IDC Research Types
Analyst
Analyst Profile
Provides complete background information on an IDC analyst. Each profile provides a biography, a notable quotation, a frequently asked question relevant to the particular analyst's focus, and a list of research authored by that analyst.
Team Profile
Lists the analyst members of a topical team. Outlines general areas of coverage and any specialties.
Briefs
Flash
Provides rapid IDC insight and analysis about a significant industry event or conference, merger or acquisition, product announcement, or other fast-breaking news affecting the IT market.
Forecast Update
Provides a short, quick look at an updated forecast and the changed assumptions behind the update. It updates a market forecast published in the same calendar year, identifies changed and key forecast assumptions, and highlights actions for participants to consider in light of the changes.
IDC Insight
Provides coverage and analysis of an industry event, new product or service, or a company announcement or development.
Update
Provides brief overview coverage of what is happening in a market.
Vendor Profiles
Provides a concise, hard-hitting profile of an emerging vendor. A profile will highlight new players and technologies and the potential paradigm shifts or disruptions a vendor represents.
Daily Graphics
Daily Graphic
Illustrates IDC's keen analysis of major market trends in downloadable PowerPoints. Available as a free download the day it appears, an IDC Daily Graphic provides valuable material for speeches and strategic planning.
Event Proceedings
Event Proceeding
Provides published slides, audio, and other materials from IDC and Insights Web conferences, briefings, forums, or other events.
Events
Conference
Delivers dependable, relevant, and high-impact data and insight to help organizations make sound business and technology decisions. eBusiness executives, IT professionals, IT suppliers, and services suppliers benefit from the strategic insight and networking opportunities IDC conferences offer. Generally, all presentation slides are available online, and for most conferences, streaming audio of key discussions is available as well.
Web Conference
Focuses on significant trends and paradigm shifts. Each Web conference will provide attendees with leading-edge market information that will enable them to make smart business decisions. For those unable to attend in person or those wishing to review the content presented, these synchronized multimedia presentations are available online.
IDC DecisionScapes
IDC FutureScape
Serves as a framework for IT/tech professionals' IT strategy and planning for the next one to three years. It lists IDC's top 10 worldwide technology trends for the coming one to three years in a given research area and includes related drivers, projected IT/business strategy impact, and guidance.
IDC MarketScape
Helps IT/tech professionals develop a short list of suitable suppliers when selecting a vendor. Provides an unbiased assessment of tech suppliers in terms of offerings, strategy, capabilities, and other important factors in a given technology area.
IDC MaturityScape
Describes five stages of "maturity" or capability for a particular technology area, helps IT/tech professionals understand where their organizations fit within those stages, and provides guidance on key components for planning successful improvements to a tech initiative.
IDC MaturityScape Benchmark
Helps IT/tech professionals to benchmark their maturity against peers, develop a business case for a tech initiative, and build consensus about where critical IT investments should be made. Presents quantitative research results that show the market distribution for a given tech initiative across the five stages of maturity presented in the related IDC MaturityScape. Shows the results and components of particularly successful initiatives.
IDC PeerScape
Gives IT/tech professionals insight into best practices (and practices to avoid) by providing specific use case examples implemented by peers. Identifies practices that have the most impact on the success of a tech or business initiative, and provides actionable guidance for each practice.
IDC PlanScape
Helps IT/tech professionals to justify and plan a business and/or technology investment or opportunity by exploring why, what, who, and how (these are also the main section headings). Presents key players, critical success factors, risks, and actions to consider for a designated technology and/or business management area.
IDC TechScape
Helps IT/tech professionals with developing IT strategic plans and evaluating emerging technologies in terms of their risk to the business. Shows the adoption curve and risk levels over time for a specific emerging technology. Sorts technologies into three "adoption model" categories (transformational, incremental, opportunistic) to help tech leaders determine the potential impact for their organization.
IDC Links
IDC Link
Provides timely context and insight around important market trends and events in a short opinion piece. IDC Links provide IDC's point of view on:
- Financial announcements
- Product announcements
- Mergers and acquisitions or divestitures
- Events
- Response to news
Insights-only Research
Best Practices
Correlates the use of specific practices and superior performance as indicated by an analysis of the benchmarking database. Highlights any significant differences between industries. Conclusions provide a set of process priorities for improving a business case and advice on how to overcome change management issues.
Business Strategy
Helps buyers to assess their business strategies and/or associated business processes, especially as they relate to the use of technology.
