Research assistance

We can help you find what you need. Call us or write us:
US: 800.298.5699
Int'l: +1.240.747.3093
Need help in your search?
 

Matching geography

Reports matching your search in:
 
 

Join Alert Me now!

Receive bi-weekly email alerts on new market research

Sign up today!
 

IT Security: market research reports

1599

IT Security or Information Technology Security is defined as controlling access to sensitive electronic information so only those with a legitimate need to access it are allowed to do so. This seemingly simple organizational IT task has become a very complex process, involving systems that need to be continually updated, and processes that need to be constantly monitored for intrusion. Information security suggests that there are people from whom information must be protected.
There are three main objectives for information technology security: confidentiality, integrity and availability of data. Confidentiality is protecting access to sensitive data from those who don't have a legitimate need to view it. Integrity is ensuring that information is accurate and reliable and will not be modified in unexpected ways. Within a large organization, information technology can refer to laptop and desktop computers, and servers and routers, which form a computer network. Some organizations consider information technology to also include fax machines, phone and voice mail systems and mobile phones. A growing reliance on computers to work and communicate has made the control of computer networks an important part of information security. Most organizations have their own intranet, or local computer network, that links computers together to share resources, and support the communications of employees and others with a legitimate need for access.

RSS Feeds

IT Security market research reports and industry analysis

< prev 1  2  3  4  5  next >
Western Europe Government Sector IT Security Trends, 2012–2013
12/11/2012 | published by: IDC
... for service improvement, but they also create new threats and complexities due to the need to integrate and secure systems that are not natively interfaced. "Governments should consider federated IAM policies and solutions to enable ...  |  more...
$4,500.00
Worldwide IT Security Products 2012–2016 Forecast and 2011 Vendor Shares: Comprehensive Security Product Review
11/27/2012 | published by: IDC
... growth forecast for this market is shown for 2012–2016. A vendor competitive analysis, with vendor revenue and the market shares of the leading vendors, is provided for 2011. "Security products did well in 2011, with ...  |  more...
$4,500.00
A comprehensive study of the UK IT Security market in 2010, rating & valuing each of the 187 companies that operate in today's market
11/19/2012 | published by: Plimsoll Publishing Ltd.
... Identify under performing companies for acquisition Seek out successful companies to partner or do business with Understand the key movers and shakers in today’s market Each company receives the following unique features: A 5 year ...  |  more...
$350.00
Digital Economy - E-Security and E-Governance Insights
11/15/2012 | published by: Paul Budde Communication Pty Ltd
... The growth of e-commerce and m-commerce also relies upon on these elements.This report examines the growing importance of e-security and Internet governance and discusses how the world must work together to solve these issues. Latest ...  |  more...
$75.00
Gulf States IT Security End-User Survey, 2012: Internal Threats and Data Loss Prevention Immaturity
11/13/2012 | published by: IDC
... considered by these organizations to alleviate internal threats. "Companies in the Gulf acknowledge that internal threats are a major concern, but they need to start looking at creating policies and educating their employees on such ...  |  more...
$4,500.00
Global Unified Threat Management Market 2011-2015
11/9/2012 | published by: Infiniti Research Limited
... security technologies into a single networking device. The Global Unified Threat Management market has also been witnessing the increasing adoption of cloud-based UTM. However, the concerns about network performance could pose a challenge to the ...  |  more...
$1,500.00
South Africa End-User Survey, 2012: Security Spending Trends and Priorities
11/5/2012 | published by: IDC
... conducted in August 2012. "Security vendors are advised to develop security services and solutions that support the effectiveness of their products with professional cloud services. In addition, as virtualization, cloud, and mobile technologies become prevalent, ...  |  more...
$4,500.00
Indian IT & IT Enabled Services Deal Directory - Edition Q2'2012
11/1/2012 | published by: Ken Research
... IT Services and Products, IT Infrastructure Management Services Provider, Engineering Design Outsourcing, Business Process Outsourcing, Information Security Solutions, IT Hosting Services, Offshore Product Development, E-commerce and Internet, Cloud Computing, Online Shopping Portals, Online Entertainment Portals, ...  |  more...
$500.00
Managed Security Service Providers Market in the UK 2011-2015
10/19/2012 | published by: Infiniti Research Limited
... the increasing need to reduce the cost of IT security. The Managed Security Service Providers market in the UK has also been witnessing the growing popularity of cloud-based service offerings. However, the issues related to ...  |  more...
$1,500.00
Security and Trends: the Netherlands
9/23/2012 | published by: IDC
