
How Global Threat Intelligence Vendors Address the Nuances of Regional Markets
Description
How Global Threat Intelligence Vendors Address the Nuances of Regional Markets
This IDC Market Perspective provides an overview of how different types of threat intelligence (TI) vendors offer their TI offerings and meet customer needs. Threat intelligence becomes a requisite today to empower faster threat investigations and efficacy of security operation centers, thus enhance the proactiveness of organization's cyberdefense capabilities. It also has included three detailed vendor examples to illustrate how the vendors position their TI offerings and go-to-market plans for their threat intelligence. "When studying various types of threat intelligence vendors, it is interesting to see big influence of security services vendors like global systems integrators, telecommunication providers, MSSPs in the TI market. It implies the importance of process and people, in addition to the technology and platform in order to make TI function powerful and actionable," says Cathy Huang, research director, Worldwide Security Services at IDC.
Please Note: Extended description available upon request.
This IDC Market Perspective provides an overview of how different types of threat intelligence (TI) vendors offer their TI offerings and meet customer needs. Threat intelligence becomes a requisite today to empower faster threat investigations and efficacy of security operation centers, thus enhance the proactiveness of organization's cyberdefense capabilities. It also has included three detailed vendor examples to illustrate how the vendors position their TI offerings and go-to-market plans for their threat intelligence. "When studying various types of threat intelligence vendors, it is interesting to see big influence of security services vendors like global systems integrators, telecommunication providers, MSSPs in the TI market. It implies the importance of process and people, in addition to the technology and platform in order to make TI function powerful and actionable," says Cathy Huang, research director, Worldwide Security Services at IDC.
Please Note: Extended description available upon request.
Table of Contents
12 Pages
- Executive Snapshot
- New Market Developments and Dynamics
- Introduction
- Global Threat Intelligence and Global Clientele
- Industry Dynamics
- Different Types of TI Vendors
- Professional Services Firms
- Global Systems Integrators
- Telecommunication Service Providers/Managed Security Services Providers
- Cloud Services Providers
- Threat Intelligence Start-Ups
- Digital Risk Protection Providers
- Detailed Vendor Examples
- Cyberint
- Cybersixgill
- CYFIRMA
- ESET Threat Intelligence Services
- Kaspersky
- Advice for the Threat Intelligence Provider
- Country-Specific Risk Map
- Articulate Results Along the Lines of the MITRE ATT&CK Framework
- Collaborate with Law Enforcement Agencies
- Persona-Based Dashboard
- Work with Other Cyberdefenders
- Expand the Use Case of Threat Intelligence
- Learn More
- Related Research
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.