Event Extras - IDC IT Security Roadshow 2015 | Rendezvények | IDC Hungary

The Voice of Attendees - Status of Security Deployments in CEE

Source: IDC CEE Security Roadshow 2014 Attendee Survey, N=347

Polish Staff Most Trusted in CEE When it Comes to IT Security

IT managers in Poland are probably more relaxed than their international counterparts in Central and Eastern Europe. The main reason: trust. A recent IDC survey creates an informal trust index that indicates IT managers in Poland, relative to managers in other CEE countries, are less worried about staff messing up carefully configured systems or leaking data. read more
 

IDC Worldwide Security Predictions for 2015

IDC's security research team has identified 10 strategic security decision imperatives that enterprises will be called upon to address over the next several years. The decision imperatives are all designed to move the approach to enterprise security from reactive to proactive.

IDC FutureScapes are designed to help shape IT strategy and planning for the enterprise by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future.

FutureScape Security Predictions for 2015 and beyond:

1. Risk-Based Budgeting – By 2016, 25% of large enterprises will make security-related spending decisions based on analytical determinations of risk.
2. Biometric Identification – Mobile devices have biometric capabilities, and, in 2015, we expect that 15% of those devices will be accessed biometrically. That number will grow to 50% by 2020.
3. Threat Intelligence – By 2017, 75% of large enterprises will receive custom threat intelligence information tailored to their industry, company, brand, and environment.
4. Data Encryption – By the end of 2015, 20% of proprietary data in the cloud will be encrypted. By 2018, that will quickly rise to 80%.
5. Security SaaS – Security software as a service (SaaS) will represent a greater share of enterprise security spending. By the end of 2015, 15% of all security will be delivered via SaaS or be hosted, and this will exceed 33% by 2018.
6. User Management – By 2016, multi-factor authentication will be the primary method of access control used by 20% of enterprises for highly privileged or otherwise sensitive accounts.
7. Hardening Endpoints – By 2017, 90% of an enterprise's endpoints will utilize some form of hardware protection to ensure that endpoint integrity is maintained.
8. Security as a Feature – Security features are rapidly being embedded into business applications. By 2018, 25% of security applications that were previously purchased independently will be incorporated directly into business applications.
9. Software Security – By the end of 2015, 10% of all enterprise commercial web sites and mobile applications will have been scanned for vulnerabilities; by 2018, 40% will be scanned regularly.
10. Executive Visibility – By 2018, a full 75% of chief security officers (CSO) and chief information security officers (CISOs) will report directly to the CEO, not the CIO.

An audio replay of IDC FutureScape web conferences on security are available by registering here: