Cybersecurity Solutions: A Model for Evaluating and Rationalizing Solutions for Your Organization

Cybersecurity Solutions: A Model for Evaluating and Rationalizing Solutions for Your Organization

This IDC Perspective discusses the deconstruction of cybersecurity solutions for CIOs and CISOs to help understand the technical nature of these solutions. The combination of new technologies with new weaknesses, intelligent adversaries that modify their behavior, and cloud architectures creates the need for full coverage of an IT environment. To understand the extent and efficacy of existing cybersecurity solutions, rationalize and optimize their deployment, and identify new solutions that may positively contribute to an enterprise cybersecurity program, organizations must develop a robust understanding of how a proposed solution is supposed to operate. This document deconstructs solution capabilities and provides a taxonomy of information that can be used to assess a program."The number of cybersecurity solutions is drastically increasing," said Pete Lindstrom, VP of Research, Enterprise/NextGen Security. "It is crucial to understand what capabilities the vendors have to ensure complete coverage of the IT environment."

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
Enter Positioning
Enter Venture Capital
Enter the Cloud and the Age of Product Rationalization
Advice for the Technology Buyer
Cybersecurity Function
Methods or Techniques
Operation/Output
Target Objects
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook