Market Research Logo

Japan IT Security End-User Survey 2015

Japan IT Security End-User Survey 2015

This IDC study analyzes and reports the results of a survey on the implementation of enterprise IT security solutions in Japan conducted by IDC in January 2015.

The current survey results show that the convergence time when a security threat has been detected is much longer and that the security damage is being increasingly reported by third parties. These attacks not only target PCs and file servers but also devices used in industries such as point of sale (POS) and ATM, and have expanded to include production line as well, thus showing that the damage inflicted is only growing further. Various laws and regulations have begun to be enforced within Japan such as the implementation of the Cybersecurity Basic Law, launch of My Number system, and amendments to Personal Information Protection Law, among others.

It is necessary for cyber-related businesses and key infrastructure operators to collaborate with local and national governments as well as engage in voluntary efforts to enforce basic cybersecurity law. Other general companies also ought to step up voluntary efforts toward the implementation of cybersecurity. Moreover, based on the "laws on the use of number to identify specific individuals in administrative matters" after the enforcement of "My Number " system, all enterprises are required to follow certain safety management procedures regarding the "My Number" or the "My Number" incorporated into their database. The recent amendments to the Personal Information Protection Act also dictates that enterprises that handle relatively few personal information will also be subjected to the regulations of Personal Information Protection Law. Security incidents that occur within an enterprise can potentially magnify in scale and size due to the advancing sophisticated nature of the attacks and may have serious impact on business continuity as soon as it surfaces. "It is necessary for a management layer that deals with corporate governance to understand the gravity of security incidents and take quick decisions by visualizing the nature of security threats. Visualization of security threats will enable the management layer to correlate the severity of security incidents with the governance, risk, and compliance policies of the company. Thus, it is important for a company to understand the nature and degree of risk posed by security threats," says Tsuneo Tosaka, research manager, Software & Security, IDC Japan.

All of the following sections are, however, fully translated:

  • IDC Opinion
  • Methodology
  • Executive Summary
  • Essential Guidance
  • Synopsis
Please Note: Extended description available upon request.


