Cloud Security View

Related Links



Meet the Experts

Photo of Frank Dickson
Frank Dickson

Group Vice President, Security & Trust



IDC's Cloud Security View looks to characterize the reality of cybersecurity installed base and purchase decisions surrounding software and hardware products, including brands, pricing, and purchase criteria. A special emphasis will be placed on characterizing buyer activity by the size of business.


Markets and Subjects Analyzed


  • Overall adoption — by type (hardware, software, and services), spend, and project/use cases
  • Pricing
  • Drivers/inhibitors
  • Impact on overall hardware and software decisions (open source versus commercial)
  • Deployment location — on premises, edge, and public cloud
  • Personas
  • Vendor perceptions
  • Staffing — trade-offs, alert fatigue, and time spent on tasks

Core Research



Key Questions Answered


  1. What are IT buyers thinking, planning, and investing in security technologies?
  2. What are the major drivers of and inhibitors for adoption of various security technologies?
  3. How are security products and vendors evaluated?
  4. What drives churn, and is product/vendor consolidation real?
  5. What are actual prices paid for security products?