquisition (SCADA) attacks. The United States Federal Bureau of Investigation (FBI) reported that, in 2011 alone, three U.S. cities experienced SCADA breaches.

Frost & Sullivan aims to understand the security trends within today's organizations,
specifically to:

Investigate the deployment of a variety of security solutions:

- Anti-malware
- Data loss prevention (DLP)
- Firewall/Virtual private network (VPN)
- Intrusion detection system (IDS) / Intrusion prevention system (IPS)
- Network access control (NAC)
- Security information and event management (SIEM)
- Unified threat management (UTM)

Arrive at a better understanding of the importance of security solutions

Explore which security solutions are being outsourced to managed security service
providers (MSSPs)

Understand the top security priorities of today's organizations

Evolving IT Security Trends and Challenges Within Today's Organizations

IT Decision Makers' Perspective

The customer research study investigates the IT security trends and challenges within today's organizations. In particular, it investigates deployment status of a variety of solutions, it explores which security solutions are being outsourced to managed security service providers (MSSPs), and it aims to understand the top security priorities within today's organizations. It appears that firewall/VPN remains the most prevalent security solution, while reduction of customer identity theft and fraud remains the top security priority, followed by reduction of law breaching behavior. Moreover, only one third of respondents report outsourcing IT security to MSSPs, to which firewall/VPN solutions are mostly outsourced.



DSS Home |  About Us |  Contact Us |  Site Index |  Subscribe | What's New
Please Tell 
Your Friends about DSSResources.COM Copyright © 1995-2015 by D. J. Power (see his home page). DSSResources.COMsm is maintained by Daniel J. Power. Please contact him at djpower1950 at gmail.com with questions. See disclaimer and privacy statement.