Académique Documents
Professionnel Documents
Culture Documents
Consulting Manager
IDC CEMA
www.idc.com
IDC IT Security Taxonomy
Trying to Stay Ahead of Threats
VPNs
Internal Security
breach
Government
regulations
External Security
breach
E-commerce
Audit results
Source: IDC 2004, interviews with 859 CIOs across North America
Security Investment Priorities Among
Large Organizations in North America
Source: IDC 2004, interviews with 859 CIOs across North America
Importance of Security SW in Select CEE
Countries, 2005
7%
6%
Sec sw as % of total sw spending
5%
4%
3%
2%
1%
0%
CEE Croatia Czech Hungary Poland Slovakia Romania Russia
100
90
80
70
% of Respondents
60
50
40
30
20
10
0
AV Firewall/VPN 3A Sec Admin Encryption
100
90
80
% of Respondents
70
60
50
40
30
20
10
0
Intrusion Det Incident Mgmnt Vulnerability Policy Compliance
Information-intensive Regulations
Sarbanes-Oxley
HIPAA
GLBA
California SB 1386
European Union Data Protection Directive
Basel II
The Mobile Enterprise
Increasing email Usage
Proliferation of Instant Messaging and P2P
Worldwide IT Security Software
Spending, 2005
Western Europe
$3.41 bn (28.6%)
CEE
North America $196.96 mn (1.6%)
$5.96 bn (50.0%)
Asia Pacific
$1.97 bn (16.5%)
MEA
$245.74 mn (2.1%)
Development in Progress
2004 Revenue = $5.29 million
McAfee
EnTrust
Checkpoin
t
30% Appliances
Threat Mgmnt
10%
Combined Regional
Spending of US$ 410.4
Million in 2004
0%
Relative Size of IT Spending, 2004
Where Do We Go From Here?
Perception of Security
2-Speed Europe
Business
We Should
We May Security Seen More as a
Business Issue End Up
Be Going
Here
Here Fragmented Supply Side
Competition at High-End Business
Supply of Middle-Market Gets Second Rules!
Services Best
Fragmented Consolidated
Fragmented Supply Side
Security Seen as an IT Issue
Now IT Driven
High Confusion Levels
We Are
Here
Rat Race IT
Questions?
Please email me at
tpedersen@idc.com