TECH BUYER Oct 2019 - IDC FutureScape - Doc # US45582219
IDC FutureScape: Worldwide Security and Trust 2020 Predictions
By: Frank DicksonProgram Vice President, Cybersecurity Products, Craig RobinsonProgram Director , Security Services, Dominic Trott, Robyn Westervelt, Michael SubyResearch Vice President, Security & Trust, Jay BretzmannProgram Director, Security Products, Cathy HuangAssociate Research Director, Services and Security, IDC Asia/Pacific, Christopher KisselResearch Director, Security & Trust Products, Ryan O’LearyResearch Manager, Privacy and Legal Technology, Simon PiffVice President of Security Practice, Curtis PriceProgram Vice President, Infrastructure Services, Konstantin Rychkov, Martha Vazquez
This IDC study discusses the worldwide security and trust top 10 predictions for 2020.
"Transformation in security and trust will affect every business in every industry; no one will be spared," said Michael Suby, research vice president, IDC Security and Trust. "Embracing change and getting ahead of the curve is the best prescription to be in control of your organization's destiny and avoid being caught off guard."
Asia/Pacific Security Opportunities: Trust and Resilience , Cybersecurity Analytics, Intelligence, Response and Orchestration , Data Security , Endpoint Security , European Privacy and Data Security , European Security Strategies , Identity and Digital Trust Software , Internet of Things and OT Security Products , Legal, Risk and Compliance Solutions , Network Security Products and Strategies , Security Services
Oracle Corporation, Tech Data Corporation, GLOBAL INTEGRATION LIMITED, Alibaba Group Holding Limited, Google LLC, Facebook, Inc., Sentor Managed Security Services Ab, FINANCIAL INSTITUTIONS, INC., Amazon Web Services Inc., Amazon.com Inc., Rackspace Technology Global, Inc., Twitter, Inc., SENTINEL ENERGY SERVICES INC., Distributed Ledger Inc, Microsoft Corporation
Cognitive/artificial intelligence, Endpoint security, Governance, risk and compliance infrastructure, Identity and access management, Information protection and control, Internet of things, Network security, Security management, Technology buyer, User provisioning