Michael SubyResearch Vice President, Security & Trust
What Are the Prominent Sources of Initial Ransomware Compromise and Which Security Technologies Are Used to Detect Ransomware Attacks?
This IDC Survey Spotlight highlights two findings on ransomware attacks. The first finding is on the initial source of compromise, and the second finding is on the technologies organizations use to detect ransomware attacks following initia...
Worldwide Consumer Digital Life Protection Market Shares, July 2020–June 2021: McAfee Outpaces the Market
This IDC study reviews consumer digital life protection market shares for the 12-month period ending June 2021.According to Michael Suby, research vice president, Security and Trust at IDC, "Consumers' lives have become more digitally infus...
Worldwide Modern Endpoint Security Market Shares, July 2020–June 2021: CrowdStrike and Microsoft Outdistancing All Other Vendors in a Rapidly Expanding Market
This IDC study reviews the worldwide modern endpoint security market for the 12-month period ending June 2021."Market demand for modern endpoint security products is on an accelerating pace," according to Michael Suby, research vice preside...
How Does 2022 Planned Spending on Managed Detection and Response Compare to Other Security and Risk Management Expenditures?
IDC's Worldwide Security Products Taxonomy, 2022
Worldwide Consumer Digital Life Protection Market Forecast Update
Where do you want to save the document ?