IDC's Information and Data Security recognizes the value that data brings to the enterprise and the criticality of protecting it without introducing delays or blocking essential operations. With data theft impacting over 1 billion people and businesses, IDC identifies and quantifies solutions that can protect data against an evolving host of threats. Topic areas include using content as the control point for information protection, security, privacy, and compliance with technologies such as discovery and classification, data loss prevention, messaging security, and data access governance. Other topics include the evolution of cryptography as we move toward cloud computing, Big Data and analytics, and the collection of massive amounts of machine and user-created content, which is increasingly turning many enterprises into data brokers. This service also includes coverage of masking and tokenization techniques as enterprise data stores grow with the promise of analytics and the use of data to enable behavioral security solutions, cognitive analytics, and monitoring and supervision.
Information and Data Security
Related Links
Meet the Experts
Markets and Subjects Analyzed
- Modern data security and privacy trends (ransomware and AI)
- Cryptography and digital trust (file and whole disk encryption, key management, certificates, and tokenization)
- Database/storage security (activity monitoring and obfuscation)
- Information protection solutions (messaging security, data loss prevention, data discovery and classification, DSPM, and data access governance)
Core Research
- Data Security Taxonomy
- Worldwide Digital Trust Market Shares
- Worldwide Digital Trust Market Forecast
- Insider Threat Market Glance
- IDC FutureScape
- Information Protection Market Shares
- Information Protection Market Forecast
- Vendor Profile, Analysis, and Case Studies
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- How can organizations better protect their sensitive data assets by understanding the motivations of attackers and/or malicious insiders?
- What steps can be taken to predict/combat emerging threats and improve data security?
- What innovative data security products and approaches may have long-term efficacy?
- How do continued cloud adoption, the growing nature of distributed corporate environments, and Big Data and analytics impact existing data security markets?
- How do organizations address data security that could potentially expose sensitive data elements and cause data decentralization?
Companies Covered
- 1touch.io Inc.
- Amazon Web Services Inc.
- Barracuda Networks, Inc.
- BigID Inc.
- Broadcom Inc.
- Check Point Software Technologies Ltd.
- CipherCloud, Inc.
- Cisco Systems Inc.
- Cohesity Inc.
- Commvault Systems, Inc.
- Dataguise Inc.
- Datto, Inc.
- Dell Technologies Inc.
- DigiCert, Inc.
- Digital Arts Inc.
- Digital.ai Software Inc.
- ESET spol. s r.o.
- Egnyte, Inc.
- Entrust Corporation
- Fasoo.com, Inc.
- Forcepoint LLC
- Fortanix Inc.
- Fortinet, Inc.
- Fortra LLC
- Fujitsu Limited
- Gemalto N.V.
- Google LLC
- Hewlett Packard Enterprise
- Hitachi, Ltd.
- IBM
- Imperva, Inc.
- Informatica LLC
- Intel Corporation
- Microsoft Corporation
- Mimecast Limited
- NEC Corporation
- NSFOCUS Technologies Co. Ltd.
- NextLabs
- OpenText Corporation
- Oracle Corporation
- Paperclip Inc.
- Proofpoint, Inc.
- Protegrity Corp.
- QI-ANXIN Technology Group Inc.
- Rubrik Inc.
- SAS Institute Inc.
- Seclore Technology Pvt. Ltd.
- Sectigo Ltd.
- Securonix, Inc.
- Skyhigh Security
- SonicWALL, Inc.
- Sophos Plc
- Symantec Corporation
- Thales S.A.
- Trellix Corp.
- Trend Micro Incorporated
- TrustArc Inc.
- Trustwave Holdings Inc.
- Utimaco GmbH
- Varonis Systems Inc.
- Veeam Software AG
- Venafi, Inc.
- WinMagic Inc.
- Zettaset Inc.
- Ziff-Davis Inc