By using this site, you agree to the IDC Privacy Policy

TECH SUPPLIER Sep 2019 - IDC Survey Spotlight - Doc # EUR145474219

How can European Enterprises Drive Security Operational Excellence to Address Their Current Limitations?

By: Dominic TrottResearch Director, European Security & Privacy


This IDC Survey Spotlight illustrates the top challenges limiting the ability of information security teams to improve their capabilities, and how these can be overcome to drive business benefits. It draws upon IDC's European Security Strategies Survey, which was completed in July 2019. The purpose of the survey was to gain insights into the business and technical challenges, priorities, and strategic objectives of enterprises with respect to their security, privacy, and risk management activities. The survey gathered detailed replies from 700 respondents across a wide range of industries across Western, Central, and Eastern Europe.

"Key limitations faced by security teams tend to relate to bottlenecks created by unwarranted complexity. This is especially linked to the evolution of security product environments, which have typically revolved around the incremental addition of new point solutions. While a good approach when considering individual security risks, this is not an optimal approach when considering the security environment as a whole — particularly, the implications for the security team that needs to monitor and manage it. Consequently, when IDC investigated the key drivers for security vendor selection, the number 1 priority is unified security, that is, they search for products that work well with their existing environment of tools, and that can even help to reduce the number of products. This reduction of complexity can help security teams to contribute business benefits such as cost reduction, operational efficiency, and resource utilization," said Dominic Trott, research director, European Security and Privacy.


Subscriptions Covered

European Security Strategies

Regions Covered

Western Europe

Topics Covered

Information protection and control

  • 2 slides

Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.

Related Links

Do you have questions about this document
or available subscriptions?

Contact Us