Methods and Practices
Provides a step-by-step description of a method or methods that can be applied. As appropriate, the report may compare the benefits and drawbacks of several methods.
Perspective
Presents an article written by an Insights analyst on a topic of special interest to a target audience. This information has generally already appeared in an industry publication and is repackaged for display on the Insights Web site.
Vendor Assessment
Helps buyers select the right IT supplier. The report helps buyers understand the various providers of a technology by providing analysis on market landscape, vendor profiles, vendor market share, and vendor assessments.
Pivot Tables
Pivot Table
Presents an interactive spreadsheet tool for analyzing trends and activities in a specific market segment. These tables are available only through an annual subscription service.
Predictions
Top 10 Predictions
Provides bold, well-conceived market predictions grounded in solid methodologies, primary research, and analyst experience. Lays out a clear road map to understanding major market opportunities and trends.
Presentations
IDC Presentation
Provides the latest, select CIS forecast data, primary research survey findings, and critical IDC analyst opinion in a succinct, easy-to-digest PowerPoint format.
IDC Survey
Presents a hypothesis about what is happening in the market backed by the results of a demand-side or supply-side survey. The focus is on interpreting and analyzing the survey results and providing a strong point of view along with actionable advice.
IDC Survey Spotlight
Answers a timely question and provides a strong opinion backed by IDC survey data. This is a quick nugget of information that is presented in two concise PowerPoint slides.
Insights Presentation
Provides an easy-to-use format to post on the Web presentations that were previously delivered at public forums (such as conferences and events) or for internal client meetings and client presentations. It may not come as part of a consulting/custom engagement.
Market Analysis Perspective
Delivers a concise current state view of a market and insight into the impact of future trends. Business executives, product managers, and MI/AR professionals can use this information when looking to understand buyers' perspectives and market impacts.
Press Releases
Press Release
Announces significant corporate news, such as key hirings or promotions, performance milestones, event highlights, or speaking engagements.
Product Information
Fact Sheet
Describes a research product. Usually details the major areas of coverage and deliverables, and outlines key questions and competitive market conditions that the research will address. Includes links to all published research for a research product.
Studies
Competitive Analysis
Provides a detailed accounting and review of a vendor's programs, processes, products, service, satisfaction, and/or strategy in a target market. This knowledge helps clients reduce their risk of losing market share or enhance their position over the competition.
Customer Needs and Strategies
Focuses on the important decisions that business and IT professionals make every day.
Industry Developments and Models
Provides a detailed assessment of a specific target market's expansion pattern. This analysis helps clients develop and deploy the right mix of value-add products, programs, or services to support their sales and/or partnering efforts.
Market Analysis
Provides an in-depth examination of the dynamics and future of a single market or a group of related markets. The Market Analysis is where we will typically present our forecasts and assumptions, using a key forecast assumptions table.
Market Forecast
Provides the future of a single market or a group of related markets. It presents a new or updated market forecast, including key drivers and assumptions used in the forecast.
Market Share
Provides data on market size, regional allocations, and platform splits as well as a summary of vendor shares for the most recently completed period (year, quarter).
Special Study
Provides a onetime study produced by a research group that is not published as a deliverable under a subscription service.
Survey
Provides a study and interpretation of the results of a demand- or supply-side survey.
Taxonomy
Highlights and emphasizes how IDC tracks the market while also making it easier for customers to find and identify IDC Taxonomy documents.
Technology Assessment
Provides an analysis of the intricacies of an emerging or established technology or the technologies contained within a specific product.
Vendor Needs and Strategies
Provides an in-depth analysis of a company, a small group of companies, a division of a company focused on a particular market, or a best practice that the company exemplifies.
On March 1, 2021, Broadcom Software delivered its new Symantec Web Protection Suite offering. The strength of the suite approach is that it provides flexibility and choice to organizations. Security can be applied by an on-premises appliance, ...
Dynatrace held its annual user conference as a virtual event during the week of February 8–12, 2021. The event drew an estimated online attendance of 25,000 versus 2,500 physical attendees the previous year. During the event, the company ...
The People's Bank of China (PBOC) and China Banking and Insurance Regulatory Commission (CBIRC) introduced new regulations over the sale of online deposit products, signaling increased scrutiny over bank–fintech collaboration in China. The ...
Global professional services firm Accenture and cloud-based software provider Salesforce have expanded their long-time alliance to help customers address sustainability in a strategic, data-driven way. The initiative aims to help organizations ...
