TECH SUPPLIER Mar 2020 - Taxonomy - Doc # US44737620
IDC's Worldwide Security Spending Guide Taxonomy, 2020: Release Version 1H19
By: Karen MasseyResearch Manager, Customer Insights & Analysis, Jessica GoepfertProgram Vice President, Customer Insights & Analysis, Ashutosh BishtSenior Research Manager, Frank DicksonProgram Vice President, Cybersecurity Products, Eman ElshewySenior Research Analyst, IDC Egypt, Jebin GeorgeProgram Manager, Insights, MEA, Jonathan LeungSenior Market Analyst, Susan LuAssociate Analyst, Roberto MembrilaSenior Analyst, ROC, Latin America, Stefano PeriniSenior Research Analyst, European Industry Solutions, Customer Insights & Analysis, Eduardo Puente, Ko ShikitaResearch Manager, IT Spending, IDC Japan, Neli VachevaResearch Manager, European Industry Solutions, Customer Insights & Analysis, Yumo YaoMarket Analyst
This IDC study provides a detailed description of IDC's Worldwide Security Spending Guide methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverable and all of IDC's worldwide vertical research. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization.
"IDC's Worldwide Security Spending Guide presents a comprehensive, global, and detailed view of the marketplace," says Karen Massey, research manager, IDC's Customer Insights and Analysis group. "It is an invaluable resource to help vendors define and standardize definitions for security products opportunities."
Executive Information , Worldwide Security Spending Guide
Advanced authentication, Content management, Endpoint security, Enterprise single sign-on, Global IT and economic markets, IT consulting services, IT education and training, Information protection and control, Intrusion detection and prevention, Legacy authorization, Messaging security, Network security, Secure content and threat management, Security and vulnerability management software, Security management, Systems integration services, Unified threat management, Virtual private network products, Web security
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.