Print Page

Security ServicesView 2020: Premium

Security ServicesView 2020: Premium helps IT companies' demand-side trends in the procurement of security services to help prioritize their security services investments, value proposition messages, delivery mechanisms, and partnerships in the market.

Markets and Subjects Analyzed

  • Overall adoption of security services, by service segment (consulting, implementation, managed services)
  • Market drivers/inhibitors for security professional and managed services
  • Adoption of as-a-service models
  • Evolving consumption models for security services
  • Security risk and compliance
  • Cloud security
  • Purchase criteria for security services
  • Digital trust
  • Selection criteria for security services providers
  • Securty professional services (consulting, integration)
  • Managed security services by type
  • Managed detection and response
  • Incident response
  • IoT security
  • Security staffing trends

Core Research

  • Executive Summary: This summary provides in-depth analysis of the survey results at a worldwide and regional level, which will include strategic messages, key highlights, implications, and essential guidance in security services.
  • IDC Survey Findings: This presentation provides a summary of the survey results in the form of charts and figures for each survey question for easy viewing.
  • Banner Books: These banner books provide the data results of this study across different segment views (e.g., firm size, geography, and industry).
  • Webinar: IDC provides a webinar as an interactive session to review and discuss the results of this study.
  • IDC Survey Spotlight Documents: This presentation highlights key takeaways from the survey.

In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.

Key Questions Answered

  1. What are IT buyers thinking, planning, and investing in security services?
  2. What are the major drivers of and inhibitors for adoption of various security services?
  3. How will spending on security services be allocated by the various deployment models?
  4. How will security services intersect with other technologies?
  5. What are the spending priorites for security services change by size of company?
  6. How are companies incorporating security concerns into the cloud migration strategies?

Related Links