Market Research Logo

IDC Study: U.S. Private Sector Cybersecurity Best Practices

IDC Study: U.S. Private Sector Cybersecurity Best PracticesThis IDC study on the cybersecurity practices of U.S. businesses reveals a wide spectrum of attitudes and approaches to the growing challenge of keeping corporate data safe. While the minority of cybersecurity "best practitioners" set an admirable example, the study findings indicate that most U.S. companies today are underprepared to deal effectively with potential security breaches from outside or inside their firewalls. There was a frequently cited belief among the interviewed firms that they would inevitably be breached; yet many of the firms seemed content to wait until then to focus harder on cybersecurity."The study findings imply that the U.S. private sector is more exposed to cybersecurity threats than it needs to be, given the best practices that are available today," said Steve Conway, IDC research vice president, High Performance Data Analysis. "IDC believes that this situation will improve substantially only in response to more pervasive, serious breaches — and breaches will become more frequent and damaging during the next 10 years.""The benefits of analytics, coupled with 3rd Platform delivery channels, will cause the rapid maturation of analytics platforms and further development of hybrid solution/managed security services (MSS)," said Sean Pike, IDC program director, eDiscovery and Information Governance. "As use cases for analytics platforms mature and competition creates price pressure, organizations will likely continue to turn toward these solutions in order to round out existing security resources."

Please Note: Extended description available upon request.


IDC Opinion
In This Study
Situation Overview
Study Findings
Best (and Worst) Cybersecurity Practitioners
Overarching Philosophies on IT Security
Metrics Used by Companies
Network Intrusions
Reactions to Highly Visible Breaches
Internal Threats
Balancing Security, Costs, and Business Disruption
Firms with Many Access Points
Standardization Versus Heterogeneity
Access from Network Edges
Use of Analytics for Cybersecurity
Forensics
Abandoned Practices and Tools
Responses to Actual Breaches
Future Outlook
Essential Guidance
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report