As the digital economy has emerged, data has become the lifeblood of business operations, helping people make better decisions, driving new insights, and creating new business models. Data governance is no longer just about security and ...
Microsoft's performance in the second quarter of the company's fiscal 2021 roared back with surprisingly strong 16.7% year-over-year growth in current year revenue after a less impressive first quarter that showed 12.4% revenue growth. The ...
On January 14, 2021, IBM teamed up with GitLab to announce a unified DevOps automation platform, GitLab Ultimate for IBM Cloud Paks, which combines GitLab's single application for DevOps with IBM's DevOps solutions and IBM Cloud Paks product. ...
Reveal has quietly amassed significant AI capabilities within the realm of the review and analysis portions of ediscovery. Many in the ediscovery space compete against the market leader by trying to build a generic alternative instead of ...
AWS re:Invent took high-tech virtual conference hosting to new heights, occurring across three weeks from November 30 to December 18 and offering 500+ breakout sessions, keynotes, and live content. It's the free, modern day, pandemic-aligned ...
Splunk recently had its annual customer conference with a record 30,000 virtual attendees. There were several key product announcements at the event targeting DevOps, IT operations, and security teams. In addition, the company recently released ...
While the data economy can't be put on hold, those companies that are stewards of personal data must place a priority on keeping it private and using it in accordance with governmental regulations as well as with their own terms and conditions. ...
The modern data estate for any organization involved in digital transformation is getting more diverse, distributed, and dynamic, especially as we have seen an acceleration in the move to the cloud, driven by the COVID-19 global pandemic. ...
Exterro severely bolsters its toolkit and enhances its global reach in an acquisition of a forensics leader. Exterro has smartly bet that information governance and in-house eDiscovery/privacy compliance functionality is the future.
Entrust née Entrust Datacard is packaging its 25+ years of cryptographic security expertise into five defined services for helping organizations develop, review, and modernize crypto and PKI infrastructures. As encryption usage expands, ...
Sir Tim Berners-Lee, the British computer scientist best known as the inventor of the world wide web, has announced that his start-up company Inrupt has launched a privacy server for enterprise (Enterprise Solid Server) based on his open ...
Commvault has extended its cloud data protection services — Metallic Backup-as-a-Service — to Europe with immediate availability in the U.K. and Ireland, Benelux, the Nordics, Italy, and Israel. The SaaS data protection service is engineered ...
On October 22, 2020, Arctic Wolf, a managed detection and response (MDR) provider, announced it had raised $200 million in Series E funding. The funding round was led by Viking Global Investors and included investments from Deutsche Telekom ...
Logikcull no longer content to fly somewhat under the radar, took major aim at the issues plaguing the market. Logikcull correctly bets on the cloud and expands its cloud focus and capabilities to fully serve the EDRM. While Logikcull fancies ...
Veritas has signaled it is serious about eDiscovery with a major acquisition. Veritas' strategic acquisition vastly improves its digital compliance portfolio including its eDiscovery platform and creates deeper functionality across its portfolio ...
Ivanti, which specializes in IT automation, asset discovery, and security operations, announced two major acquisitions at the end of September. The company is acquiring endpoint management stalwart MobileIron and secure access specialist ...
Relativity's yearly conference went virtual this year. Relativity focused this year's conference on delivering on promises. Relativity delivered their Aero UI on time and to much fanfare. The UI redefines their cloud product and silences ...
The Portland, Oregon, City Council voted on September 9, 2020, to completely ban the use of facial recognition in public spaces or in places of public accommodation. This is the most extensive ban of this technology to date in the United ...
Vulnerability management giant Qualys is expanding its focus and moving into the endpoint detection and response (EDR) space. The move mirrors a trend seen among existing EDR players that are seeking to capitalize on the capabilities of ...
On August 25, 2020, Hewlett Packard Enterprise (HPE) announced 3Q20 financial results. The company reported that third-quarter total net revenue decreased 4% YoY in constant currency to $6.8 billion. This was the fourth consecutive quarter ...
The recent released Australia’s Cyber Security Strategy 2020 has set a vision of more secure online world for Australians, their businesses, and the essential services. It has identified 18 action plans, and 25 investment areas with a total ...
U.K. security distributor Ignition Technology has launched a security-as-a-service (SECaaS) platform called Catalyst Insights to meet the needs of SME customers. Its "born in the cloud" attributes position it well to meet SME expectations ...
On July 28, Benchmark Electronics announced that is was providing trucks to the U.S. Department of Homeland Security outfitted with mobile surveillance systems to be used on the U.S. southern border. These trucks integrate a variety of sensors, ...
