Cybersecurity Solutions: A Model for Evaluating and Rationalizing Solutions for Your Organization
This IDC Perspective discusses the deconstruction of cybersecurity solutions for CIOs and CISOs to help understand the technical nature of these solutions. The combination of new technologies with new weaknesses, intelligent adversaries that modify their behavior, and cloud architectures creates the need for full coverage of an IT environment. To understand the extent and efficacy of existing cybersecurity solutions, rationalize and optimize their deployment, and identify new solutions that may positively contribute to an enterprise cybersecurity program, organizations must develop a robust understanding of how a proposed solution is supposed to operate. This document deconstructs solution capabilities and provides a taxonomy of information that can be used to assess a program."The number of cybersecurity solutions is drastically increasing," said Pete Lindstrom, VP of Research, Enterprise/NextGen Security. "It is crucial to understand what capabilities the vendors have to ensure complete coverage of the IT environment."
Please Note: Extended description available upon request.
Learn how to effectively navigate the market research process to help guide your organization on the journey to success.Download eBook