TECH SUPPLIER Feb 2021 - Taxonomy - Doc # US47479121
IDC's Worldwide Security Spending Guide Taxonomy, 2021: Release V1, 2021
By: Ashutosh BishtSenior Research Manager, Eman ElshewySenior Research Analyst, IDC Egypt, Jebin GeorgeProgram Manager, Insights, MEA, Sharad KotagiMarket Analyst, Jonathan Leung, Karen MasseyResearch Manager, Customer Insights & Analysis, Stefano PeriniSenior Research Analyst, European Industry Solutions, Customer Insights & Analysis, Ko ShikitaResearch Manager, IT Spending, IDC Japan, Vladimir ZivadinovicSenior Research Analyst, Customer Insights & Analysis, CEE
This IDC study provides a detailed description of IDC's Worldwide Security Spending Guide methodology and taxonomy. It should be used as a companion piece for IDC's Worldwide Security Spending Guide data deliverable and all of IDC's worldwide vertical research. Technology suppliers may utilize this approach and structure as well to help them build an industry-focused organization.
"IDC's Worldwide Security Spending Guide presents a comprehensive, global, and detailed view of the marketplace," says Karen Massey, research manager, IDC's Customer Insights and Analysis group. "It is an invaluable resource to help vendors define and standardize definitions for security products opportunities."
Executive Information , Worldwide Security Spending Guide
Application development services, Application management, Business consulting services, Endpoint security, Firewall and VPN security appliance products, Hosted application management, Hosting infrastructure services, IT consulting services, IT education and training, Identity and access management, Information protection and control, Intrusion detection and prevention, Messaging security, Messaging security appliances, Network and desktop outsourcing services, Network security, Secure content and threat management, Security and vulnerability management software, Security management, Systems integration services, Unified threat management, Virtual private network products, VoIP, Web and messaging WAM security appliances, Web security
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.