This IDC PlanScape provides insight into how an IT security program can be more effectively managed by better aligning the IT security services into functional activities supported by people, processes, and technology and applying activity-based costing managerial accounting methods.
"With this service-oriented approach to security, the costs align in a way that allows comparison for initiatives looking at new security models, outsourcing arrangements, process automation, and other interests," said Pete Lindstrom, vice president of Security Strategies. "This structure provides a better way to identify opportunities for more cost-effectiveness of a security program."
Advanced authentication, Analytic applications, Cognitive/artificial intelligence, Encryption toolkits, Endpoint security, Enterprise single sign-on, Enterprise, next-gen security, Governance, risk and compliance infrastructure, Identity and access management, Information protection and control, Information transformation, Intrusion detection and prevention, Security and vulnerability management software, Security management, Technology buyer, User provisioning, Virtual private network products, Web single sign-on
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.