Feb 2016 - IDC MaturityScape Benchmark - Doc # US41000516
IDC MaturityScape Benchmark: IT Security in the United States, 2016
This IDC study presents the results of IDC's 2015 IT Security MaturityScape Benchmark Survey and should be viewed as a supplement to IDC MaturityScape: IT Security (IDC #US40661915, December 2015). Together, they provide a comprehensive overview of the IDC's IT security maturity model.
This study also presents the current state of the market based on quantitative research. The results in this study will enable organizations to work with IDC to assess their security maturity level against industry benchmarks and foster the security maturity needed to compete in the new era of the 3rd Platform.
In IDC MaturityScape: IT Security (IDC #US40661915, December 2015), we identified the stages, dimensions, outcomes, and actions that organizations should consider to effectively develop IT security competency. This document enables organizations to answer the following questions:
- How will security and technology risk management affect the way we do business in the era of the 3rd Platform?
- Where are we on a maturity scale for security competencies in terms of the business needs, and how does this compare with our peers?
- How should we create the framework to enable security transformation?
- What's the path to encourage and improve intra- and intergroup collaboration in promoting and encouraging a mature security program?
"The new business environment ignited by the 3rd Platform has brought new security challenges to organizations," says Pete Lindstrom, research vice president for Security Strategies in IDC's IT Executive Program. "However, most organizations do not have the security maturity to maximize the amount of risk reduction with the minimum amount of applied resources. Organizations need to refine and integrate their risk management practices to meet the needs of digital transformation."
Digital transformation strategies, Enterprise, next-gen security, Identity and access management, Information transformation, Secure content and threat management, Security management, Technology buyer, Unified threat management