In the past six months there has been strong momentum in the converging security and networking markets. Digital transformation means operating in a hyperconnected, multicloud environment, and next-generation networks must combine new tools ...
Vodafone and Accenture have rightly identified that the European SME security services market is a growth area. But they also recognize that they have yet to capitalize on this opportunity given their diverging profiles (lack of security ...
On July 21, 2020, BT, a global service provider of managed and consulting security services, announced a new range of fully managed security and advisory services to support Microsoft Azure Sentinel. The new offering extends BT's cloud capabilities ...
On July 21, 2020, Vodafone Business and Accenture Security announced a strategic relationship to deliver managed security service (MSS) offerings that are easy to consume, understand, and be tailored to fit small and medium-sized enterprises ...
The Privacy Shield ruling has the potential to end international data transfers out of the European Union (EU) in the near term. Larger corporations with binding corporate rules (BCRs) and those already relying on standard contractual clauses ...
Atos, a global provider of IT security services, announced an agreement to acquire Paladion, a United States–based global provider of managed security services (MSS). Paladion, founded in 2000, includes a proprietary Managed Detection and ...
Slack pioneered enterprise channel-based communication. It now wants to replace your email with short-form messaging. The company's announcement of Slack Connect that enables channel-based messaging for up to 20 different enterprises in ...
Cybersecurity Ventures, the online publisher of Cybercrime Magazine, recently published an article with an attention-grabbing headline: "The World Will Store 200 Zettabytes of Data by 2025." IDC generally affirms the main points of the article ...
Chef software held its annual ChefConf user and technology conference virtually on June 2 and 3, 2020. Given the COVID-19 restrictions affecting travel and social distancing, Chef had to quickly pivot and convert from the planned live, in-person ...
VMware looks to acquire Lastline, which promises to add network threat analytics to NSX, augmenting the security services that can be delivered natively in NSX.
By acquiring Panda Security, WatchGuard greatly expanded its product portfolio, markets served, and sales channel. With market demand and vendor supply trending toward platforms over point products, future cross-product integration and security ...
Micro Focus recently held the company's first-ever virtual North American customer conference (Micro Focus Universe), which ran from May 19 to 21. Given the COVID-19 restrictions affecting travel and social distancing, Micro Focus had to ...
In a move to corner the market on data integrity software and data enrichment products, Syncsort is focusing the company on the value of accurate and consistent data with its recent announcement to rebrand the company as Precisely. Syncsort ...
VMware will acquire Octarine, extending its security platform to Kubernetes-based applications. VMware continues to show a commitment to cybersecurity by making large and small inorganic investments.
Amazon (AWS) customers can evaluate the company's new incident response investigations service, Amazon Detective, which aggregates flow and log data to accelerate the process of identifying the root cause of incidents. The new tool, introduced ...
During its first-quarter earnings call, CyberArk announced that it had purchased identity-as-a-service (IDaaS) provider Idaptive to create what it calls the cybersecurity industry's only modern identity platform with a security-first approach. ...
In Google Cloud's drive to be an enterprise-grade cloud platform service, its focus on data has been apparent in products such as BigQuery, Pub/Sub, Dataflow, Cloud Storage, and Cloud Data Fusion. These products give enterprises wanting ...
Data protection and data security are no longer separate disciplines or tasks for IT organizations. IT leaders are now approaching data protection and security in a holistic manner and vendors are responding with integrated platforms to ...
Okta's vision seems to be correct, and the company's overall strategy is sound. Okta wants to help any organization use any technology and views identity as a natural control point — hard to argue. It's broadening investments to develop ...
Growth in global IT spending is expected to reduce by 1.3%, compared with the estimated growth rate of 5.1% by the end of 2020, because of the "pessimistic scenario" that resulted from the COVID-19 outbreak. Most impact is expected to be ...
The COVID-19 pandemic has forced many firms to mobilize around work from home (WFH) as a means to slow the spread of the virus, care for employee well-being, and ensure business continuity. Yet the rapid and unplanned broadening of WFH instances ...
On January 27, 2020, 40 public advocacy groups, led by the Electronic Privacy Information Center, sent a letter to the U.S. government's Privacy and Civil Liberties Oversight Board (PCLOB) asking for the suspension of the government's use ...
Following this year's RSA Conference theme of the Human Element, Cisco's Wendy Nather included an identity technology example in her keynote address about democratizing security, calling Apple's inclusion of a biometric fingerprint reader ...