target audience: TECH BUYER Publication date: Dec 2019 - Document type: IDC Perspective - Doc Document number: # US45717819
Cybersecurity Solutions: A Model for Evaluating and Rationalizing Solutions for Your Organization
Content
List of Tables
List of Figures
Get More
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.
Related Links
Abstract
This IDC Perspective discusses the deconstruction of cybersecurity solutions for CIOs and CISOs to help understand the technical nature of these solutions. The combination of new technologies with new weaknesses, intelligent adversaries that modify their behavior, and cloud architectures creates the need for full coverage of an IT environment. To understand the extent and efficacy of existing cybersecurity solutions, rationalize and optimize their deployment, and identify new solutions that may positively contribute to an enterprise cybersecurity program, organizations must develop a robust understanding of how a proposed solution is supposed to operate. This document deconstructs solution capabilities and provides a taxonomy of information that can be used to assess a program.
"The number of cybersecurity solutions is drastically increasing," said Pete Lindstrom, VP of Research, Enterprise/NextGen Security. "It is crucial to understand what capabilities the vendors have to ensure complete coverage of the IT environment."