TECH BUYER Dec 2019 - IDC Perspective - Doc # US45717819

Cybersecurity Solutions: A Model for Evaluating and Rationalizing Solutions for Your Organization

By: Pete LindstromVice President of Research, Enterprise / NextGen Security, Robyn WesterveltResearch Director, Security & Trust


This IDC Perspective discusses the deconstruction of cybersecurity solutions for CIOs and CISOs to help understand the technical nature of these solutions. The combination of new technologies with new weaknesses, intelligent adversaries that modify their behavior, and cloud architectures creates the need for full coverage of an IT environment. To understand the extent and efficacy of existing cybersecurity solutions, rationalize and optimize their deployment, and identify new solutions that may positively contribute to an enterprise cybersecurity program, organizations must develop a robust understanding of how a proposed solution is supposed to operate. This document deconstructs solution capabilities and provides a taxonomy of information that can be used to assess a program.

"The number of cybersecurity solutions is drastically increasing," said Pete Lindstrom, VP of Research, Enterprise/NextGen Security. "It is crucial to understand what capabilities the vendors have to ensure complete coverage of the IT environment."



Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.

Related Links

Do you have questions about this document
or available subscriptions?

Contact Us