TECH SUPPLIER Aug 2018 - Technology Segment - Doc # CEMA42699118
Czech Republic Security Solutions 2018–2022 Forecast and 2017 Market Analysis
This IDC Technology Segment study analyzes the security solutions market in the Czech Republic in 2017 and examines the projected growth of investments in security solutions in the country during 2018–2022. The study tracks investments, trends, and drivers across the security solution pillars of appliances, software, and services.
"Czech organizations focused on maintaining core security infrastructure in 2017: upgrading network security appliances, consolidating functions with UTM machines, and updating endpoint security and identity and access management solutions. The market saw even greater growth in security services. Companies turned to consulting, deployment, and integration specialists to help them deal with the increasingly complex task of improving security infrastructure. Cloud services uptake drove investments in public cloud security. Managed security services are also on the rise." — Research Manager Mark Child, Security, IDC Central and Eastern Europe
Central and Eastern European Security Solutions , European Security Strategies
HUNGARIAN RAILWAY COMPANY, WEB.COM GROUP, INC., Magyar Telekom Telecommunications Public Limited Company, Sophos Plc, Symantec Corporation, T-Systems International GmbH, Fortinet, Inc., NAV CANADA, CyberArk Software Ltd., INDUSTRIAL DISTRIBUTION GROUP, INC., Microsoft Corporation, Oracle Corporation, McAfee LLC, Splunk Inc., Dell Inc., Beijing Capital Science and Technology Group Co., Ltd., Gemalto N.V., Proofpoint, Inc., BALABIT IT Biztonságtechnikai Rendszereket Fejlesztő és Szolgáltató Korlátolt Felelősségű Társaság, Check Point Software Technologies Ltd., Palo Alto Networks, Inc., IBM, Cisco Systems, Inc., Trend Micro Incorporated, Blue Coat Systems, Inc.
Endpoint security, Firewall and VPN security appliance products, IT consulting services, IT education and training, IT operations and implementation, Information protection and control, Intrusion detection and prevention, Messaging security, Messaging security appliances, Network security, Security management, Unified threat management, Virtual private network products, Web and messaging WAM security appliances, Web security, Web security appliances
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.