IDC Opinion
In This Study
Methodology
Company Size
Profiles of Survey Respondents and Companies
Executive Summary
IT Security Spending
IT Security Breaches
Focal Areas of IT Security Spending
IT Security Solutions Implementation
Solutions to Enhance Compliance
Use of IT Security Services
Situation Overview
Future Outlook
Essential Guidance
Learn More
Related Research
Synopsis
Figure: Role of Respondents
Figure: Respondent Distribution by Level of Authority in Implementation of IT Security Solutions
Figure: Appointment of CIO and CSO
Figure: Respondent Profile Distribution by Industry
Figure: Respondent Profile Distribution by Company Size
Figure: Information Security Spending for FY14
Figure: Ratio of Security-Related Spending to Overall Capex, FY13 and FY14
Figure: IT Security Related Spending YoY Increase/Decrease for FY14, January 2015 Survey
Figure: IT Security-Related Spending YoY Increase/Decrease Forecast for FY15, January 2015 Survey
Figure: IT Security-Related Spending YoY Increase/Decrease from FY13–FY15, Comparison of Previous (January 2014) and Current Survey (January 2015)
Figure: IT Security-Related Spending YoY Change Forecast for FY15, January 2015 Survey: By Industry
Figure: Information Security Related Spending YoY Change Forecast for FY15, January 2015 Survey: By Company Size
Figure: Security Damage
Figure: Assets Affected by Security Violation: Comparison of Previous Survey (January 2014) and Current Survey (January 2015)
Figure: Detection of Security Violation: Comparison of Previous Survey (January 2014) and Current Survey (January 2015)
Figure: Time Taken to Resolve Security Breaches from Discovery: Comparison of Previous (January 2014) and Current Survey (January 2015)
Figure: Level of Concern Regarding Information Security Threat
Figure: Challenges Faced During Security Implementation
Figure: Future IT Spending Focal Areas
Figure: Implementation Rate of IT Security Solutions
Figure: Firewall/VPN Implementation
Figure: Firewall/VPN Implementation: By Industry
Figure: Firewall/VPN Implementation: By Company Size
Figure: Firewall/VPN Implementation (Appliance and Software)
Figure: Firewall/VPN Implementation (Cloud Services, Managed Security Services, and Internal System)
Figure: Threat Management Solutions (Unauthorized Intrusion Detection and Block Using IDS/IPS, UTM, and Others) Implementation
Figure: Threat Management Solutions (Unauthorized Intrusion Detection and Block Using IDS/IPS, UTM, and Others) Implementation: By Industry
Figure: Threat Management Solutions (Unauthorized Intrusion Detection and Block Using IDS/IPS, UTM, and Others) Implementation: By Company Size
Figure: Threat Management Solutions (Unauthorized Intrusion Detection and Block Using IDS/IPS, UTM, and Others) Implementation (Appliance and Software)
Figure: Threat Management Solution (Unauthorized Intrusion Detection and Block Using IDS/IPS, UTM, and Others) Implementation (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Single Sign-On and Authorization/Authentication System Implementation
Figure: Single Sign-On and Authorization/Authentication Systems: By Industry
Figure: Single Sign-On and Authorization/Authentication Systems: By Company Size
Figure: Single Sign-On and Authorization/Authentication Systems: By Implementation Area
Figure: Single Sign-On and Authorization/Authentication Systems Implementation Methods (Cloud Services, Managed Security Services, and Internal System)
Figure: User Provisioning Systems (Such as User Registration and Deletion) Implementation
Figure: User Provisioning Systems (Such as User Registration and Deletion) Implementation: By Industry
Figure: User Provisioning Systems (Such as User Registration and Deletion) Implementation: By Company Size
Figure: User Provisioning Systems (Such as User Registration and Deletion) Implementation Methods (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Client PC Antivirus Solutions Implementation
Figure: Client PC Antivirus Solutions Implementation: By Industry
Figure: Client PC Antivirus Solutions Implementation: By Company Size
Figure: Client PC Antivirus Solutions Utilization Method (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Network Gateway and Server Antivirus Solutions Implementation
Figure: Network Gateway and Server Antivirus Solutions Implementation: By Industry
Figure: Network Gateway and Server Antivirus Solutions Implementation: By Company Size
Figure: Network Gateway and Server Antivirus Solutions Utilization Methods (Appliances and Software)
Figure: Network Gateway and Server Antivirus Solutions Utilization Methods (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Virtual Server Security Solutions Implementation
Figure: Virtual Server Antivirus Solution Implementation: By Company Size
Figure: Messaging Security Solutions (Such as Antispam) Implementation
Figure: Messaging Security Solutions (Such as Antispam) Implementation: By Industry
Figure: Messaging Security Solutions (Such as Antispam) Implementation: By Company Size
Figure: Messaging Security Solutions (Such as Antispam) Utilization Methods (Appliance and Software)
Figure: Messaging Security Solutions (Such as Antispam) Utilization Methods (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Web Security Solutions (Such as URL Filtering Control) Implementation
Figure: Web Security Solutions (Such as URL Filtering Control) Implementation: By Industry
Figure: Web Security Solutions (Such as URL Filtering Control) Implementation: By Company Size
Figure: Web Security Solutions (Such as URL Filtering Control) Utilization Methods (Appliances and Software)
Figure: Web Security Solutions (Such as URL Filtering Control) Utilization Methods (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Non-Signature-Type External Threat Solutions Implementation
Figure: Non-Signature-Type External Threat Solutions Implementation: By Industry
Figure: Non-Signature Type External Threat Solutions Implementation: By Company Size
Figure: Non-Signature-Type External Threat Solutions Implementation (Appliance and Software)
Figure: Non-Signature-Type External Threat Solutions Implementation (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Security Management (Security Information and Event Management) Solutions Implementation
Figure: Security Management (Security Information and Event Management) Solutions Implementation: By Industry
Figure: Security Management (Security Information and Event Management) Solutions Implementation: By Company Size
Figure: Security Management (Security Information and Event Management) Utilization Methods (Appliance and Software)
Figure: Security Management (Security Information and Event Management) Utilization Methods (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Security Management (Policy Management and Governance, Risk, and Compliance Management) Solutions Implementation
Figure: Security Management (Policy Management and Governance, Risk, and Compliance Management) Solutions Implementation: By Industry
Figure: Security Management (Policy Management and Governance, Risk, and Compliance Management) Solutions Implementation: By Company Size
Figure: Security Management (Policy Management and Governance, Risk, and Compliance Management) Utilization Methods (Appliance and Software)
Figure: Security Management (Policy Management and Governance, Risk, and Compliance Management) Utilization Method (Cloud Services, Managed Security Services, and Internal Systems)
Figure: Vulnerability Management (Vulnerability Assessment such as Quarantine Systems) Implementation
Figure: Vulnerability Management (Vulnerability Assessment such as Quarantine Systems) Solutions Implementation: By Industry
Figure: Vulnerability Management (Vulnerability Assessment such as Quarantine Systems) Solutions Implementation: By Company Size
Figure: Vulnerability Management (Vulnerability Assessment such as Quarantine Systems) Utilization Methods (Appliance and Software)
Figure: Vulnerability Management (Vulnerability Assessment such as Quarantine Systems) Utilization Methods (Cloud Services, Managed Security Services, and Internal System)
Figure: Focus On IT Security Solutions for Personal Information Protection Law Compliance
Figure: Client PC Information-Leak Prevention Solutions (Encryption Measures) Implementation
Figure: Client PC Information-Leak Prevention Solutions (Encryption Measures) Implementation: By Industry
Figure: Client PC Information-Leak Prevention Solutions (Encryption Measures) Implementation: By Company Size
Figure: Client PC Information-Leak Prevention Solutions (Non-Encryption Measures such as Device Control) Implementation
Figure: Client PC Information-Leak Prevention Solutions (Non-Encryption Measures such as Device Control) Implementation: By Industry
Figure: Client PC Information-Leak Prevention Solutions (Non-Encryption Measures such as Device Control) Implementation: By Company Size
Figure: Gateway Type Information-Leak Prevention Solutions (eMail and Web Browsing) Implementation
Figure: Gateway Type Information-Leak Prevention Solutions (eMail and Web Browsing) Implementation: By Industry
Figure: Gateway Type Information-Leak Prevention Solutions (eMail and Web Browsing) Implementation: By Company Size
Figure: Gateway Type Information-Leak Prevention Solutions (eMail and Web Browsing) Implementation Methods (Appliance and Software)
Figure: Gateway Type Information-Leak Prevention Solutions (eMail and Web Browsing) Implementation Methods (Cloud Services, Managed Security Services, and Internal Systems)
Figure: DLP Product Implementation
Figure: DLP Product Implementation: By Industry
Figure: DLP Product Implementation: By Company Size
Figure: Reasons for Implementing DLP Product
Figure: Challenges Faced in DLP Product Implementation
Figure: IT Security Services Utilization Trends
Figure: IT Security Services Desired for Future Use: By Company Size
Figure: Managed Security Services Utilization in Security System Management
Figure: Managed Security Services Utilization of Security System Management: By Industry
Figure: Managed Security Services Utilization of Security System Management: By Company Size
Figure: Managed Security Services Utilization of Security System Management: By Function
Figure: Level of Concern Regarding Managed Security Services in Security System Management: By Issue
Figure: Security Consulting Services Utilization Trends
Figure: Security Consulting Services (Security System Planning and Strategizing) Utilization: By Company Size
Figure: Security Consulting Services (Security System Audit) Utilization: By Company Size
Figure: Security Consulting Services (Security System Analysis/Assessment) Utilization: By Company Size
Figure: Security Consulting Services (Incident Response Service) Utilization Trends: By Company Size

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report