TECH BUYER Sep 2018 - IDC MarketScape - Doc # US44257117
IDC MarketScape: U.S. Incident Readiness, Response, and Resiliency Services 2018 Vendor Assessment — Beyond the Big 5 Consultancies
By: Christina Richmond, Pete LindstromVice President of Research, Enterprise / NextGen Security
This IDC study presents through the IDC MarketScape model a vendor assessment of providers offering incident response services. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for incident response services. The evaluation is based on a comprehensive and rigorous framework that assesses how each vendor stacks up to one another, and the framework highlights the key factors that are expected to be the most significant for achieving short- and long-term success in the incident response marketplace.
"With the relentless onslaught of sophisticated cyberattacks, enterprises must be proactive about incident readiness, response, and resiliency. In-house solutions are challenging to fund and maintain at the required level, so organizations increasingly are turning to service providers for assistance. As more providers enter this rapidly growing marketplace, buyers have more choice but also more complexity related to evaluation and selection. Thorough vetting takes time and attention to the providers' people, processes, and technology. Enterprises should make this endeavor a priority." — Christina Richmond, IDC program vice president, Worldwide Security Services
FireEye, Inc., CenturyLink, Inc., Verizon Communications, Inc., Wipro Limited, SecureWorks Inc., McAfee LLC, Booz Allen Hamilton Inc., RSA Security LLC, Symantec Corporation, DXC Technology Co., CrowdStrike, Inc., Trustwave Holdings Inc., IBM, Cisco Systems, Inc., NTT, Rapid7 LLC, Cylance, Inc., Optiv Security Inc., Stroz Friedberg LLC
Big data analytics and discovery, Cognitive/artificial intelligence, Endpoint security, Governance, risk and compliance infrastructure, Network security, Security management, Technology buyer, User provisioning, Web security
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.