IDC's European Privacy and Data Security service focuses on the impacts of a variety of data protection and privacy legislation on the technology sector, affecting security markets, plus cloud, storage, analytics, IoT, mobility, print, business applications and so on. The benefits to subscribers include strategy advice on the opportunity from changes in legislation, competitive information, market sizing, and guidance on the detail of the legislation. GDPR, the NIS Directive, and the ePrivacy Regulation (PECR) are the main focuses, but there are other influences that also impact technology markets.
European Privacy and Data Security
Markets and Subjects Analyzed
- Data classification policy & compliance
- Encryption/Rights management (drives/files/folders/DRM)
- Data loss protection (discovery/monitoring)
- Database protection (monitor / tokenize / encrypt)
- Crypto/Key management (HSMs/PKI/TPMs)
- Cloud and datacenter adoption impacts
- The General Data Protection Regulation, and what comes next
- Privacy shield, binding corporate rules and contract clauses
- The Network & Information Security Directive
- The ePrivacy Regulation
- Digital Single Market influences
- Impacts of legislation on specific technologies
- Functional Separation - Protecting Big Data in a Privacy Conscious World
- Comparison of Major Cloud Codes of Conduct
- Privacy Management - So much more than you think
- The What & Why of Pseudonymisation
- End-to-end Encryption
- What Next for Privacy - Post GDPR?
- Data Classification
- Data Loss Prevention Forecast
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- How big is the opportunity from changes to European legislation?
- What are the different adoption rates between countries and between industries in DP-related technology?
- What legislative constraints apply to cloud service providers, and how can these be overcome?
- What steps should technology vendors take to ensure their own compliance with EU laws?
- How are enterprises seeking to protect their data while adopting digital transformation technologies?
- What impact does EU legislation have on global firms?
Accenture plc, Actifio, Inc., Amazon Web Services Inc., Arcserve LLC, Atos S.A., BT Group plc, BigID Inc., Blackberry Ltd., Box, Inc., CipherCloud, Inc., Cisco Systems, Inc., Clearswift Ltd., Commvault Systems, Inc., Dell EMC, Deloitte LLP, Deutsche Telekom AG, Digital Guardian, Inc., Dropbox Inc., Ernst & Young Global Limited, FireEye, Inc., Forcepoint LLC, Fortinet, Inc., Fujitsu Limited, Gemalto N.V., Ghostery Inc., Google Inc., HP Inc., Hewlett Packard Enterprise, IBM, KPMG International, Kaspersky Lab, Inc., McAfee LLC, Micro Focus International plc, Microsoft Corporation, NetApp, Inc., OneTrust LLC, Palo Alto Networks, Inc., PricewaterhouseCoopers LLP, RSA Security LLC, Samsung, Skyhigh Networks Inc., Sophos Plc, Symantec Corporation, Syncplicity Inc., Telefonica S.A., Thales SA, Trend Micro Incorporated, VMware, Inc., Varonis Systems Inc., Veritas AG