TECH BUYER Aug 2016 - IDC MarketScape - Doc # US41320816
IDC MarketScape: U.S. Emerging Managed Security Services 2016 Vendor Assessment
By: Christina Richmond, Martha VazquezSenior Research Analyst, Infrastructure Services
This IDC study presents a vendor assessment of providers offering managed security services (MSS) through the IDC MarketScape model. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for MSS. The evaluation is based on a comprehensive and rigorous framework that assesses how each vendor stacks up to one another, and the framework highlights the key factors that are expected to be the most significant for achieving success in the MSS market over the short term and the long term.
"In-house security solutions are expensive and challenging to maintain in the face of a rapidly evolving threat landscape and formidable adversaries. As a result, enterprises increasingly are considering managed security services providers (MSSPs). MSSPs that offer MSS 2.0 services provide a plethora of security and consulting services along with the predictive threat intelligence and advanced detection and analysis expertise that are necessary to thwart attacks and protect assets. In the highly competitive security services marketplace, enterprise leaders need to be discerning buyers that understand their requirements and evaluate MSSP capabilities accordingly, regardless of how many security services are being outsourced." — Christina Richmond, program director, Security Services
CenturyLink, Inc., Trustwave Holdings Inc., Cisco Systems, Inc., BAE Systems, Inc., Level 3 Communications, Optiv Security Inc., Solutionary, Inc., CompuCom Systems, Inc., Infosys Limited, Alert Logic, Inc.
Big data analytics and discovery, Firewall and VPN security appliance products, IT consulting services, Information protection and control, Intrusion detection and prevention, Network security, Security management, Software as a service, Solution services, Technology buyer, Unified threat management
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.