... published to provide the visitors of the IDC IT Security Conference in the Netherlands a high level overview of security issues and trends related to mobility, cloud, social business, and Big Data in the Netherlands.  |  more...
$500.00
IT Security Consulting in the US - Industry Market Research Report
8/13/2012 | published by: IBISWorld
... an increasing presence for businesses, the government and consumers alike, the need to secure private information has been constant, ensuring steady and quick revenue growth for the industry even during the recession. High-profile security breaches ...  |  more...
$910.00
Russia: IT Security Services 2012–2016 Forecast and 2011 Vendor Shares
8/1/2012 | published by: IDC
... functional market categories. The study aims to answer the following questions: What is the current size of the IT security services market in Russia? Which IT security services foundation markets are most important? What is ...  |  more...
$3,000.00
Japan IT Security End-User Survey 2012
8/1/2012 | published by: IDC
... IDC survey conducted in February 2012. As IT platforms like cloud, mobility, Big Data, and social networking continue to affect the security market, security threats are also getting more sophisticated and persistent. Meanwhile, Japan is ...  |  more...
$7,500.00
Japan IT Security 2012–2016 Forecast and 2011 Analysis
7/31/2012 | published by: IDC
... they even exploit artificial vulnerabilities, and are growing more complex as they combine various attack methods. User companies would require comprehensive security measures, because IT security measures work on the assumption that security incident will ...  |  more...
$5,000.00
IDC's Japan IT Security Taxonomy 2012
7/4/2012 | published by: IDC
... namely software licenses, virtualization, appliances, and software as a service (SaaS). This market definition is used in the market forecast and market share of IDC's Japan security market study published in 20112 "IDC's method of ...  |  more...
$5,000.00
IT Security in Western European Vertical Markets: An IDC Survey
6/18/2012 | published by: IDC
... Western European countries (France, Germany, Italy, Spain, and the U.K.) and among 2,044 companies with more than 20 employees. "The attention that Western European companies are paying toward security is rising due to the fact ...  |  more...
$5,500.00
IT Security Software Market in China 2011-2015
4/27/2012 | published by: Infiniti Research Limited
... regulatory requirements. The IT Security Software market in China has also been witnessing the integration of security solutions. However, the building strategic partnerships could pose a challenge to the growth of this market. TechNavio’s report, ...  |  more...
$1,500.00
Russia Security Hardware Market 2012–2016 Forecast and 2011 Vendor Shares
4/26/2012 | published by: IDC
... categories. The study aims to answer the following questions: What is the current size of the security hardware market in Russia? Which security appliance segments are most important? What is the current focus of spending? ...  |  more...
$3,000.00
Mobilution: Considerations for Riding the Wave
4/11/2012 | published by: IDC
... departments are no longer able to ignore the usage of mobile devices and should take another look at IT the security measures required. "IDC feels that the mobile phenomenon and the challenges it will come ...  |  more...
$4,500.00
Global IT Security Market 2011-2015
2/28/2012 | published by: Infiniti Research Limited
... IT security threats. The Global IT Security market has also been witnessing data-centric security. However, the increasing product development costs could pose a challenge to the growth of this market. TechNavio’s report, Global IT Security ...  |  more...
$1,500.00
IT Security Market in China 2011-2014
2/22/2012 | published by: Infiniti Research Limited
... compliance requirements. The IT Security market in China has also been witnessing the shift dimensions of the consumer market in the traditional security model. However, the localization of security solutions could pose a challenge to ...  |  more...
$1,500.00
Japan IT Security 2012 Top 10 Predictions
2/19/2012 | published by: IDC
... mobility, Big Data, and social network will affect the security segment in 2012. Security threats will become more sophisticated and complicated as they combine with new attack methods such as continuous targeted attacks. To minimize ...  |  more...
$3,500.00
Asia/Pacific (Excluding Japan) IT Security 2012 Top 10 Predictions: All Eyes on Us
2/1/2012 | published by: IDC
... turn out, as the European and North American markets struggle to stabilize their respective economies," says Ang Poon Wei, senior market analyst, Enterprise Infrastructure, IDC Asia/Pacific. "However, businesses should regain momentum, as Asia/Pacific shows that ...  |  more...
$3,500.00
Japan Cloud Security Solutions Trends 2011
1/16/2012 | published by: IDC
... secure content/threat management (SCTM), and security and vulnerability management (SVM) segments from 2011 to 2015. Security threats have undergone huge changes such as sudden proliferation of malware, targeted attacks, and increased threats in the mobile ...  |  more...
$5,000.00
Japan IT Security 2011–2015 Forecast Update
1/9/2012 | published by: IDC
... curtailed IT spending environment triggered by the recent earthquake, various security threats that capitalize on human mistakes and psychological errors due to human behavior have emerged as a result of social engineering. These threats target ...  |  more...
$2,500.00
< prev 1  2  3  4  5  next >