TECH SUPPLIER Oct 2019 - Technology Segment - Doc # EUR243930519
Czech Republic Security Solutions 2019–2023 Forecast and 2018 Market Analysis
By: Mark ChildResearch Manager, European Security, Petr Zajonc, Mohamed HefnyProgram Manager, Virtualization, Systems & Infrastructure Solutions, CEMA, Petr SvagrovskySenior Research Analyst, Systems & Infrastructure Solutions, Czech and Slovak Republics
This IDC study details the solid growth seen in the Czech security solutions market in 2018, which was driven by the continued expansion of security services — particularly managed security services and cloud security solutions. The study also observes cyclical trends in security infrastructure (hardware and software) investments, along with some targeted spending to enhance protection in specific areas through the adoption of more advanced threat detection capabilities, security analytics and intelligence, and network security.
"Czech organizations are migrating workloads to the cloud for scalability, flexibility, and business benefits. Security teams are pushed to become more business-friendly and support digital transformation initiatives. At the same time, they must work with limited budgets and resources while managing increasingly complex, heterogeneous infrastructure. Consequently, they are increasingly turning to third-party expertise to plug gaps and outsource tasks for which they lack headcount or skills. The alignment of security and business strategy will enable Czech organizations to improve protection against highly motivated threat actors and remain abreast of relevant policies and regulations and to ultimately achieve the desired outcomes for their digital business." — Research Manager Mark Child, European Security, IDC CEMA
Endpoint security, Firewall and VPN security appliance products, IT consulting services, IT education and training, IT maintenance and support, Intrusion detection and prevention, Messaging security, Network security, Security management, Unified threat management, Virtual private network products, Web security
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.